References(23)
[1]
Hu L., Zhang Z., and Wang F., Optimization of the deployment of temperature nodes based on linear programing in the internet of things, Tsinghua Science and Technology, vol. 18, no. 3, pp. 250-258, 2013.
[2]
Turkanovic M., Brumen B., and Holbl M., A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks based on the Internet of Things notion, Ad Hoc Networks, vol. 20, pp. 96-112, 2014.
[3]
Suganthi N. and Vembu S., Energy efficient key management scheme for wireless sensor networks, International Journal of Computers Communications Control, vol. 9, no. 1, pp. 71-78, 2014.
[4]
Novales R. L., Mittal N., and Sarac K., KAIT: A parameterized key assignment scheme for confidential communication in resource constrained ad hoc wireless networks, Ad Hoc Networks, vol. 20, pp. 163-181, 2014.
[5]
Su Z., Lin C., and Feng F. J., Key management schemes and protocols for wireless sensor networks, Journal of Software, vol. 18, no. 5, pp. 1218-1231, 2007.
[6]
Alcaraz C., Lopez J., and Roman R., Selecting key management schemes for WSN applications, Computers and Security, vol. 31, no. 8, pp. 956-966, 2012.
[7]
Cheng C., Qian Y., and Zhang D., An approach based on chain key predistribution against sybil attack in wireless sensor networks, International Journal of Distributed Sensor Networks, vol. 2013, p. 839320, 2013.
[8]
Bechkit W., Challal Y., and Bouabdallah A., A highly scalable key predistribution scheme for wireless sensor networks, IEEE Transactions on Wireless Communications, vol. 12, no. 2, pp. 948-959, 2013.
[9]
Boloorchi A. T., Samadzadeh M. H., and Chen T., Symmetric Threshold Multipath (STM): An online symmetric key management scheme, Information Sciences, vol. 268, pp. 489-504, 2014.
[10]
Paterson M. B. and Stinson D. R., A unified approach to combinatorial key predistribution scheme for sensor networks, Designs, Codes and Cryptography, vol. 71, no. 3, pp. 433-457, 2014.
[11]
Yarvis M., Kushalnagar N., and Singh H., Exploiting heterogeneity in sensor networks, in Proc. IEEE INFOCOM 2005, Miami, USA, 2005, pp. 878-890.
[12]
Zeng G., Wang B., and Mutka M., Efficient multicast for link-heterogeneous wireless mesh networks, in Proc. 28th International Performance Computing and Communications Conf., 2009, pp. 177-184.
[13]
Katiyar V., Chand N., and Soni S., Improving lifetime of large-scale wireless sensor networks through heterogeneity, in Proc. 2011 International Conference on Emerging Trends in Electrical and Computer Technology, Nagercoil, India, 2011, pp. 1032-1036.
[14]
Chen C. M., Zheng X., and Wu T. Y., A complete hierarchical key management scheme for heterogeneous wireless sensor networks, The Scientific World Journal, vol. 2014, p. 816549, 2014.
[15]
Wang Z. P. and Wang Z. T., Supernetworks Theory and Applications. New York, USA: Science Press, 2008.
[16]
Wang Z. P., Zhou S. B., and Guo J. F., Variational-inequality-based supernetworks model for network advertisement distribution, Journal of Dalian Maritime University, vol. 33, no. 4, pp. 26-30, 2007.
[17]
Han W. M. and Chen. X. L.An Introduction to Variational Inequality: Elecmentary Theory, Numerical Analysis and Applications, (in Chinese). Beijing, China: Higher Education Press, 2007.
[18]
Kim J. K. and Zhang B. T., Evolving hypernetworks for pattern classification, in Proc. 2007 IEEE Congress on Evolutionary Computation, Tokyo, Japan, 2007, pp. 1856-1862.
[19]
Erman A. T., Dilo A., and Hoesel L., On mobility management in multi-sink sensor networks for geocasting of queries, Sensors, vol. 11, no. 12, pp. 11415-11446, 2011.
[20]
Chen C. L., Tsai Y. T., and Castiglione A., Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks, Computer Science and Information Systems, vol. 10, no. 2, pp. 589-609, 2013.
[21]
Lee J. H. and Kwon T., GENDEP location-aware key management for general deployment of wireless sensor networks, International Journal of Distributed Sensor Networks, vol. 2014, p. 490202, 2014.
[22]
Haapola J., Shelby Z., and Pomalaza R. C., Cross-layer energy analysis of multi-hop wireless sensor network, in Proc. European Conference on Wireless Sensor Networks, Istanbul, Turkey, 2005, pp. 33-44.
[23]
Du W. L., Deng J., and Han Y. S., A key predistribution scheme for sensor networks using deployment knowledge, IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 1, pp. 62-77, 2006.