[1]
|
H.-X. Jing and X.-D. Hu, “A Location Based Key Management Scheme for Wireless Networks,” Communication Technology, Vol. 11, No. 40, 2007, pp. 311-313.
|
[2]
|
L. M. Yu, J. Z. Li, Y. Chen, et al., “Wireless Sensor Networks,” Tsinghua University Press, Beijing, 2005.
|
[3]
|
X. W. Zhou and B. P. Qin, “Scalable Session Key Construction Protocol for Wireless Sensor Networks. Wireless Sensor Networks and Security,” National Defense Industry Press, Beijing, 2007.
|
[4]
|
L. Eschenauer and V. D. Gligor, “A Key Management Scheme for Distributed Sensor Networks,” The 9th ACM CCS, Washington DC, 2002, pp. 41-47.
|
[5]
|
S. Zhu, S. Setia and S. Jajodia, “LEAP: Efficient Security Mechanism for Large-Scale Distributed Sensor Networks,” Procceedings of the 10th ACM Conference on Computer and Communications Security, New York, 14 June 2004, pp. 62-72.
|
[6]
|
M. Eltoweissy, M. Moharrum and R. Mukkamala, “Dynamic Key Management in Sensor Networks,” IEEE Communications Magazine, Vol. 44, No. 4, 2006, pp. 122-130. doi:10.1109/MCOM.2006.1632659
|
[7]
|
H. Chan, A. Perrig and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Procceedings of the 2003 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, 2003, pp. 197-213.
|
[8]
|
H.-X. Jing and X.-D. Hu, “A Location Based Key Management Scheme for Wireless Networks,” Communication Technology, Vol. 11, No. 40, 2007, pp. 311-313.
|
[9]
|
B. Shen, S. Y. Zhang and Y. P. Zhong, “Hierarchical Routing Protocol for Wireless Sensor Networks,” Journal of Software, Vol. 17, No. 7, 2006, pp. 1588-1600. doi:10.1360/jos171588
|
[10]
|
E.-O. Blaβ and M. Zitterbart, “An Efficient Key Establishment Scheme for Secure Aggregating Sensor Networks,” Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, Taipei, 2006, pp. 303-310.
|