[8] |
ZHANG Y T , YANG J , LI W J , et al. An authentication scheme for locating compromised sensor nodes in WSN[J]. Journal o Network and Computer Applications, 2010,33:50-62.
|
[9] |
ELTOWEISSY M , HEYDARI H , MORALES L , et al. Combinatorial optimization of key management in group communications[J]. Journal of Network and Systems Management, 2004,12(1):33-50.
|
[10] |
ELTOWEISSY M , MOHARRUM M , MUKKAMALA R . Dynamic key management in sensor networks[J]. IEEE Communications Maga-zine, 2006,44(4):122-130.
|
[11] |
TIAN B M , HAN S , HU J K , et al. A mutual-healing key distribution scheme in wireless sensor networks[J]. Journal of Networks and Computer Applications, 2011,34:80-88.
|
[12] |
李林春, 李建华, 潘军 . 无线传感器网络中具有撤销功能的自愈组密钥管理方案[J]. 通信学报, 2009,30(12):12-17. LI L C , LI J H , PAN J . Self-healing group key management scheme with revocation capability for wireless sensor networks[J]. Journal on Communications, 2009,30(12):12-17.
|
[13] |
RAAZI S M K , LEE H , LEE S , et al. MUQAMI+:a scalable and locally distributed key management scheme for clustered sensor networks[J]. Annals of Telecommunications, 2010,65(1/2):101-116.
|
[14] |
LO C , HUANG C , CHEN S . An efficient and scalable EBS-based batch rekeying scheme for secure group communications[A]. Proc of IEEE Military Communications Conference[C]. Taiwan,China, 2009.1-7.
|
[15] |
YOUNIS M F , GHUMMAN K , ELTOWEISSY M . Location-Aware combinatorial key management scheme for clustered sensor net-works[J]. IEEE Trans on Parallel and Distributed Systems, 2006,17(8):865-882.
|
[16] |
孔繁瑞, 李春文 . 无线传感器网络动态密钥管理方法[J]. 软件学报, 2010,21(7):1679-1691. KONG F R , LI C W . Dynamic key management scheme for wireless sensor network[J]. Journal of Software, 2010,21(7):1679-1691.
|
[17] |
ELTOWEISSY M , MOHARRUM M , MUKKAMALA R . Dynamic key management in sensor networks[J]. IEEE Communications Maga-zine, 2006,44(4):122-130.
|
[18] |
ZHANG W S , CAO G H . Group rekeying for filtering false data in sensor networks:a predistribution and local collaboration-based ap-proach[A]. Proc of the IEEE INFOCOM 2005[C]. Piscataway, 2005.503-514.
|
[19] |
曾玮妮, 林亚平, 余建平 等. 传感器网络中基于随机混淆的组密钥管理机制[J]. 软件学报, 2013,24(4):873-886. ZENG W N , LIN Y P , YU J P , et al. Group key management based on random perturbation in wireless sensor networks[J]. Journal of Soft-ware, 2013,24(4):873-886.
|
[1] |
任丰原, 黄海宁, 林闯 . 无线传感器网络[J]. 软件学报, 2003,14(7):1282-1291. REN F Y , HUANG H N , LIN C . Wireless sensor networks[J]. Journal of Software, 2003,14(7):1282-1291.
|
[2] |
PERRIG A , SZEWCZYK R , TYGAR J D , et al. SPINS:security protocols for sensor network[J]. Wireless Networks, 2002,8(5):521-534.
|
[20] |
DU W L , DENG J , HAN Y S , et al. A key management scheme for wireless sensor networks using deployment knowledge[A]. Proc of the IEEE INFOCOM 2004[C]. Piscataway, 2004.586-597.
|
[3] |
ESCHENAUER L , GLIGOR V D . A key-management scheme for distributed sensor networks[A]. Proc of the 9th ACM Conf.on Com-puter and Communications Security[C]. Washington, 2002.41-47.
|
[4] |
CHAN H W , PERRIG A , SONG D . Random key predistribution schemes for sensor networks[A]. Proc 2003 IEEE Symp on Security and Privacy[C]. 2003.197-214.
|
[5] |
DU W L , DENG J , et al. A pairwise key pre-distribution scheme for wireless sensor networks[A]. Proc 19th ACM Conf on Computer and Communications Security[C]. Washington, 2003.42-51.
|
[6] |
LIU D G , NING P . Location-based pairwise key establishments for static sensor networks[A]. Proc 1st ACM Workshop on Security of Ad Hoc and Sensor Networks[C]. Fairfax,Virginia, 2003.72-82.
|
[7] |
MI Q , STANKOVIC J , STOLERU R . Practical and secure localization and key distribution for wireless sensor networks[J]. works, 2012,10:946-961.
|