Journal on Communications ›› 2013, Vol. 34 ›› Issue (12): 71-78.doi: 10.3969/j.issn.1000-436X.2013.12.008
• Papers • Previous Articles Next Articles
Zhi-tao GUAN1,Yue XU1,Jun WU2
Online:
2013-12-25
Published:
2017-07-05
Supported by:
Zhi-tao GUAN,Yue XU,Jun WU. Ternary polynomial based key management scheme for wireless sensor network[J]. Journal on Communications, 2013, 34(12): 71-78.
[8] | ZHANG Y T , YANG J , LI W J , et al. An authentication scheme for locating compromised sensor nodes in WSN[J]. Journal o Network and Computer Applications, 2010,33:50-62. |
[9] | ELTOWEISSY M , HEYDARI H , MORALES L , et al. Combinatorial optimization of key management in group communications[J]. Journal of Network and Systems Management, 2004,12(1):33-50. |
[10] | ELTOWEISSY M , MOHARRUM M , MUKKAMALA R . Dynamic key management in sensor networks[J]. IEEE Communications Maga-zine, 2006,44(4):122-130. |
[11] | TIAN B M , HAN S , HU J K , et al. A mutual-healing key distribution scheme in wireless sensor networks[J]. Journal of Networks and Computer Applications, 2011,34:80-88. |
[12] | 李林春, 李建华, 潘军 . 无线传感器网络中具有撤销功能的自愈组密钥管理方案[J]. 通信学报, 2009,30(12):12-17. LI L C , LI J H , PAN J . Self-healing group key management scheme with revocation capability for wireless sensor networks[J]. Journal on Communications, 2009,30(12):12-17. |
[13] | RAAZI S M K , LEE H , LEE S , et al. MUQAMI+:a scalable and locally distributed key management scheme for clustered sensor networks[J]. Annals of Telecommunications, 2010,65(1/2):101-116. |
[14] | LO C , HUANG C , CHEN S . An efficient and scalable EBS-based batch rekeying scheme for secure group communications[A]. Proc of IEEE Military Communications Conference[C]. Taiwan,China, 2009.1-7. |
[15] | YOUNIS M F , GHUMMAN K , ELTOWEISSY M . Location-Aware combinatorial key management scheme for clustered sensor net-works[J]. IEEE Trans on Parallel and Distributed Systems, 2006,17(8):865-882. |
[16] | 孔繁瑞, 李春文 . 无线传感器网络动态密钥管理方法[J]. 软件学报, 2010,21(7):1679-1691. KONG F R , LI C W . Dynamic key management scheme for wireless sensor network[J]. Journal of Software, 2010,21(7):1679-1691. |
[17] | ELTOWEISSY M , MOHARRUM M , MUKKAMALA R . Dynamic key management in sensor networks[J]. IEEE Communications Maga-zine, 2006,44(4):122-130. |
[18] | ZHANG W S , CAO G H . Group rekeying for filtering false data in sensor networks:a predistribution and local collaboration-based ap-proach[A]. Proc of the IEEE INFOCOM 2005[C]. Piscataway, 2005.503-514. |
[19] | 曾玮妮, 林亚平, 余建平 等. 传感器网络中基于随机混淆的组密钥管理机制[J]. 软件学报, 2013,24(4):873-886. ZENG W N , LIN Y P , YU J P , et al. Group key management based on random perturbation in wireless sensor networks[J]. Journal of Soft-ware, 2013,24(4):873-886. |
[1] | 任丰原, 黄海宁, 林闯 . 无线传感器网络[J]. 软件学报, 2003,14(7):1282-1291. REN F Y , HUANG H N , LIN C . Wireless sensor networks[J]. Journal of Software, 2003,14(7):1282-1291. |
[2] | PERRIG A , SZEWCZYK R , TYGAR J D , et al. SPINS:security protocols for sensor network[J]. Wireless Networks, 2002,8(5):521-534. |
[20] | DU W L , DENG J , HAN Y S , et al. A key management scheme for wireless sensor networks using deployment knowledge[A]. Proc of the IEEE INFOCOM 2004[C]. Piscataway, 2004.586-597. |
[3] | ESCHENAUER L , GLIGOR V D . A key-management scheme for distributed sensor networks[A]. Proc of the 9th ACM Conf.on Com-puter and Communications Security[C]. Washington, 2002.41-47. |
[4] | CHAN H W , PERRIG A , SONG D . Random key predistribution schemes for sensor networks[A]. Proc 2003 IEEE Symp on Security and Privacy[C]. 2003.197-214. |
