[1]CHEN X, MAKKI K, YEN K, et al. Sensor network security: a survey[J]. IEEE Communications Surveys and Tutorials, 2009,11(2): 52-73.[2]苏忠,林闯,封富君,等.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231.[3]许力. 无线传感器网络的安全和优化[M]. 北京: 电子工业出版社, 2010.[4]JOLLY G, KUSCU M C, KOKATE P, et al. Low-energy key management protocol for wireless sensor networks[C]// The 8th IEEE International Symposium on Computers and Communications Proceedings. Washington, DC: IEEE Computer Society, 2003: 335-340.[5]ZHU SEN-CUN, SETIA S. LEAP: Efficient security mechanisms for large-scale distributed sensor networks[C]// Processings of the 10th ACM Conference on Computer and Communications Security. New York: ACM, 2003: 62-72.[6]CAMTEPE S A, YENER B. Combinatorial design of key distribution mechanisms for wireless sensor networks[C]// Processings of the Computer Security-ESORICS. Berlin: Springer-Verlag, 2004: 293-308.[7]沈金波,许力,张美平,等.基于簇的无线传感器网络密钥预分配方案[J].武汉大学学报:理学版,2009,55(1): 117-120.[8]REZA A, ARASH R-M, ZINE-EDDINE A. A key management scheme for cluster based wireless sensor networks[C]// Processings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. Washington, DC: IEEE Computer Society, 2008:222-227.[9]柳亚男,王箭,杜贺.无线传感器网络门限密钥共享模型[J].电子与信息学报,2011,33(8): 1913-1918.[10]GAUBATZ G, KAPS J P, SUNAR B. Public keys cryptography in sensor networks[C]// Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks. New York: ACM, 2004: 2-18.[11]GURA N, PATEL A, WANDER A, et al. Comparing elliptic curve cryptography and RSA on 8-bit CPUs[C]// Proceedings of the 6th International Conference on Ad-Hoc, Mobile and Wireless Networks. New York:ACM Press, 2007: 153-171.[12]OLIVEIRA L, SCOTT M, LOPZ J, et al. TinyPBC: Pairings for authentication identity-based non-interactive key distribution in sensor networks[C]// 5th International Conference on Networked Sensing Systems. Washington, DC: IEEE Computer Society, 2008: 173-180.[13]ZHANG YAN-CHAO, LIU WEI, LOU WEN-JING, et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks[J].IEEE Journal on Selected Areas in Communications, 2006,24(2):247-260.[14]柯召,魏万迪.组合论[M].北京:科学出版社,1981.[15]BONEH D, FRANKLIN M. Identify-based encryption from the Weil pairing[J]. Journal of Computing, 2003, 32(3):586-615.[16]DU WEN-LIANG, DENG JING, YUNGHSIANG S, et al. A key management scheme for wireless sensor networks using deployment knowledge[C]// Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. Washington, DC: IEEE Computer Society, 2004:7-11. |