Citation: | Ding Xiaoyu, Liu Jianwei, Shao Dingronget al. New pairwise key predistribution scheme for wireless sensor networks[J]. Journal of Beijing University of Aeronautics and Astronautics, 2009, 35(9): 1080-1082. (in Chinese) |
[1] Akyildiz F, Su W, Sankarasubramaniam Y, et al. A survey on sensor networks[J]. IEEE Communications Magazine, 2002, 40(8):102-114 [2] Diffie W, Hellman M E. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976, 22:644-654 [3] Rivest R L, Shamir A, Adleman L M. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978, 21(2):120-126 [4] Needham Roger M, Schroeder M D. Using encryption for authentication in large networks of computers[J]. Communications of the ACM, 1978, 21(12): 993-999 [5] Perrig A, Szewczyk R, Wen V, et al. SPINS: security protocols for sensor networks[J]. Wireless Networks, 2002, 8: 521-534 [6] Bundo C, Santis A D, Herzberg A, et al. Perfectly-secure key distribution for dynamic conferences [J]. Information and Computation,1998,146(1):1-23 [7] Liu D, Ning P. Establishing pairwise keys in distributed sensor networks //Proceedings of the 10th ACM Conference on Computer and Communication Security.New York:ACM,2003 [8] Liu D, Ning P. Establishing pairwise keys in distributed sensor networks[J]. ACM Transaction Information Systems, 2005, 1:41-77
|