[1]Giruka V C, Singhal M, Royalty J, et al. Security in Wireless Sensor Networks[J]. Journal of Wireless Communications and Mobile Computing, 2008, 8(1): 1-24.
[2]Xiao Y, Rayi V K, Sun B, et al. A Suvery of Key Management Schemes in Wireless Sensor Networks[J]. Journal of Computer Communications, Elsevier, 2007, 30(11-12): 2314-2341.
[3]Johnson C L, Victor L, Kirk H W, et al. Key Management Issues in Wireless Sensor Networks: Current Protocols and Future Developments[J]. IEEE Wireless Communications, 2007, 14(5): 76-84.
[4]Malan D, Welsh M, Smith M D. A Public-key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography [C]//Proceedings of 1st IEEE International Conference Communications and Networks (SECON). Santa Clara: IEEE, 2004: 71-80.
[5]Du X, Xiao Y, Song C, et al. A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks [C]//IEEE International Conference on Communications (ICC'07). Glasgow: IEEE, 2007: 3407-3412.
[6]丁勇. 一种用椭圆曲线密码构建的传感网络密钥管理方案[J]. 西安电子科技大学学报, 2008, 35(4): 739-742.
Ding Yong. Key Management Scheme for WSN Using ECC[J]. Journal of Xidian University, 2008, 35(4): 739-742.
[7]Liu D, Ning P. Establishing Pairwise Keys in Distributed Sensor Networks [C]//Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03). Washington: ACM, 2003: 52-61.
[8]Traynor P, Kumar R, Choi H, et al. Efficient Hybird Security Mechanisms for Heterogeneous Sensor Networks[J]. IEEE Trans on Moblie Computing, 2007, 6(6): 663-677.
[9]Jolly G, Kusu M, Kokate P. A Hicrarchical Key Management Method for Low-energy Wireless Sensor Networks [C]//Proceedings of the 8th IEEE Symposium on Computers and Communication (ISCC). Turkey: IEEE, 2003: 335-340.
[10]Du X, Xiao Y, Guizani M, et al. An Efficient Key Management Scheme for Heterogeneous Sensor Networks[J]. Ad Hoc Networks, Elsevier, 2007, 5(1): 24-34.
[11]Liu Z, Ma J, Huang Q, et al. Asymmetric Key Predistribution Scheme for Sensor Networks[J]. IEEE Trans on Wireless Communications, 2009, 8(3): 1366-1372.
[12]Zhu S, Jajodia S. LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks[C]//Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03). Washington: ACM, 2003: 62-72.
[13]Eltoweissy M, Moharrum M, Mukkamala R. Dynamic Key Management in Sensor Networks[J]. IEEE Communications Magazine, 2006, 44(4): 122-130.
[14]Eschenauer L, Gligor V. A Key Management Scheme for Distributed Sensor Networks[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security. New York: ACM Press, 2002: 41-47.
[15]Du W, Deng J, Han Y S, et al. A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks[C]//Proceedings of the 10th ACM Conference on Computer and Communications Security. New York: ACM Press, 2003: 42-51.
[16]Liu D, Ning P. Improving Key Pre-distribution with Deployment Knowledge in Static Sensor Networks[J]. ACM Trans on Sensor Networks, 2005, 6(1): 1-19.
[17]Anderson R, Chan H, Perrig A. Key Infection: Smart Trust for Smart Dust[C]//Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004). Berlin: IEEE, 2004: 206-215.
[18]Chan H, Perrig A, Song D. Random Key Predistribution Schemes for Sensor Networks[C]//IEEE Symposium on Security and Privacy. Berkeley: IEEE, 2003: 197-213.
[19]Kuo C, Luk M, Negi R, et al. Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes[C]//SenSys'07. Sydney: IEEE, 2007: 233-246.
[20]Klonowski M, Kutylowski M, Ren M, et al. Forward-secure Key Evolution in Wireless Sensor Networks[C]//CANS 2007, LNCS 4856. New York: Springer-Verlag, 2007: 102-120. |