1 |
L. Eschenauer and V.D. Gligor, “A key management scheme for distributed sensor networks,” Proc. of the 9th ACM CCS'02, pp.41-47, 2002.
DOI
|
2 |
H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” IEEE Symposium on Research in Security and Privacy, pp.197-213, 2003.
|
3 |
D. Huang, M. Mehta, D. Medhi, L. Harn, “Location-aware key management scheme for wireless sensor networks,” Proc. of ACM Workshop Security of Ad Hoc and Sensor Networks, 2004.
DOI
|
4 |
A. Durresi, V. Bulusu, V. Paruchuri, L. Barolli, “SCON: Secure management of continuity in sensor networks,” Computer Communications 29, 2458-2468, 2006.
DOI
ScienceOn
|
5 |
C. Blundo, A. De Santis, Amir Herzberg, S. Kutten, U. Vaccaro, and M. Yung, “Perfectly-secure key distribution for dynamic conferences,” In Advances in Cryptology, CRYPTO'92, LNCS 740, pp.471-486, 1993.
|
6 |
W. Du, J. Deng, Y. S. Han, S. Chen, and P. Varshney, “A key management scheme for wireless sensor networks using deployment knowledge,” Proc. of IEEE INFOCOM, 2004.
DOI
|
7 |
M. Wen, Y. Zheng, W. Ye, Ke. Chen, W. Qui, “A key management protocol with robust continuity for sensor networks,” Computer Standards & Interfaces 31 642-647, 2009.
DOI
ScienceOn
|
8 |
I. Doh, K. Chae, “A key setup mechanism utilizing dual key strings for secure sensor communication,” Proc. of 9th International Conference on Advanced Communication Technology(ICACT), 2007.
DOI
|
9 |
Z. Yu and Y. Guan, “A Robust Group-based Key Management Scheme for Wireless Sensor Networks,” IEEE Communications Society, WCNC 2005.
|
10 |
B. Lai, D. Hwang, S. Kim, and I. Verbauwhede, “Reducing radio energy consumption of key management protocols for wireless sensor networks,” Proc. of ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED'04), pp.351-356, 2004.
DOI
|
11 |
D. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks,” Proc. of 10th ACM CCS'03, pp.52-61, 2003.
DOI
|
12 |
Seyit A. Camtepe, Bulent Yene, “Key Distribution Mechanism for Wireless Sensor Networks : a Survey,” TR-05-07 Rensselaer Polytechnic Institute, Computer Science Department, March, 2005.
|
13 |
S. Zhu, S. Setia, S. Jajodia, “LEAP: efficient security mechanisms for large-scale distributed sensor networks,” Proc. of the 10th ACM Conf. on Computer and Communications Security (CCS'03), pp.62-72, 2003.
DOI
|
14 |
D.W. Carman, P.S. Kruus, and B.J.Matt, “Constraints and approaches for distributed sensor network security,” Technical report, NAI Labs, 2000.
|
15 |
R. Blom, “An optimal class of symmetric key generation systems. Advances in Cryptology,” Proc. of EUROCRYPT'84, LNCS 209, 1985.
|
16 |
W. Du, J. Deng, Y. S. Han, and P. Varshney, “A pairwise key predistribution scheme for wireless sensor networks,” Proc. of 10th ACM CCS'03, 2003.
DOI
|