1. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: 2003 Symposium on Security and Privacy, 2003, pp. 197–213. IEEE, May 2003
2. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47, November 2002
3. Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: IEEE INFOCOM 2004, vol. 1. IEEE, March 2004
4. Lin, C., Wu, G.: Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach. J. Supercomput. 66, 989–1007 (2013). https://doi.org/10.1007/s11227-013-0965-0
5. Ford, B.: An overview of hot-deck procedures. In: Incomplete Data in Sample Surveys, vol. 2 (1983)