|
[1] I. F. Akyildiz, Su Weilian, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, Vol. 40, Aug. 2002, pp. 102-114
[2] A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D. E. Culler, “SPINS: security protocols for sensor networks,” Wireless Networks, Vol. 8, Sept. 2002, pp. 521-534.
[3] S. Zhu, S. Setia, and S. Jajodia, “LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,” Proc. 10th ACM Conference on Computer and communication security, Oct. 2003, pp. 62-72.
[4] L. Eschenauer and V. D. Gligor, “A key-Management Scheme for Distributed Sensor Networks,” Proc. 9th ACM Conference on Computer and Communication Security, Nov. 2002, pp. 41-47.
[5] S. Y. Wu and S. P. Shieh, “Adaptive Random Key Distribution Schemes for Wireless Sensor Networks,” Proc. 2003 International Workshop on Advanced Developments in Software and Systems Security, Dec. 2003.
[6] A. Shamir, “How to Share a Secret,” Communications of the ACM, Vol. 22, No. 11, Nov. 1979, pp. 612-613.
[7] H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Proc. IEEE Symposium on Research in Security and Privacy, May 2003, pp. 197-213.
[8] J. Spencer, The Strange Logic of Random Graphs, Algorithms and Combinatorics.22, Springer-Verlag, 2000.
[9] R. Merkle, “Protocols for public key cryptosystems,” Proc. 1980 IEEE Symposium on Security and Privacy, Apr. 1980, pp. 122-134.
[10] D. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks,” Proc. 10th ACM Conference on Computer and Communications Security (CCS ’03), Oct. 2003, pp. 52-61.
[11] S. Zhu, S. Xu, S. Setia, and S. Jajodia, “Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach,” Proc. 11th IEEE International Conference on Network Protocols (ICNP ’03), Nov. 2003, pp. 326-335.
[12] R. D. Pietro, L. V. Mancini, and A. Mei, “Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment,” Proc. 18th International Parallel and Distributed Processing Symposium, Apr. 2004.
|