[1]AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y, et al. Wireless sensor networks: a survey[J]. Computer Networks, 2002, 38(4): 393-422.[2]MAO GUOQIANG, FIDAN B, ANDERSON B D O. Wireless sensor network localization techniques[J]. IEEE Computer Networks, 2007, 51(1):2529-2523.[3]YICK J, MUKHERJEE B, GHOSAL D. Wireless sensor network survey[J]. IEEE Computer Networks, 2008, 52(12): 2292-2300.[4]NEUMAN B C, TSO T. Kerberos: an authentication service for computer net-works[J]. IEEE Communications, 1994, 32(9):33-38.[5]ESCHENAUER L, GLIGOR V D. A key management scheme for distributed sensor networks[C]// Proceedings of the 9th ACM Conference on Computer and Communications Security. New York: ACM Press, 2002:41-47.[6]CHAN H, PERRIG A, SONG D. Random key predistribution schemes for sensor networks[C]// Proceedings of IEEE 2003 Symposium on Security and Privacy. Washington, DC:IEEE Computer Society, 2003:197-213.[7]BLUNDO C, SANTIX A D, HERZBERG A, et al. Perfectly-secure key distribution for dynamic conferences[C]// Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology. Berlin: Spring-Verlag, 1992: 471-486.[8]LIU DONGGANG, NING PENG. Location-based pairwise key establishments for static sensor networks[c]// Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2003:72-82.[9]HUANG D, MEHTA M, MEDHI D, et al. Location aware key management scheme for wireless sensor networks[C]// Proceedings of the ACM Workshop on Security for Ad Hoc and Sensor Networks. New York: ACM Press, 2004:29-42. [10]DU W L, DENG J, HAN Y S, et al. A key predistribution scheme for sensor networks using deployment knowledge[C]// Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communication Societies. Washington, DC: IEEE Computer Society, 2004:62-77.[11]LIU D G, NING P. Establishing pairwise keys in distributed sensor networks[C]// Proceedings of the 10th ACM Conference on Computer and Communication Security. New York: ACM Press, 2003:52-61.[12]方赵林,谢红军.基于可转换三元多项式的WSN密钥管理方案[J]. 计算机科学, 2011,38(10A):56-58. |