References
1. Perrig A, Stankovic J A, Wagner D A. Security in sensor networks. Communication of the ACM, 2004, 47(6): 53-57
2. Akyildiz I F, Su W L, Sankarasubramaniam Y, et al. Survey on sensor networks. IEEE Communications, 2002, 40(8): 102-114
3. Eschenauer L, Gligor V. A key management scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Communication Security (CCS’02), Nov 18-22, 2002, Washington, DC, USA. New York, NY, USA: ACM, 2002: 41-47
4. Chan H W, Perrig A, Song D. Random key predistribution schemes for sensor netwoks. Proceedings of the 2003 Symposium on Security and Priacy, May 11-14, 2003, Berkeley, CA, USA. Piscataway, NJ, USA: IEEE, 2003: 197-213
5. Çamtepe S A, Yener B. Combinatorial design of key distribution mechanisms for wireless sensor networks. Proceedings of the 9th European Symposium on Research Computer Security (ESORICS’04), Sept 13-15, 2004, Sophia Antipolis, France. LNCS 3193. Berlin, Germany: Springer-Verlag, 2004: 293-308
6. Camtepe S A, Yener B. Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Network, 2007, 15(2): 346-358
7. Lee J, Stinson D R. On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs. Transactions on Information and System Security, 2008, 11(2): Article 1
8. Lee J, Stinson D R. Acombinatorial approach to key predistribution for distributed sensor networks. IEEE Wireless Communications and Networking Conference (WCNC'05): Vol 2, Mar 13-17, 2005, New Orleans, LA, USA. Piscataway, NJ, USA: IEEE, 2005: 1200-1205
9. Bose M A, Mukerjee R. Key pre-distribution schemes for distributed sensor networks via block designs. Designs, Codes and Cryptography, 2003, 67(1): 111-136
10. Bechkit W, Challal Y, Bouabdallah A, et al. A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Transactions on Wireless Communications, 2013, 12(2): 948-959
11. Kendall M, Martin K M. Graph-theoretic design and analysis of key predistribution schemes. Designs, Codes and Cryptography, 2016, 81(1): 11-34
12. Chen S D, Wei H H. Constructions for key distribution patterns. Frontiers of Mathematics in China, 2017, 12(2): 301-323
13. Wan Z X. Geometry of classical group over finite field. Beijing, China: Science Press, 2002 |