[1]
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Wireless sensor networks: a survey;, Computer Networks, pp.393-433, Elsevier, (2002).
DOI: 10.1016/s1389-1286(01)00302-4
Google Scholar
[2]
Pamo B, Perrig A,Gligor V. Distributed detection of node replication attacks in sensor networks.In Proc. of the IEEE Symp. On Security and Privacy. IEEE Computer Society, 2005. 49-63.
DOI: 10.1109/sp.2005.8
Google Scholar
[3]
A. Perrig, R. Szewczyk. et al. SPINS: Security protocols for sensor networks. Wireless Networks, 2002, 8(5): 521~534.
Google Scholar
[4]
D.G. Liu,P. Ning . Multi-Level μTESLA: A Broadcast Authentication System for Distributed Sensor Networks, ACM(TECS), 2004, 3(4): 800-836.
DOI: 10.1145/1027794.1027800
Google Scholar
[5]
H. Chan, A. Perrig, D. Song. Key distribution techniques for sensor networks. Wireless Networks, 2004, 6(2): 277~303.
DOI: 10.1007/1-4020-7884-6_13
Google Scholar
[6]
Shen Yu Long, Pei Qing qin. MMμTESLA: Broadcast authentication protocol for multiple-base-station sensor networks[J]. Chinese Journal of Computer. 2007. 4: 539-547.
Google Scholar
[7]
Sun Qian. A Novel Key Pre-distribution for Wireless Sensor Networks. Physics Procedia 25 ( 2012 ) 2183 – 2189.
DOI: 10.1016/j.phpro.2012.03.368
Google Scholar
[8]
L.L. Si, Zhigang Ji. The Application of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks. Physics Procedia 25 ( 2012 ) 552-559.
DOI: 10.1016/j.phpro.2012.03.125
Google Scholar
[9]
Du W.L., Deng J., et al. A key management scheme for wireless sensor networks using deployment knowledge[C]. The 23th IEEE Computer and Communications Proceedings 2004. 586-597.
Google Scholar
[10]
Levi A, Tasc S E. et al. Simple extensible and flexible reandom key predistribution schemes for wireless sensor networks using reusable key pools[J]. Journal of Interlligent Manufacturing, 2009. 21(5): 625-645.
DOI: 10.1007/s10845-009-0256-z
Google Scholar
[11]
Jaworski J, Ren M, and Rybarczyk K. Random key redistribution for wireless sensor networks using deployment knowledge [J]. Computing, 2009, 85(1-2): 57-76.
DOI: 10.1007/s00607-009-0036-9
Google Scholar
[12]
Liu wei, Luo rong. A Lightweight Key Establishment Protocol for Wireless Sensor Networks[J]. Journal of Electronics&Information Technology. 2010(32): 869-874.
DOI: 10.3724/sp.j.1146.2009.00349
Google Scholar
[13]
Liu Y.N., Wang J. et al. Threshold key sharing Model in wireless sensor networks[J]. Journal of Electronics Information Technology. 2011(33): 1913-(1919).
DOI: 10.3724/sp.j.1146.2010.01155
Google Scholar
[14]
Wen T., Zhang Y. et al. Dynamic group key management scheme for homogeneous wireless sensor networks[J]. Journal on Communications, 2012(33): 164-172.
Google Scholar
[15]
Paek K, Song U, Kim H, Kim J. Energy-efficient key-management (EEKM) protocol for large-scale distributed sensor networks. Journal of Information Science and Engineering 2008; 24: 1837–58.
Google Scholar
[16]
Xiaobing He, Michael Niedermeier Dynamic key management in wireless sensor networks: A survey. Journal of Network and Computer Applications 2013 (36) 611–622.
DOI: 10.1016/j.jnca.2012.12.010
Google Scholar