참고문헌
- A. M. Hegland, E. Winjum, S.F. Mjolsnes, C. Rong, O. Kure, and P. Spilling, "A survey of key management in ad hoc networks" IEEE Communications Surverys & Tutorials, 3rd Quarter 2006
- M. Bohge, and W. Trappe, "An authentication framework for hierarchical ad hoc sensor networks", In ACM workshop on Wireless Security, 2003
- Y. Cheng, D.P. Agrwal, "An improved key distribution mechanism for large-scale hierachical wireless sensor networks," Journal of Ad Hoc Networks, vol. 5, pp. 35-48, 2007 https://doi.org/10.1016/j.adhoc.2006.05.011
- A. Shamir, "How to Share a Secret," Communication of ACM, vol. 22, pp.612-613 Nov. 1979 https://doi.org/10.1145/359168.359176
- L. Zhou and Z.J. Haas, "Securing Ad Hoc Network," IEEE Networking Mag., vol.13, pp.24-30, Nov. 1999
- S. Yi and R. Kravets, "MOCA: MObile Certificate Authority for Wireless Ad Hoc Networks," in Proceedings of 2nd Annual PKI Research Workshop, pp. 65-79, April, 2003
- B. Wu, J. Wu, E.B. Femandez, M. Dyas, S. Magliveras, "Secure and efficient key management in mobile ad hoc network," Journal of Network and Computer Applications, vol 30, pp. 937-954, August 2007 https://doi.org/10.1016/j.jnca.2005.07.008
- S. Zhu, S. Setia, and S.Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," in Proceeding of CSS'03, 2003
- L. Eschenauer, and V.D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," in Proceeding of 9th ACM conference on CCS, Nov. 2002
- H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," IEEE Symp. Security and Privacy, pp. 197-213, 2003
- W. Du, 1. Deng, Y.S. han, S. Chen, and P. Varshney, "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowlege," in Proceeding of IEEE INFOCOM, pp. 586-597, 2004
- J. Lee, T. Kwon, and J. Song, "Location-Aware Key Management using multi-layer grids for WSN," Applied Cryptography and Network Security '06, LNCS 3989, pp. 390-404, 2006
- M. Puzar, J. Andersson, T. Plagemann, Y. Roudier, "SKiMPy; A Simple Key Management Protocol for MANETs in Emergency and Rescure Operations," in Proceeding of ESAS '05, 2005
- M. Bouassida, I. Chrisment, and o. Festor, "Group Key Management in MANETs," International Journal of Network Security, Vol.6, No.1, pp. 67-79, Jan. 2008
- I. Chuang, W. Su, C. Wu, J. Hsu and Y. Kuo, "Two-layered Dynamic Key Management in Mobile and Long-lived Cluster-based Wireless Sensor Networks," in Proceedings of IEEE Wireless Communications and Networking Conference, pp.4145-4150, March 2007
- 박귀순, 황정섭, "미래 전장 환경변화에 따른 TICN 체계 요구 기능 및 능력," Telecommunications review, 제 20권 2호,pp.196-206, 4월, 2010년.