1 Akyildiz I F, Su W, Sankarasubramamiam Y, et al. Wireless sensor networks: A survey [J]. Computer Networks, 2002, 38: 393-422.2 Chan H, Gligor V D, Perrig A, et al. On the distribution and revocation of cryptographic keys in sensor networks [J]. IEEE Transactions on Dependable and Secure Computing, 2005, 2: 233-247.3 Chan H, Perrig A H, Song D. Random key predistribution scheme for sensor networks [C]// Proceedings of IEEE Symposium Security and Privacy (SP'03). [s.l.]: IEEE, 2003: 197-213.4 Chan H, Perrig A H, Song D H. Key distribution techniques for sensor networks, wireless sensor networks [M]. Norwell, MA, USA: Kluwer Academic Publishers, 2004: 277-303.5 Du W, Deng J, Han Y S, et al. A key predistribution scheme for sensor networks using deployment knowledge [J]. IEEE Transactions on Dependable and Secure Computing, 2006, 3(1): 62-77.6 Eschenauer L, Gligor V. A key management scheme for distributed sensor networks [C]// Proceedings of ACM Conference on Computer and Communications Security (CCS'02). Washington, DC, USA: ACM Press, 2002: 41-47.7 Huang D, Mehta M, Van De Liefvoort A, et al. Modeling pairwise key establishment for random key predistribution in large-scale sensor networks [J]. IEEE/ACM Transactions on Networking, 2007, 15(5): 1204-1215.8 Walters J P, Liang Z, Shi W, et al. Wireless sensor network security: A survey [C]// Security in Distributed, Grid, and Pervasive Computing. Exton, Pennsylvania, USA: CRC Press, 2006: 367-410.9 Park T, Shin K G. LiSP: A lightweight security protocol for wireless sensor networks [J]. ACM Transactions on Embedded Computing Systems (TECS), 2004, 3: 634-660.10 Pister K, Kahn J, Boser B. Smart dust [EB/OL]. (2009-06-01). http://robotics.eecs.berkeley.edu/~pister/SmartDust/.11 Kauar F, Hussian S, Yang L T, et al. Scalable and efficient key management for heterogeneous sensor networks [J]. The Journal of Supercomputing, 2008, 45(1): 44-65.12 Lu K, Qian Y, Hu J. A framework for distributed key management schemes in heterogeneous wireless sensor networks [C]// Proceedings of 25th IEEE International Performance, Computing, and Communications Conference, IPCCC 2006. [s.l.]: IEEE, 2006: 513-519.13 Traynor P, Kumar R, Choi H, et al. Efficient hybrid security mechanisms for heterogeneous sensor networks [J]. IEEE Transactions on Mobile Computing, 2007, 6: 663-677.14 Liu D, Ning P. Location-based pairwise key establishments for static sensor networks [C]// ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN '03). [s.l.]: ACM Press, 2003: 72-82.15 Yu Z, Guan Y. A key pre-distribution scheme using deployment knowledge for wireless sensor networks [C]// Proceedings of Fourth International Symposium on Information Processing in Sensor Networks. Piscataway, NJ, USA: IEEE, 2005: 261-268.16 Liu D, Ning P. Establishing pairwise keys in distributed sensor networks [C]// Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03). Washington, DC, USA: ACM Press, 2003: 52-61.17 Blundo C, Santis A D, Herzberg A, et al. Perfectly-secure key distribution for dynamic conferences [C]// Proceedings of Advances in Cryptology-CRYPTO'92, LNCS 740. California, USA: ACM Press, 1993: 471-486. |