邱慧敏, 杨义先, 钮心忻. 无线传感器网络中广播通信的安全协议设计[J]. 北京邮电大学学报, 2006, 29(5): 53-57.[2]Qiu H M, Yang Y X, and Niu X X. Security protocol design about broadcast in wireless sensor network[J]. Journal of Beiing University of Posts and Telecommunications, 2006 29(5): 53-57.[3]Boukerche A, Ren Y L, and Samarah S. A secure key management scheme for wireless and mobile Ad hoc networks using frequency-based approach: proof and correctness. IEEE GLOBECOM 2008 NEW ORLEANS, LA, USA, Dec., 2008: 1-5.[4]Lu K J, Qian Y, Guizani M, and Chen H H. A framework for a distributed key management scheme in heterogeneous wireless sensor networks[J].IEEE Transactions on Wireless Communications.2008, 7(2):639-647[5]Aparna R and Amberker B B. Authenticated secure group communication using broadcast encryption key computation. ITNG 2008. Fifth International Conference on Las Vegas, Nevada, USA, 2008: 348-353.[6]Yan J Z, Ma J F, and Liu H Y. Key hierarchies for hierarchical access control in secure group communications. Computer Networks: The International Journal of Computer and Telecommunications Networking, 2009, 53(3): 353-364.[7]Boneh D and Hamburg M. Generalized identity based and broadcast encryption schemes. Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology 2008, Melbourne, Australia, December 2008: 455-470.[8]沈玉龙, 裴庆祺, 马建峰. MMTESLA: 多基站传感器网络广播认证协议[J]. 计算机学报, 2007, 30(4): 539-546.Shen Y L, Pei Q Q, and Ma J F. MMTESLA: Broadcast authentication protocol for Multiple-Base-Station sensor networks[J]. Chinese Journal of Computer, 2007, 30(4): 539-546.[9]Wallner D, Harder E, and Agee R. Keymanagement for multicast: Issues and Architectures. RFC 2627, June 1999.[10]Wong C K and Lam S. Secure group communications using key graphs. Proc. ACM SIGCOMM 98 Conference in Vancouver, 1998: 68-79.[11]Canetti R.[J].Garay J, Itkis G, Micciancio K, and Naor M. Multicast security: a taxonomy and some efficient constructions. Proc. INFOCOM99, New York, NY.1999,:-Chang I.[J].Engel R, Pendarakis D, and Saha D. Key management for secure internet multicast using boolean function minimization techniques. Proc. INFOCOM99, New York, NY.1999,:-[12]Perrig A, Song D, and Tygar J D. ELK. A new protocol for efficient large group key distribution. IEEE Security and Privacy 2001, Oakland, California, USA, 2001: 247-262.[13]Son J H, Lee J S, and Seo S W. Energy efficient group key management scheme for wireless sensor networks. COMSWARE 2007. 2nd International Conference Bangalore, India, Jan. 7-12, 2007: 1-9.[14]Mohamed E, Ashraf W, and Stephan O, et al.. Group key management scheme for large-scale sensor networks[J].Ad hoc Networks.2005, 3(5):668-688[15]Jeffery E W and Gam D N. Energy-efficient broadcast and multicast trees in wireless networks[J].Mobile Networks and Applications.2002, 7(6):481-492
|