参考文献
[1]Ramanathan R,Redi J.A Brief Overview of Mobile Ad Hoc Networks:Challenges and Directions[J].IEEE Communications Magazine,2002,40(5):20-26.
[2]Zhou Lidong,Hass Z J.Securing Ad Hoc Networks[J].IEEE Network,1999,13(6):24-30.
[3]Kong Jiejun,Petros Z,Luo Haiyun,et al.Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks[C]//Proceedings of the 9th International Conference on Network Protocols.Washington D.C.,USA:IEEE Press,2001:251-
260.
[4]Luo Haiyun,Kong Jiejun,Zerfos P,et al.Ubiquitous and Robust Access Control for Mobile Ad Hoc Net-works[J].ACM Transactions on Networking,2004,12(6):1049-1063.
[5]Khalili A,Katz J,Arbaugh W A.Toward Secure Key Distribution in Truly Ad Hoc Networks[C]//Pro-ceedings of International Symposium on Applications and Internet.Washington D.C.,USA:IEEE Press,2003:342-346.
[6]Deng Hongmei,Agrawal D.TIDS:Threshold and Identity-based Security Scheme for Wireless Ad Hoc Networks[J].Ad Hoc Networks,2004,2(3):291-307.
[7]章睿,刘吉强,赵佳.一种基于ID的传感器网络密钥管理方案[J].电子与信息学报,2009,31(4):929-932.
(下转第142页)
(上接第136页)
[8]刘伟,罗嵘,杨华中.一种轻量级的无线传感器网络密钥建立协议[J].电子与信息学报,2010,32(4):869-873.
[9]李慧贤,庞辽军,王育民.适合Ad Hoc网络无需安全信道的密钥管理方案[J].通信学报,2010,31(1):112-117.
[10]韩磊,刘吉强,韩臻,等.移动Ad Hoc网络预分配非对称密钥管理方案[J].通信学报,2012,33(10):26-34.
[11]Ritter H,Winter R,Schiller J.A Partition Detection System for Mobile Ad-hoc Networks[C]//Proceedings of the 1st IEEE International Conference on Sensing.Washington D.C.,USA:IEEE Press,2004:489-497.
[12]Shamir A.How to Share a Secrete[J].Communications of the ACM,1979,22(11):612-613.
[13]Simmons G J.How to (Really) Share a Secrete[EB/OL].(2007-12-16).http://csdl2.computer.arg/.
[14]葛蒙,赵曦滨,林国恩.适用于移动自组织网的鲁棒性密钥管理[J].清华大学学报:自然科学版,2008,33(41):1194-1197.
[15]许俊杰,曾贵华.基于椭圆曲线的Ad Hoc网络门限身份认证方案[J].计算机工程与应用,2007,43(17):1045-1048.
编辑顾逸斐 |