1Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks[A].Proc 9th ACM Conf on Computer and Communication Security[C].Washington DC,2002:41~47.
2Chan H W,Perrig A,Song D.Random Key predistribution schemes for sensor networks[A].Proc 2003 IEEE Symp on Security and Privacy[C].Berkeley,California,2003:197.
3Blundo C,Santis A D,Herzberg A,Kutten S,Vaccaro U,Yung M.Perfectly secure key distribution for dynamic conferences[A].Proc 12th Annual Int'l Cryptology Conf on Advances in Cryptology[C].Santa Barbara,California,1992:471~486.
4ESCHENAUER L, GLIGOR V D. A key-nmnagement scheme for distributed sensor networks[ C]//Proceedings of the 9th ACM Conference on Computer and Communication Security. New York: ACM Press, 2002:41-47.
5LIU D G, NING P. Location-based pairwise key establishments for static sensor networks[ C]// Proceedings of the 1 st ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2003:72-82.
6CHAN H, PERRIG A, SONG D. Random key predistribution schemes for sensor networks[ C]// Proceedings of 2003 Symposium on Security and Privacy. Washington, D C: IEEE Computer Society, 2003:197-213.
7DU W, DENG J, HAN Y S, et al. A pairwise key predistribution seheme for wireless sensor networks[ C]// Proeeedings of the 10th ACM Conferenee on Computer and Communieations Seeurity. New-York: ACM Press, 2003:42-51.
8BLOM R. An optimal class of symmetric key generation systems [ C]// Proceedings of the EUROCRYPT 84 Workshop on Advances in Cryptology: Theory and Application of Cryptographie Techniques, LNCS 209. New York: Spring-Verlag, 1984:335-338.
9AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y, et al. A survey on sensor networks[ J]. IEEE Communications Magazine, 2002, 40(8): 102-114.
10CHENG YI, AGRAWAL D P. An improved key distribution mechanism for large-scale hierarchical wireless sensor networks [J]. Ad Hoc Networks, 2007, 16(5): 35-48.