[1]
S. A. Camtepe, and B. Yener. Key Distribution Mechanisms for Wireless Sensor networks: a Survey, TR-05-07 Rensselaer Polytechnic Institute Computer Science Department, (2005).
Google Scholar
[2]
D. Liu, P. Ning, and R. Li. Establishing, Pair-wise Keys in Distributed Sensor Networks, , ACM Trans., Inf. Syst. Secur., Vol. 8, No. 1, pp.41-77, (2005).
DOI: 10.1145/1053283.1053287
Google Scholar
[3]
S. Camtepe, B. Yener. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks, 9th European Symposium on Resaerch Computer Security, pp, 293-308, (2004).
DOI: 10.1007/978-3-540-30108-0_18
Google Scholar
[4]
M. Bohge, and W. Trappe. An Authentication Framework for Hieranchical Ad hoc Sensor Networks, ACM workshop on Wireless Security, San Diego, CA, USA, pp.79-87, (2003).
DOI: 10.1145/941311.941324
Google Scholar
[5]
Kejie Lu, Yi Qian, Mohsen Guizani, Hsiao-Hwa Chen. A Framework for a Distributed Key Management Scheme in Heterogeneous Wireless Sensor Networks, IEEE TRANSACTION ON WIRELESS COMMUNICATIONS, VOL. 7, NO. 2, pp.639-647, FEBRUARY (2008).
DOI: 10.1109/twc.2008.060603
Google Scholar
[6]
K. P. Shih, S. S Wang, P. H. Yang, C. C. Chang. CollECT: collaborative event detection and tracking in wireless heterogeneous sensor networks, In: Proceedings of the 11th IEEE symposium on computers and communications (ISCC 2006); June 2006, pp.935-940, (2006).
DOI: 10.1109/iscc.2006.50
Google Scholar
[7]
L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks, " in Proc. CCS, 02: 9th ACM Conference on Computer and Communications Security. New York: ACM Press, Nov. 2002, pp.41-47, (2002).
DOI: 10.1145/586110.586117
Google Scholar
[8]
H. Chan, A. Perrig, D. Song. Random key predistribution schemes for sensor networks, Proceedings of the IEEE Syrup. On Research in Security and Privacy, Berkeley, CA, USA, May 11-14 2003, pp.197-213, (2003).
Google Scholar
[9]
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung. Perfectly-secure key distribution for dynamic conferences", in Proc. CRYPTO, 92: 12th Annual International Cryptology Conference on Advances in Cryptology. London: Springer-Verlag, 1992, pp.471-486, (1992).
DOI: 10.1007/3-540-48071-4_33
Google Scholar
[10]
D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks", in Proc. CCS, 03: 10th ACM Conference on Computer and Communications Security. New York: ACM Press, 2003, pp.52-61, (2003).
DOI: 10.1145/948109.948119
Google Scholar
[11]
D. Lai, Hwang S. Kim, I. Verbauehrde. Reducing Radio Energy Consumption of Key Management Protocols for Wireless Sensor Networks", Proceedings of ACM/ IEEE International Symposium on Low Power Electronics and Design (ISLPED, 04), 2004, pp.351-356, (2004).
DOI: 10.1145/1013235.1013320
Google Scholar