Have a personal or library account? Click to login
Open Access
|Jun 2016

References

  1. Eschenauer, L., & Gligor, V. D, “A Key-Management Scheme for Distributed Sensor Networks”, Proceedings of the 9th ACM conference on Computer and communications security, 2002, pp.41-47.10.1145/586110.586117
  2. [2]Chen G, Wang G J, “Random key pre-distribution scheme based on secure connectivity detection”, Computer Engineering & Applications, Vol.45, No.6, 2009, pp.109-111.
  3. [3]Chan H, Perrig A, & Song D, “Random key pre-distribution schemes for sensor networks”, Security and Privacy, Proceedings of 2003 Symposium on IEEE, Vol.98, 2003, pp.197-213.
  4. [4]AKYILDIZIF, SUW, SANKARA SUBRAMAN IAM Y, et al. “A survey on sensor networks”, IEEE Communications Magazine, Vol.40, No.8, 2002, pp. 102-114.10.1109/MCOM.2002.1024422
  5. [5]Chan H W, Adrian P, Song ‘ D. “Random Key Pre-distribution Scheme for Sensor Networks”, 2003 IEEE Symposium on Research in Security and Privacy,2003, pp. 197-213.
  6. Huang D, Mehta M, Van d L A, et al. “Modeling Pairwise Key Establishment for Random Key Predistribution in Large-Scale Sensor Networks”, IEEE/ACM Transactions on Networking, Vol.15, No.5, 2007, pp. 1204-1215.10.1109/TNET.2007.896259
  7. Blom R. “An Optimal Class of Symmetric Key Generation Systems”, Lecture Notes in Computer Science, Vol.209, No.2, 1984, pp. 335-338.10.1007/3-540-39757-4_22
  8. Du W, Deng J, Han Y S, et al. “A Pair Wise Key Pre-Distribution Scheme for Wireless Sensor Networks”, International Journal of Innovative Technology & Exploring Engineering, Vol.8, No.2, 2003, pp. 42-51.
  9. Blundo C, Santis A D, Herzberg A, et al. Perfectly-Secure Key Distribution for Dynamic Conferences [J]. Information & Computation, Vol.146, No.1, 1996, pp. 1-23.10.1006/inco.1998.2717
  10. Liu D, Ning P, Li R. “Establishing pairwise keys in distributed sensor networks”, ACM Transactions on Information & System Security, Vol.8, No.1, 2005, pp. 41-77.10.1145/1053283.1053287
  11. Younis M, Ghumman K, Eltoweissy M. “Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks”, IEEE Transactions on Parallel & Distributed Systems, Vol.17, No.8, 2006, pp. 865-882.10.1109/TPDS.2006.106
  12. Eltoweissy M, Moharrum M, Mukkamala R. “Dynamic key management in sensor networks”. IEEE Communications Magazine, Vol.44, No.4, 2006, pp. 122-130.10.1109/MCOM.2006.1632659
  13. Dolev D, Yao A C. “On the Security of Public Key Protocol”, IEEE Transactions on Information Theory, Vol.29, No.2, 1983, pp. 198-208.10.1109/TIT.1983.1056650
  14. Xu J, Qian H, Ying W, et al. “A deployment algorithm for mobile wireless sensor networks based on the electrostatic field theory”, The International Journal on Smart Sensing and Intelligent Systems, Vol.8, No.1, 2015, pp. 516-537.10.21307/ijssis-2017-770
  15. Bai, Q., & Jin, C, “Image fusion and recognition based on compressed sensing theory”, International Journal on Smart Sensing & Intelligent Systems, Vol.8, No.1, 2015, pp. 159-180.10.21307/ijssis-2017-753
  16. Qiao J, Liu S, Qi X, et al, “Transmission power control in wireless sensor networks under the minimum connected average node degree constraint”, The International Journal on Smart Sensing and Intelligent Systems, Vol.8, No. 1, 2015, pp.801-821.10.21307/ijssis-2017-784
Language: English
Page range: 979 - 996
Submitted on: Jan 21, 2016
Accepted on: Apr 10, 2016
Published on: Jun 1, 2016
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2016 Zhu Ling-Zhi, He Rui, Zhang Jun-Ling, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.