참고문헌
- A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J. D. Tygar, 'Spins: Security protocols for sensor networks,' in Proceedings of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), Rome, Italy, July 2001, pp. 189-199
- S. Zhu, S. Setia, and S. Jajodia, 'LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,' in ACM Computer and Communications Security (CCS) 2003, October 2003 https://doi.org/10.1145/948109.948120
- Laurent Eschenauer, 'A Key-Management Scheme for Distributed Sensor Networks,' ACM CCS 2002 https://doi.org/10.1145/586110.586117
- J.Spence, 'The Strange Logic of Random Graphs, Algorithms and Combinatorics 22,' Springer-Verlag 2000
- Haowen Chan,Adrian Perrig, Dawn Song, 'random key pre-distribution schemes for sensor networks,' IEEE symposium on Research in Security and Privacy, 2003
- W.Du, J. Deng, Y. S. Han, and P. K. Varshney, 'A pairwise key predistribution scheme for wireless sensor networks,' in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington, DC, USA, October 27-31 2003, pp. 42-51 https://doi.org/10.1145/948109.948118
- D. Liu and P. Ning, 'Establishing pairwise keys in distributed sensor networks,' in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington, DC, USA, October 27-31, 2003, pp. 52-61 https://doi.org/10.1145/948109.948119
- R. Blom, 'Non-Public Key Distribution,' in Advances in Cryptology - CRYPTO 1982, August 1982
- W.Du, J, Deng, Y.S. Han, S. Chen, and P.K. Varshney, 'A key management scheme for wireless sensor networks using deployment knowledge,' in Proc. of IEEE INFOCOM, 2004 https://doi.org/10.1109/INFCOM.2004.1354530
- C.J. Colbourn, J.H. Dinitz and D.R. Stinson, 'quorum systems constructed from combinatorial designs,' Information and Computation, pp.160-173, 2001 https://doi.org/10.1006/inco.2001.3044
- S.D. Lang and L.J. Mao, 'A torus quorum protocol for distributed mutual exclusion,' in Proc. of the 10th Internat. Conference on Parallel and Distributed Computing and Systems, pp. 635-638, 1998
- W.S. Luk and T.T. Wong, 'Two new quorum based algorithms for distributed mutual exclusion,' in Proc. of International Conference on Distributed Computing Systems, pp. 100-106, 1997 https://doi.org/10.1109/ICDCS.1997.597862
-
M. Maekawa, 'A
\surd N algorithm for mutual exclusion in decentralized systems,' ACM Transactions on Computer Systems, 145-159, 1985 https://doi.org/10.1145/214438.214445 - Y.C. Tseng, C.S. Hsu and T.Y. Hsieh, 'Power-saving protocols for IEEE 802.11-based multi-hop ad hoc networks,' in Proc. of IEEE INFOCOM, 2002 https://doi.org/10.1109/INFCOM.2002.1019261
- W. Diffie and M. E. Hellman, 'New directions in cryptography,' IEEE Transactions on Information Theory, vol. 22, pp. 44-654, November 1976 https://doi.org/10.1109/TIT.1976.1055638
- R. L. Rivest, A. Shamir, and L. M. Adleman, 'A method for obtaining digital signatures and public-key cryptosystems,' ommunications of the ACM, vol. 21, no. 2, pp. 120-126, 1978 https://doi.org/10.1145/359340.359342