[1] Eschenauer L, Gligor V D. A key management scheme for dist ributed sensor network//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washinigton D C: ACM Press, 2002: 41-47. [2] Haowen Chan Adrian Perrig Dawn Song. Random key pre-distribution schemes for sensor networks//Proceedings of the 2003 IEEE Symposium on Security and Privacy. Oakland: , 2003: 197-213. [3] Hui Ling Taieb Znati. End-to-End pairwise key establishment using multi-path in wireless sensor network//IEEE Globecom. Missouri: , 2005: 1847-1851. [4] Jing Deng, Carl Hartung, Richard Han, et al. A practical study of transitory master key establishment for wireless sensor networks//Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks. Athens: , 2005: 289-302. [5] Wallner D M, Harder E J, Agee R C. Key management for multicast: issues and architectures. : RFC, 1999. [6] Diffie W, Hellman M. New directions in cryptography[J]. IEEE Trans on Info, 1976, 22(2): 644-654. [7] Yongdae Kim. Adrian perrig gene tsudik tree-based group key agreement[J]. ACM Transactions on Information and System Security, 2004, 7(1): 60-96. [8] 邱慧敏, 杨义先, 钮心忻. 无线传感器网络中广播通信的安全协议设计. 北京邮电大学学报, 2006, 29(5): 103-106. Qiu Huimin, Yang Yixian, Niu Xinqi. Security protocol design about broadcast in wireless sensor network[J]. Journal of Beijing University of Posts and Telecommunications, 2006, 29(5): 103-106. [9] Biswajit Panja, Sanjay Kumar Madria Bharat Bhargava. Energy and communication efficient group key management protocol for hierarchical sensor networks//Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing Taichung. Taiwan: , 2006: 384-393. |