[1]Akyildiz I F, Su Wei, Sankarasubramaniam Y, et al. Wireless Sensor Networks: A Survey[J]. Computer Networks, 2002, 38(4): 393-422. [2]Perrig A, Standovic J, Wagner D. Security in Wireless Sensor Networks[J]. Communications of ACM, 2004, 47(6): 53-57. [3]Eschenauer L, Gligor D V. A Key-management Scheme for Distributed Sensor Networks[C]//Proc. of ACM Conference on Computer and Communications Security. Washington D. C., USA: ACM Press, 2002: 41-47. [4]Chan Haowen, Perrig A, Song D. Random Key Predistribution Schemes for Sensor Networks[C]//Proc. of IEEE Symposium on Security and Privacy. [S. l.]: IEEE Press, 2003: 197-213. [5]Du Wenliang, Deng Jing, Han Yunghsiang, et al. A Pairwise Key Predistribution Scheme for Wireless Sensor Networks[C]//Proc. of ACM Conference on Computer and Communications Security. [S. l.]: IEEE Press, 2003: 42-51. [6]Liu Donggang, Peng Ning. Establishing Pairwise Keys in Distributed Sensor Networks[J]. ACM Transactions on Information and System Security, 2005, 8(1): 41-77. [7]Du Wenliang, Deng Jing, Han Yunghsiang, et al. A Key Manage- ment Scheme for Wireless Sensor Networks Using Deployment Knowledge[C]//Proc. of IEEE Conference on Computer Communications. [S. l.]: IEEE Press, 2004: 586-597. [8]陈燕俐, 杨 庚. 适合于无线传感器网络的混合式组密钥管理方案[J]. 通信学报, 2010, 31(11): 56-64. [9]胡运橙, 单 洪, 马 涛. 异构无线传感器网络组密钥管理方案设计[J]. 计算机工程, 2011, 37(1): 149-150, 153. [10]Blom R. An Optimal Class of Symmetric Key Generation Systems[C]//Proc. of EUROCRYPT’84. New York, USA: Springer-Verlag, 1984: 335-338. [11]Chan Haowen, Perrig A. Pike: Peer Intermediaries for Key Establishment in Sensor Networks[C]//Proc. of IEEE Conference on Computer Communications. [S. l.]: IEEE Press, 2005: 524-535.
|