[5] | DU W L , DENG J , et al. A pairwise key pre-distribution scheme for wireless sensor networks[A]. Proc 19th ACM Conf on Computer and Communications Security[C]. Washington, 2003.42-51. |
[6] | LIU D G , NING P . Location-based pairwise key establishments for static sensor networks[A]. Proc 1st ACM Workshop on Security of Ad Hoc and Sensor Networks[C]. Fairfax,Virginia, 2003.72-82. |
[7] | MI Q , STANKOVIC J , STOLERU R . Practical and secure localization and key distribution for wireless sensor networks[J]. works, 2012,10:946-961. |
[1] | Ling MA, Qiliang FAN, Ting XU, Guanchen GUO, Shenglin ZHANG, Yongqian SUN, Yuzhi ZHANG. Scheduling framework based on reinforcement learning in online-offline colocated cloud environment [J]. Journal on Communications, 2023, 44(6): 90-102. |
[2] | Shengxing YU, Zekai CHEN, Zhong CHEN, Ximeng LIU. DAGUARD: distributed backdoor attack defense scheme under federated learning [J]. Journal on Communications, 2023, 44(5): 110-122. |
[3] | Yu DONG, Youpeng ZHANG. Conflict evidence combination method based on clustering weighting [J]. Journal on Communications, 2023, 44(3): 157-163. |
[4] | Yue ZHAO, Zan LI, Bing LI, Benjian HAO. TDoA localization-refused area analysis and node placement strategy research [J]. Journal on Communications, 2023, 44(1): 1-13. |
[5] | Wei JIN, Fenghua LI, Mingjie YU, Yunchuan GUO, Ziyan ZHOU, Liang FANG. HDFS-oriented cryptographic key resource control mechanism [J]. Journal on Communications, 2022, 43(9): 27-41. |
[6] | Jing ZHAO, Jun LI, Chun LONG, Wei WAN, Jinxia WEI, Kai CHEN. Unsupervised detection method of RoQ covert attacks based on multilayer features [J]. Journal on Communications, 2022, 43(9): 224-239. |
[7] | Feng ZHOU, Baosheng ZHANG, Wenbo ZHANG. Space-time division cluster DoA estimation algorithm based on UWA spread spectrum signal [J]. Journal on Communications, 2022, 43(8): 100-108. |
[8] | Ao LI, Cong FENG, Yutong NIU, Shibiao XU, Yingtao ZHANG, Guanglu SUN. Multiview clustering method for view-unaligned data [J]. Journal on Communications, 2022, 43(7): 143-152. |
[9] | Cuiran LI, Xuejie WANG, Jianli XIE, Anqi LYU. Routing algorithm for railway monitoring linear WSN based on improved PSO [J]. Journal on Communications, 2022, 43(5): 155-165. |
[10] | Rong QIAN, Jianting XU, Kejun ZHANG, Hongyu DONG, Fangyuan XING. Research on HMM based link prediction method in heterogeneous network [J]. Journal on Communications, 2022, 43(5): 214-225. |
[11] | Yimin MAO, Dejin GAN, Liefa LIAO, Zhigang CHEN. Parallel division clustering algorithm based on Spark framework and ASPSO [J]. Journal on Communications, 2022, 43(3): 148-163. |
[12] | Xiujuan DU, Lijuan WANG, Jingping LIU, Long JIN. Ranging localization method for nodes in underwater wireless sensor network based on zeroing neural dynamics [J]. Journal on Communications, 2022, 43(10): 177-185. |
[13] | Zhongping ZHANG, Sen LI, Weixiong LIU, Shuxia LIU. Outlier detection algorithm based on fast density peak clustering outlier factor [J]. Journal on Communications, 2022, 43(10): 186-195. |
[14] | Huiqin WANG, Wenbin HOU, Qingbin PENG, Minghua CAO, Rui HUANG, Ling LIU. Step-by-step classification detection algorithm of SPPM based on K-means clustering [J]. Journal on Communications, 2022, 43(1): 161-171. |
[15] | Qiang HU, Jiaji SHEN, Guanghui JING, Junwei DU. Service clustering method based on description context feature words and improved GSDMM model [J]. Journal on Communications, 2021, 42(8): 176-187. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|