1. Avancha S, Undercoffer J L, Joshi A,et al. Secure Sensor Networks for Perimeter Protection [J].Computer Networks, November 2003,43(4): 421–435.
2. Perrig A, Szewczyk R, Wen V,et al. SPINS: Security Protocols for Sensor Networks [J].Wireless Networks, 2002,8 (5): 521–534.
3. Chan H, Perrig A, Song D. Random Key Pre-distribution Schemes for Sensor Networks [C]//Proceedings of the IEEE Symposium on Security and Privacy. Oakland, USA, May 11–14, 2003: 197–213.
4. Eschenauer L, Gligor V D. A Key management Scheme for Distributed Sensor Networks [C]//Proceedings of the 9th ACM Conference on Computer and Communication Security. Washington, D C, USA, Nov 18–22, 2002: 41–47.
5. Zhu L, Satia S, Jajodia S. LEAP: Effcient Security Mechanisms for Large-scale Distributed Sensor Networks [C]// Proceedings of ACM Conf on Computing and Communication Security (CCS' 2003). Washington, Oct 27–31, 2003: 62–72.