[1] CHEN X Q, MAKKI K, et al.Sensor network security:A Survey[J].IEEE Communications Surveys & Tutorials, 2009, 11(2):52-73.
[2] ZHANG J Q, VARADHARAJAN V.Wireless sensor network key management survey and taxonomy[J].Journal of Network and Computer Applications, 2010, 33(2):63-75.
[3] RAMS T, PACYNA P.A survey of group key distribution schemes with self-healing property[J].IEEE Communications Surveys & Tutorials, 2013, 15(2):820-842.
[4] STADDON J, MINER S, et al.Self-healing key distribution with revocation[A].Proceedings of IEEE Symposium on Security and Privacy [C].Los Alamitos:IEEE Press, 2002.241-257.
[5] DUTTA R, MUKHOPADHYAY S, et al.Computationally secure self-healing key distribution with revocation in wireless ad hoc networks[J].Ad Hoc Networks, 2010, 8(6):597-613.
[6] 彭清泉, 裴庆祺, 等.无线传感器网络中自治愈的群组密钥管理方案[J].电子学报, 2010, 38(1):123-128. PENG Qing-quan, PEI Qing-qi, et al.A self-healing group key management scheme in wireless sensor networks[J].Acta Electronica Sinica, 2010, 38(1):123-128.(in Chinese)
[7] DUTTA R, SANYAL S.Collusion resistant self–healing key distribution in mobile wireless networks[J].International Journal of Wireless and Mobile Computing, 2012, 5(3):228-243.
[8] JIANG Y X, LIN C, et al.Self-healing group key distribution with time-limited node revocation for wireless sensor networks[J].Ad Hoc Networks, 2007, 5(1):14-23.
[9] 王顺满, 陶然, 等.具有自我恢复功能的密钥管理方法在MANET网络中应用研究[J].电子学报, 2009, 37(4):889-893. WANG Shun-man, TAO Ran, et al.Research of the self-heal-ing key management in MANET[J].Acta Electronica Sinica, 2009, 37(4):889-893.(in Chinese)
[10] WANG Q H.Practicality analysis of the self-healing group key distribution schemes for resource-constricted wireless sensor networks[A].Proceedings of the 3rd IEEE International Conference on Communications and Mobile Computing[C].Piscataway:IEEE, 2011.37-40.
[11] MORE S M, MALKIN M, et al.Sliding-window self-healing key distribution[A].Proceedings of the 10th ACM Conference on Computer and Communications Security[C].New York:ACM, 2003.82-90.
[12] LIU D, NING P, et al.Efficient self-healing group key distribution with revocation capability[A].Proceedings of the 10th ACM Conference on Computer and Communications Security[C].New York:ACM, 2003.231-240.
[13] HAN S, TIAN B M, et al.Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks[J].IEEE Transactions on Wireless Communica-tions, 2009, 8(4):1876-1887.
[14] 杜春来, 胡铭曾, 等.基于滑动窗口的移动自组网的自愈密钥发布机制[J].通信学报, 2009, 30(2):6-11. DU Chun-lai, HU Ming-zeng, et al.Self-healing key distribution scheme of MANET based on sliding window[J].Journal on Communications, 2009, 30(2):6-11.(in Chinese)
[15] BLUNDO C, et al.Design of self-healing key distribution schemes[J].Designs, Codes and Cryptography, 2004, 32(1-3):15-44.
[16] HONG D W, Kang J S, et al.An efficient key distribution scheme with self-healing property[J].IEEE Communications Letters, 2005, 9(8):759-761.
[17] DUTTA R, WU Y D, et al.Constant storage self-healing key distribution with revocation in wireless sensor network[A].Proceedings of 2007 IEEE International Conference on Communications[C].Piscataway:IEEE, 2007.1323-1328.
[18] WANG Q H, CHEN H F, et al.Access-polynomial-based self-healing group key distribution scheme for resource-constrained wireless networks[J].Security and Communication Networks, 2012, 5(12):363-1374.
[19] WANG Q H, CHEN H F, et al.One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks[J].Ad Hoc Networks, 2013, 11(8):2500-2511.
[20] MAKRI F S, Philippou A N, et al.Shortest and longest length of success runs in binary sequences[J].Journal of Statistical Planning and Inference, 2007, 137(7):2226-2239.
[21] MUSELLI M.Simple expressions for success run distributions in Bernoulli trials[J].Statistics & Probability Letters, 1996, 31(2):121-128.
[22] MARTINEZ G E, et al.Modeling and analysis of the packet-level loss process in wireless channels[A].Proceedings of the 13th ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems[C].New York:ACM, 2010.283-290.
[23] LIU F Q, LIN C.An analytical method to predict packet losses over bursty wireless channels[J].IEEE Communications Letters, 2011, 15(12):1338-1340.
[24] RAMALINGAM K C, et al.SIMAGE:secure and link-quality cognizant image distribution for wireless sensor networks.2012 IEEE Global Communications Conference[C].Piscataway:IEEE, 2012.616-621. |