References
- D.W. Carman, P.S. Kruus, and B.J.Matt, “Constraints and approaches for distributed sensor network security,” Technical report, NAI Labs, 2000.
- R. Blom, “An optimal class of symmetric key generation systems. Advances in Cryptology,” Proc. of EUROCRYPT'84, LNCS 209, 1985.
- L. Eschenauer and V.D. Gligor, “A key management scheme for distributed sensor networks,” Proc. of the 9th ACM CCS'02, pp.41-47, 2002. https://doi.org/10.1145/586110.586117
- H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” IEEE Symposium on Research in Security and Privacy, pp.197-213, 2003.
- W. Du, J. Deng, Y. S. Han, and P. Varshney, “A pairwise key predistribution scheme for wireless sensor networks,” Proc. of 10th ACM CCS'03, 2003. https://doi.org/10.1145/948109.948118
- D. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks,” Proc. of 10th ACM CCS'03, pp.52-61, 2003. https://doi.org/10.1145/948109.948119
- C. Blundo, A. De Santis, Amir Herzberg, S. Kutten, U. Vaccaro, and M. Yung, “Perfectly-secure key distribution for dynamic conferences,” In Advances in Cryptology, CRYPTO'92, LNCS 740, pp.471-486, 1993.
- W. Du, J. Deng, Y. S. Han, S. Chen, and P. Varshney, “A key management scheme for wireless sensor networks using deployment knowledge,” Proc. of IEEE INFOCOM, 2004. https://doi.org/10.1109/INFCOM.2004.1354530
- Z. Yu and Y. Guan, “A Robust Group-based Key Management Scheme for Wireless Sensor Networks,” IEEE Communications Society, WCNC 2005.
- B. Lai, D. Hwang, S. Kim, and I. Verbauwhede, “Reducing radio energy consumption of key management protocols for wireless sensor networks,” Proc. of ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED'04), pp.351-356, 2004. https://doi.org/10.1145/1013235.1013320
- I. Doh, K. Chae, “A key setup mechanism utilizing dual key strings for secure sensor communication,” Proc. of 9th International Conference on Advanced Communication Technology(ICACT), 2007. https://doi.org/10.1109/ICACT.2007.358558
- D. Huang, M. Mehta, D. Medhi, L. Harn, “Location-aware key management scheme for wireless sensor networks,” Proc. of ACM Workshop Security of Ad Hoc and Sensor Networks, 2004. https://doi.org/10.1145/1029102.1029110
- A. Durresi, V. Bulusu, V. Paruchuri, L. Barolli, “SCON: Secure management of continuity in sensor networks,” Computer Communications 29, 2458-2468, 2006. https://doi.org/10.1016/j.comcom.2006.02.002
- Seyit A. Camtepe, Bulent Yene, “Key Distribution Mechanism for Wireless Sensor Networks : a Survey,” TR-05-07 Rensselaer Polytechnic Institute, Computer Science Department, March, 2005.
- S. Zhu, S. Setia, S. Jajodia, “LEAP: efficient security mechanisms for large-scale distributed sensor networks,” Proc. of the 10th ACM Conf. on Computer and Communications Security (CCS'03), pp.62-72, 2003. https://doi.org/10.1145/948109.948120
- M. Wen, Y. Zheng, W. Ye, Ke. Chen, W. Qui, “A key management protocol with robust continuity for sensor networks,” Computer Standards & Interfaces 31 642-647, 2009. https://doi.org/10.1016/j.csi.2008.06.005