Cite

Eschenauer, L., & Gligor, V. D, “A Key-Management Scheme for Distributed Sensor Networks”, Proceedings of the 9th ACM conference on Computer and communications security, 2002, pp.41-47.10.1145/586110.586117 Search in Google Scholar

Chen G, Wang G J, “Random key pre-distribution scheme based on secure connectivity detection”, Computer Engineering & Applications, Vol.45, No.6, 2009, pp.109-111. Search in Google Scholar

Chan H, Perrig A, & Song D, “Random key pre-distribution schemes for sensor networks”, Security and Privacy, Proceedings of 2003 Symposium on IEEE, Vol.98, 2003, pp.197-213. Search in Google Scholar

AKYILDIZIF, SUW, SANKARA SUBRAMAN IAM Y, et al. “A survey on sensor networks”, IEEE Communications Magazine, Vol.40, No.8, 2002, pp. 102-114.10.1109/MCOM.2002.1024422 Search in Google Scholar

Chan H W, Adrian P, Song ‘ D. “Random Key Pre-distribution Scheme for Sensor Networks”, 2003 IEEE Symposium on Research in Security and Privacy,2003, pp. 197-213. Search in Google Scholar

Huang D, Mehta M, Van d L A, et al. “Modeling Pairwise Key Establishment for Random Key Predistribution in Large-Scale Sensor Networks”, IEEE/ACM Transactions on Networking, Vol.15, No.5, 2007, pp. 1204-1215.10.1109/TNET.2007.896259 Search in Google Scholar

Blom R. “An Optimal Class of Symmetric Key Generation Systems”, Lecture Notes in Computer Science, Vol.209, No.2, 1984, pp. 335-338.10.1007/3-540-39757-4_22 Search in Google Scholar

Du W, Deng J, Han Y S, et al. “A Pair Wise Key Pre-Distribution Scheme for Wireless Sensor Networks”, International Journal of Innovative Technology & Exploring Engineering, Vol.8, No.2, 2003, pp. 42-51. Search in Google Scholar

Blundo C, Santis A D, Herzberg A, et al. Perfectly-Secure Key Distribution for Dynamic Conferences [J]. Information & Computation, Vol.146, No.1, 1996, pp. 1-23.10.1006/inco.1998.2717 Search in Google Scholar

Liu D, Ning P, Li R. “Establishing pairwise keys in distributed sensor networks”, ACM Transactions on Information & System Security, Vol.8, No.1, 2005, pp. 41-77.10.1145/1053283.1053287 Search in Google Scholar

Younis M, Ghumman K, Eltoweissy M. “Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks”, IEEE Transactions on Parallel & Distributed Systems, Vol.17, No.8, 2006, pp. 865-882.10.1109/TPDS.2006.106 Search in Google Scholar

Eltoweissy M, Moharrum M, Mukkamala R. “Dynamic key management in sensor networks”. IEEE Communications Magazine, Vol.44, No.4, 2006, pp. 122-130.10.1109/MCOM.2006.1632659 Search in Google Scholar

Dolev D, Yao A C. “On the Security of Public Key Protocol”, IEEE Transactions on Information Theory, Vol.29, No.2, 1983, pp. 198-208.10.1109/TIT.1983.1056650 Search in Google Scholar

Xu J, Qian H, Ying W, et al. “A deployment algorithm for mobile wireless sensor networks based on the electrostatic field theory”, The International Journal on Smart Sensing and Intelligent Systems, Vol.8, No.1, 2015, pp. 516-537.10.21307/ijssis-2017-770 Search in Google Scholar

Bai, Q., & Jin, C, “Image fusion and recognition based on compressed sensing theory”, International Journal on Smart Sensing & Intelligent Systems, Vol.8, No.1, 2015, pp. 159-180.10.21307/ijssis-2017-753 Search in Google Scholar

Qiao J, Liu S, Qi X, et al, “Transmission power control in wireless sensor networks under the minimum connected average node degree constraint”, The International Journal on Smart Sensing and Intelligent Systems, Vol.8, No. 1, 2015, pp.801-821.10.21307/ijssis-2017-784 Search in Google Scholar

eISSN:
1178-5608
Language:
English
Publication timeframe:
Volume Open
Journal Subjects:
Engineering, Introductions and Overviews, other