|
[1] Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci, “A Survey on Sensor Networks,” IEEE Communications Magazine, August 2002, pp.102-114. [2] Jamal N. AL-Karaki, and Ahmed E. Kamal, “Routing Techniques in Wireless Sensor Networks:A Survey,” IEEE Wireless Communications, December 2004, pp.6-28. [3] Jun-Hong Cui, Faloutsos M. , and Gerla M. , “An architecture for scalable, efficient, and fast fault-tolerant multicast provisioning,” IEEE Network, March/April 2004, Vol. 18, pp.26-34. [4] W. Diffie, and M. Hellman, “New Directions in Cryptography,” IEEE Trans. Inform. Theory, Vol. 22, No. 6, Nov. 1976, pp.644-654. [5] Ingemar Ingemarsson, Donald T. Tang, and C.K. Wong, “A Conference Key Distribution System,” IEEE Transactions on Information Theory, Vol. IT-28, No.5, September 1982, pp.714-720. [6] Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, John Heidemann, and Fabio Silva, “Directed Diffusion for Wireless Sensor Networking,” IEEE Transactions on Networking, Vol. 11, No. 1, February 2003, pp.2-16. [7] Yongdae Kim, Adrian Perrig, and Gene Tsudik, “Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups,” in Proc. 7th ACM Conf. Computer Communication Security, 2000, pp.235-244. [8] Haibin Liu, “A novel high-order tree for secure multicast key management,” IEEE Transactions on Computers, February 2005, Vol. 54, pp.214-224. [9] Sandro Rafaeli, and David Hutchison, “A Survey of Key Management for Secure Group Communication,” ACM Computing Surveys, Vol. 35, No. 3, September 2003, pp.309-329. [10] William Stallings, Cryptography and Network Security:Principles and Practices, 3rd Edition, Pearson, Prentice-Hall, 2003 [11] Wade Trappe, Yuke Wang, and K. J. Ray Liu, “Establishment of Conference Keys in Heterogeneous Networks,” in Proc. IEEE Int. Conf. Communications, 2002, pp.2201-2205.
[12] Wade Trappe, Yuke Wang, and K. J. Ray Liu, “Resource-Aware Conference Key Establishment for Heterogeneous Networks,” IEEE/ACM Transactions on Networking, Vol. 13, No. 1, February 2005, pp.134-146. [13] Chung Kei Wong, Mohamed Gouda, and Simon S. Lam, “Secure Group Communications Using Key Graphs,” IEEE/ACM Transactions on Networking, Vol. 8, No. 1, February 2000, pp.16-30. [14] Wei Ye, Heidemann J. , and Estrin D. , “Medium access control with coordinated adaptive sleeping for wireless sensor networks,” IEEE/ACM Transactions on Networking, Vol.12, June 2004, pp.493-506. [15] Xin Yan Zhang, Qian Zhang, Zhensheng Zhang, Gang Song, and Wenwu Zhu, “A Construction of Locality-Aware Overlay Network:mOverlay and Its Performance,” IEEE Journal on Selected Areas in Communications, Vol. 22, January 2004, pp.18-28 [16] Jinhua Zhu, Chunming Qiao, and Xin Wang, “A Comprehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks,” IEEE INFOCOM 2004, Mar., Vol. 2, pp.1437-1445. [17] Jinhua Zhu, and Xin Wang, “PEER:A Progressive Energy Efficient Routing Protocol for Wireless Ad Hoc Networks,” IEEE INFOCOM 2005, Mar. Vol. 3, pp.1887-1896. [18] Ravindra K. Ahuja, Thomas L. Magnanti, and James B. Orlin, Network Flows: Theory, Algorithms, and Applications, 1st Edition, Prentice-Hall, 1993
|