[1]
雷凤宇, 崔国华.无线传感器网络密钥管理研究[D]. 武汉:华中科技大学, 2010.
[2]
ESCHENAUER L, GLIGOR V D. A key-management scheme for distributed sensor networks[C]// CCS02: Proceedings of the 9th ACM Conference on Computer and Communications Security. New York: ACM, 2002:18-22.
[3]
CHAN H, PERRIG A, SONG D. Random key-predistribution schemes for sensor networks[C]// SP03: Proceedings of the 2003 IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 2003:197-213.
[4]
PRZYDATEK B, SONG D, PERRIG A. SIA: Secure information aggregation in sensor networks[C]// SenSys03: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems. New York: ACM,2003:255-265.
[5]
DURRESI A, BULUSU V, PARUCHURS V. SCON: Secure management of continuity in sensor networks[J]. Computer Communications, 2006, 29(13/14): 2458-2468.
[6]
AMTEPE S A, YENER B. Combinatorial design of key distribution mechanisms for wireless sensor networks[J]. IEEE/ACM Transactions on Networking, 2007, 15(2): 346-358.
[7]
LEE J Y, STINSON D R. On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs[J]. ACM Transactions on Information and System Security, 2008,11(2):1-35.
[8]
SUSHMITA L, BIMAL R. Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks[J]. ACM Transactions on Sensor Networks, 2009, 6(1): 4.
[9]
ERDS P, RNYI A. On the evolution of random graphs[EB/OL]. [2011-06-01]. http://www.renyi.hu/~p_erdos/1961-15.pdf.
[10]
PERRIG A, SZEWCZYK R, WEN V, et al. SPINS: Security protocols for sensor networks[J]. Wireless Networks, 2001,8(5): 521-534.
[11]
BLACKBURN S R, ETZION T, MARTIN K M, et al. Efficient key predistribution for grid-based wireless sensor networks[C]//ICITS08: Proceedings of the 3rd International Conference on Information Theoretic Security. Berlin: Springer-Verlag, 2008: 54-69.
[12]
WU JIANG, STINSON D R. Minimum node degree and kappa-connectivity for key predistribution schemes and distributed sensor networks[C]// Proceedings of the First ACM Conference on Wireless Network Security.[S.l.]:IEEE, 2008:119-124. |