This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Eschenauer, L., & Gligor, V. D, “A Key-Management Scheme for Distributed Sensor Networks”, Proceedings of the 9th ACM conference on Computer and communications security, 2002, pp.41-47.10.1145/586110.586117Search in Google Scholar
Chen G, Wang G J, “Random key pre-distribution scheme based on secure connectivity
detection”, Computer Engineering & Applications, Vol.45, No.6, 2009, pp.109-111.Search in Google Scholar
Chan H, Perrig A, & Song D, “Random key pre-distribution schemes for sensor networks”,
Security and Privacy, Proceedings of 2003 Symposium on IEEE, Vol.98, 2003, pp.197-213.Search in Google Scholar
AKYILDIZIF, SUW, SANKARA SUBRAMAN IAM Y, et al. “A survey on sensor
networks”, IEEE Communications Magazine, Vol.40, No.8, 2002, pp. 102-114.10.1109/MCOM.2002.1024422Search in Google Scholar
Chan H W, Adrian P, Song ‘ D. “Random Key Pre-distribution Scheme for Sensor
Networks”, 2003 IEEE Symposium on Research in Security and Privacy,2003, pp. 197-213.Search in Google Scholar
Huang D, Mehta M, Van d L A, et al. “Modeling Pairwise Key Establishment for Random Key Predistribution in Large-Scale Sensor Networks”, IEEE/ACM Transactions on Networking, Vol.15, No.5, 2007, pp. 1204-1215.10.1109/TNET.2007.896259Search in Google Scholar
Blom R. “An Optimal Class of Symmetric Key Generation Systems”, Lecture Notes in Computer Science, Vol.209, No.2, 1984, pp. 335-338.10.1007/3-540-39757-4_22Search in Google Scholar
Du W, Deng J, Han Y S, et al. “A Pair Wise Key Pre-Distribution Scheme for Wireless Sensor Networks”, International Journal of Innovative Technology & Exploring Engineering, Vol.8, No.2, 2003, pp. 42-51.Search in Google Scholar
Blundo C, Santis A D, Herzberg A, et al. Perfectly-Secure Key Distribution for Dynamic Conferences [J]. Information & Computation, Vol.146, No.1, 1996, pp. 1-23.10.1006/inco.1998.2717Search in Google Scholar
Liu D, Ning P, Li R. “Establishing pairwise keys in distributed sensor networks”, ACM Transactions on Information & System Security, Vol.8, No.1, 2005, pp. 41-77.10.1145/1053283.1053287Search in Google Scholar
Younis M, Ghumman K, Eltoweissy M. “Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks”, IEEE Transactions on Parallel & Distributed Systems, Vol.17, No.8, 2006, pp. 865-882.10.1109/TPDS.2006.106Search in Google Scholar
Eltoweissy M, Moharrum M, Mukkamala R. “Dynamic key management in sensor networks”. IEEE Communications Magazine, Vol.44, No.4, 2006, pp. 122-130.10.1109/MCOM.2006.1632659Search in Google Scholar
Dolev D, Yao A C. “On the Security of Public Key Protocol”, IEEE Transactions on Information Theory, Vol.29, No.2, 1983, pp. 198-208.10.1109/TIT.1983.1056650Search in Google Scholar
Xu J, Qian H, Ying W, et al. “A deployment algorithm for mobile wireless sensor networks based on the electrostatic field theory”, The International Journal on Smart Sensing and Intelligent Systems, Vol.8, No.1, 2015, pp. 516-537.10.21307/ijssis-2017-770Search in Google Scholar
Bai, Q., & Jin, C, “Image fusion and recognition based on compressed sensing theory”, International Journal on Smart Sensing & Intelligent Systems, Vol.8, No.1, 2015, pp. 159-180.10.21307/ijssis-2017-753Search in Google Scholar
Qiao J, Liu S, Qi X, et al, “Transmission power control in wireless sensor networks under the minimum connected average node degree constraint”, The International Journal on Smart Sensing and Intelligent Systems, Vol.8, No. 1, 2015, pp.801-821.10.21307/ijssis-2017-784Search in Google Scholar