[1]Kausar F, Hussain S, Yang L T, et al. Scalable and efficient key management for heterogeneous sensor networks [J]. The Journal of Supercomputing, 2008, 45(1): 4465.[2]Dai H Y, Xu H B. Key predistribution approach in wireless sensor networks using LU matrix [J]. IEEE Sensor Journal, 2010, 10(8): 13991409.[3]Eschenauer L, Gligor V D. A keymanagement scheme for distributed sensor networks[C]∥Proc of the 9th ACM Conf on Computer and Communication Security. Washington, DC: ACM Press, 2002: 4147.[4]Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks[C]∥Proc of the 2003 IEEE Symposium on Security and Privacy. Berkeley, CA: IEEE Press, 2003: 197213.[5]Du W L, Deng J, Han Y S, et al. A pairwise key predistribution scheme for wireless sensor networks[J]. ACM Transactions on Information and System Security, 2005, 8(2): 228258.[6]Dai T T, Agbinya J I. Combating keyswapping collusion attack on random pairwise key predistribution schemes for wireless sensor networks[J]. Security and Communication Networks, 2011, 4(2): 109121.[7]Choi S J, Youn H Y. An efficient key predistribution scheme for secure distributed sensor networks[C]∥IFIP Intemational Federation for Information Processing 2005. Nagasaki, Japan: Springer Verlag, 2005: 10881097.[8]Park C W, Choi S J, Youn H Y. A noble key predistribution scheme with LU matrix for secure wireless sensor networks[C]∥Proc of International Conf on Computational Intelligence and Security 2005. Xi’an, China: Springer Verlag, 2005: 494499.[9]Poornima A S, Amberker B B. Key management schemes for secure communication in heterogeneous sensor networks[J]. International Journal of Recent Trends in Engineering, 2009, 1(1): 243247.[10]Sridhar V, Raghavendar V. Key predistribution scheme for grid based wireless sensor networks using quadruplex polynomial shares per node[J]. Procedia Computer Science, 2011, 5: 132140.[11]Lin P L, Ko R S. An efficient datagathering scheme for heterogeneous sensor networks via mobile sinks[J]. International Journal of Distributed Sensor Networks, 2012, 296296: 114.[12]Zhu S, Setia S, Jajodia S. LEAP+: Efficient security mechanisms for largescale distributed sensor networks[J]. ACM Transactions on Sensor Networks, 2006, 2(4): 500528. |