1 |
W. Du, J. Deng. Y. Han, P. Varshney, J. Katz, and A. Khalili, ''A pairwise key
predistribution scheme for wireless sensor networks." ACM Transaction on Information and System Security, vol. 8,no. 2, pp. 228-258, Feb 2005
DOI
|
2 |
L. Eschenauer and V.D. Gligor. "A key-management scheme for distributed
sensor networks," Proceedings of the 9th ACM Conference on Computer and
Communication Security (CCS" 02). pp. 41-47, Nov. 2002
DOI
|
3 |
W. Du. J. Deng, Y.S. Han. S. Chen, and P. Varshney. "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge ," Proceedings of IEEE INFOCOM, pp. 586-597, Mar. 2004
|
4 |
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks." Proceedings of IEEE Symposium on Security and Privacy, pp.197-215, May 2003
DOI
|
5 |
D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03), pp. 52-61. Oct. 2003
DOI
|
6 |
w. Du, J. Deng, YS. Han, S. Chen, and P.Varshney, "A key predistribution scheme for sensor networks using deployment knowledge," IEEE Transaction on
Dependable Secure Computing, vol. 3, no.1. pp. 62-77, Jan.-Mar 2006
DOI
ScienceOn
|
7 |
D. Huang. M. Mehta, D. Medhi, and L. Harn, "Location-aware key management
scheme for wireless sensor networks," Proceedings of the 2nd ACM workshop on Security of ad-hoc and sensor networks (SASN'04), pp. 29-42, Oct. 2004
DOI
|
8 |
D. Huang, M. Mehta, A. Liefvoort, and D. Medhi, ''Modeling pairwise key establishment for random key predistribution in large-scale sensor networks," IEEE/ ACM Transaction on Networking, vol. 15, no. 5, pp. 1204-1215, Oct 2007
DOI
ScienceOn
|
9 |
D. Liu and P. Ning, "Location-based pairwise key establishments for relatively
static sensor networks," in Proc. 1st ACM workshop onSecurity of ad-hoc and
sensor networks (SASN'03), pp. 72-82,Nov. 2003
|
10 |
J. Lee, T. Kwon, and J. Song, "Locationaware key management using multi-layer grids for wireless sensor networks," Applied Cryptography and Network Security ACNS'06, LNCS 3989, pp.390-404, 2006
|