|
[BECH13]W. Bechkit, Y. Challal, and A. Bouabdallah, “A new class of hash-chain based key pre-distribution scheme for WSN,” Computer Communications, vol. 36, pp. 243-255, Jan., 2013. [CHAN03]H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” IEEE Symp. Security Privacy, May 2003, pp. 197-213. [CHEN17]Y.R. Chen and W.G. Tzeng, “Group key management with efficient rekey mechanism: a semi-stateful approach for out-of-synchronized members,” Computer Communications, vol. 98, pp. 31-42, Jan., 2017. [CHAN20]S.T. Chandel and S. Sharma, “Deployment of multiple sink in different monitoring areas based on the optimization technique,” International Journal of Sensors, Wireless Communications and Control, vol. 10, pp. 915-928, 2020. [DAS13]D. Das, Z. Rehena, S. Roy and N. Mukherjee, “Multiple-sink placement strategies in wireless sensor networks,” 2013 5th International Conference on Communication Systems and Networks, pp. 1-7, 2013. [DENG18]R. Deng, S. He, and J. Chen, “An online algorithm for data collection by multiple sinks in wireless-sensor networks,” IEEE Transactions on Control of Network Systems, vol. 5, pp. 93-104, 2018. [DICK19]M. Dick, Mo.d Alwabel, Y. Kwon, “Multiple sink nodes to improve performance in WSN,” Journal of Korea Multimedia Society, vol. 22, pp. 676-683, 2019. [DOOS20]S. Doostali, S.M. Babamir, “An energy efficient cluster head selection approach for performance improvement in network-coding-based wireless sensor networks with multiple sinks,” Computer Communications, vol. 164, pp. 188-200, 2020. [ESCH02]L. Eschenauer and V.D. Gligor, “A key-management scheme for distributed sensor networks,” The 9th ACM conference on Computer and communications security, pp. 41-47, 2002. [EHDA16]Ehdaiea et al., “2D hash chain robust random key distribution scheme,” Information Processing Letters, vol. 16, pp. 367-372, 2016. [GAND17]F. Gandino, R. Ferrero, and M. Rebaudengo, “A key distribution scheme for mobile wireless sensor networks: q-s-Composite,” IEEE Transactions on Information Forensics and Security, vol. 12, pp. 34-47, 2017. [HARN15]L. Harn and C.F. Hsu, “Predistribution scheme for establishing group keys in wireless sensor networks,” IEEE Sensors Journal, vol.15, pp. 5103-5108, 2015. [HERN19]N.J. Hernandez Marcano, J.H. Lauritsen, K.K. Jacobsen and R.H. Jacobsen, “Enabling secure multicast group communications in IP wireless networks for the Internet of Things,” The 25th European Wireless Conference, pp. 1-7, 2019. [JINO17]S.R. Jino Ramson and D.J. Moni, “Applications of wireless sensor networks - A survey,” 2017 International Conference on Innovations in Electrical, Electronics, Instrumentation and Media Technology (ICEEIMT), pp. 325-329, 2017. [KHAN12]E. Khan, E. Gabidulin, B. Honary, and H. Ahmed, “Matrix-based memory efficient symmetric key generation and pre-distribution scheme for wireless sensor networks,” IET Wireless Sensor Syst., vol. 2, pp. 108-114, 2012. [MEHM17]A. Mehmood, M. M. Umar, and H. Song, “ICMDS: Secure inter-cluster multiple-key distribution scheme for wireless sensor networks,” Ad Hoc Networks, vol. 55, pp. 97-106, Feb., 2017. [REHE15]Z. Rehena, D. Das, S. Roy, and N. Mukherjee,“Multiple Sink Placement in Partitioned Wireless Sensor Networks,” International Journal of Next-generation Computing, Vol. 6, Issue 2, pp. 79-95, 2015. [YAGA16]O. Yagan and A. M. Makowski, “Wireless sensor networks under the random pairwise key predistribution scheme: can resiliency be achieved with small key rings?,” IEEE/ACM Transactions on Networking, vol. 24, pp. 3383-3396, 2016. [YANG17]C.N. Yang, J.M. Li, and Y.S. Chou, “On the analysis of k-Secure t-conference key distribution scheme,” ICCNS 2017 Proceedings of the 2017 the 7th International Conference on Communication and Network Security, pp. 91-95, ACM Proc. ISBN 978-1-4503-5349-6, Tokyo, Japan, Nov., 2017. [YANG21]C.N. Yang, C.L. Kao, and C.J. Wang, “Two-dimensional diagonal layer hash chain based key pre-distribution scheme,” Journal of Information Security and Applications, Article 103038, 2021. [ZHAO17]J. Zhao, “Topological properties of secure wireless sensor networks under the q-composite key predistribution scheme with unreliable links,” IEEE/ACM Transactions on Networking, vol. 25, pp. 1789-1802, 2017. [ZEMR19]H. Zemrane, Y. Baddi, and A. Hasbi, “Ehealth smart application of WSN on WWAN,” The 2nd International Conference on Networking, Information Systems & Security, 2019.
|