References
- C. Karlof, N. Sastry, and D. Wagner. Tinysec: a link layer security architecture for wireless sensor networks. In SenSys '04: Proceedings of the 2nd international conference on Embedded networked sensor systems, pages 162.175, New York, NY, USA, 2004.
- A. Liu and P. Ning. Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In IPSN '08: Proceedings of the 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008), pages 245.256, Washington, DC, USA, 2008.
- R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus. Tinypk: securing sensor networks with public key technology. In SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 59.64, New York, NY, USA, 2004.
- H. Chan and A. Perrig, PIKE: Peer Intermediaries for Key Establishment in Sensor Networks. In IEEE Proc. the 24th Annual Joint Conference of the IEEE Computer and Communications Societies Vol. 1, pp. 524-535, 2005.
- S. Zhu, S. Setia, and S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the 10th ACM conference on Computer and communications security, pp. 62 - 72, USA, 2003.
- A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. Tygar, SPINS: Security protocols for sensor networks, Wireless Networks, pp. 521-534, 2001.
- Zigbee Alliance, http://www.zigbee.org/en/index.asp
- L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks. In ACM Conference on Computer and Communications Security, pages 41.47, 2002.
- H. Chan, A. Perrig, and D. X. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, pages 197, 2003
- C. Karlof, Naveen Sastry, and David Wagner, TinySec: a link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on Embedded networked sensor systems, pp. 162 – 175, USA, 2004.
- N. T.T. Huyen and E. Huh. An efficient signal range based key pre-distribution scheme ensuring the high connectivity in wireless sensor network. In ICUIMC '08, pages 441.447, 2008.
- R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, P. Kruss, TinyPK: Securing sensor networks with public key technology, In Proceedings of the 2nd ACM workshop on Security of Ad Hoc and Sensor Networks, pp. 59-64, 2004, USA.
- W. Du, J. Deng, Y. S. Han, S. Chen, and P.K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In INFOCOM, 2004.
- W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In ACM Conference on Computer and Communications Security, pages 42.51, 2003.
- D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In Processings of the 10th ACM Conference on Computer and Communications Security (CCS), 2003.
- D. Liu and P. Ning. Improving key predistribution with deployment knowledge in static sensor networks. TOSN, 1(2):204. 239, 2005. https://doi.org/10.1145/1105688.1105691
- L. Zhou, J. Ni, and C. V. Ravishankar, Efficient Key Establishment for Group-based Wireless Sensor Deployments. In Proc. the 4th ACM Workshop on Wireless security, pp. 1-10, 2005.
- G. Li, J. He, and Y. Fu, A Hexagon-Based Key Predistribution Scheme in Sensor Networks. In Proc. of the 2006 International Conference Workshops on Parallel Processing, pp. 175-180, 2006.
- H.T.T. Nguyen, S. Na, G. Lee, and E. Huh. Accomplishment of the key setting up: The fexible approach. The 2008 World Congress in Computer Science, Computer Engineering, and Applied Computing, July 2008, U.S.A.
- D.W. Carman. New directions in sensor network key management. International Journal of Distributed Sensor Networks, Volume 1:3.15, 13-5, 2005.
- A. M. Hegland, E. Winjum, S. F. Mjolsnes, C. Rong, O. Kure, and P. Spilling, A Survey of Key Management in Ad Hoc Networks. In IEEE Communications Surveys & Tutorials, 3rd Quarter, Vol. 8, No. 3, pp. 48-66, 2006. https://doi.org/10.1109/COMST.2006.253271
- Y. Wang, G. Atterbury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Communications Surveys and Tutorials, 2nd Quarter, Vol. 8, No. 2, pp. 2-23, 2006. https://doi.org/10.1109/COMST.2006.315852
- A. Vaseashta and S. Vaseashta, A Survey of Sensor Network Security. Sensors and Transducers Journal, V.7, pp. 91, 2007.
- R. Maheshwari, J. Gao, S. R Das, "Detecting Wormhole Attacks in Wireless Networks using Connectivity Information", In IEEE INFOCOM, 2007, USA