共 20 条
[1]
Akyildiz I.F., Su W., Sankarasubramaniam Y., Cayirci E., A survey on sensor networks, IEEE Communications Magazine, 40, 8, pp. 102-114, (2002)
[2]
Su Z., Lin C., Feng F.J., Ren F.Y., Key management schemes and protocols for wireless sensor networks, Journal of Software, 18, 5, pp. 1218-1231, (2007)
[3]
Product feature reference: Sensors and functions
[4]
Diffie W., Hellman M.E., New directions in cryptography, IEEE Trans. on Information Theory, 22, 6, pp. 644-654, (1976)
[5]
Rivest R.L., Shamir A., Adleman L.M., A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM, 21, 2, pp. 120-126, (1978)
[6]
Neuman B.C., Tso T., Kerberos: An authentication service for computer networks, IEEE Communications Magazine, 32, 9, pp. 33-38, (1994)
[7]
Anjum F., Mouchtaris P., Security for Wireless Ad Hoc Networks, (2007)
[8]
Eschenauer L., Gligor V.D., A key-management scheme for distributed sensor networks, Proc. of the 9th ACM Conf. on Computer and Communications Security, pp. 41-47, (2002)
[9]
Chan H., Perrig A., Song D., Random key predistribution schemes for sensor networks, Proc. of the IEEE Symp. on Security and Privacy, pp. 197-213, (2003)
[10]
Du W., Deng J., Han Y.S., Varshney P.K., A pairwise key pre-distribution scheme for wireless sensor networks, Proc. of the 10th ACM Conf. on Computer and Communications Security, pp. 42-51, (2003)