References
- C. Karlof, N. Sastry, and D. Wagner. Tinysec: a linklayer security architecture for wireless sensornetworks. In SenSys '04: Proceedings of the 2ndinternational conference on Embedded networkedsensor systems, pages 162.175, New York, NY,USA, 2004.
- A. Liu and P. Ning. Tinyecc: A configurable libraryfor elliptic curve cryptography in wireless sensornetworks. In IPSN '08: Proceedings of the 2008International Conference on Information Processingin Sensor Networks (ipsn 2008), pages 245.256,Washington, DC, USA, 2008.
- R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn,and P. Kruus. Tinypk: securing sensor networkswith public key technology. In SASN '04:Proceedings of the 2nd ACM workshop on Securityof ad hoc and sensor networks, pages 59.64, NewYork, NY, USA, 2004.
- H. Chan and A. Perrig, PIKE: Peer Intermediariesfor Key Establishment in Sensor Networks. In IEEEProc. the 24th Annual Joint Conference of the IEEEComputer and Communications Societies Vol. 1,pp. 524-535, 2005.
- S. Zhu, S. Setia, and S. Jajodia, LEAP: efficientsecurity mechanisms for large-scale distributedsensor networks. In Proceedings of the 10th ACMconference on Computer and communicationssecurity, pp. 62 - 72, USA, 2003.
- A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.Tygar, SPINS: Security protocols for sensornetworks, Wireless Networks, pp. 521-534, 2001.
- Zigbee Alliance,http://www.zigbee.org/en/index.asp
- L. Eschenauer and V. D. Gligor, Akey-management scheme for distributed sensornetworks. In ACM Conference on Computer and Communications Security, pages 41.47, 2002.
- H. Chan, A. Perrig, and D. X. Song. Random keypredistribution schemes for sensor networks. InIEEE Symposium on Security and Privacy, pages197, 2003
- C. Karlof, Naveen Sastry, and David Wagner,TinySec: a link layer security architecture forwireless sensor networks. In Proceedings of the2nd international conference on Embeddednetworked sensor systems, pp. 162 – 175, USA,2004.
- N. T.T. Huyen and E. Huh. An efficient signalrange based key pre-distribution scheme ensuringthe high connectivity in wireless sensor network.In ICUIMC '08, pages 441.447, 2008.
- R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn,P. Kruss, TinyPK: Securing sensor networks withpublic key technology, In Proceedings of the 2ndACM workshop on Security of Ad Hoc and SensorNetworks, pp. 59-64, 2004, USA.
- W. Du, J. Deng, Y. S. Han, S. Chen, and P.K.Varshney. A key management scheme for wirelesssensor networks using deployment knowledge. InINFOCOM, 2004.
- W. Du, J. Deng, Y. S. Han, and P. K. Varshney. Apairwise key pre-distribution scheme for wirelesssensor networks. In ACM Conference onComputer and Communications Security, pages42.51, 2003.
- D. Liu and P. Ning. Establishing pairwise keys indistributed sensor networks. In Processings of the10th ACM Conference on Computer andCommunications Security (CCS), 2003.
- D. Liu and P. Ning. Improving key predistributionwith deployment knowledge in static sensornetworks. TOSN, 1(2):204. 239, 2005. https://doi.org/10.1145/1105688.1105691
- L. Zhou, J. Ni, and C. V. Ravishankar, EfficientKey Establishment for Group-based WirelessSensor Deployments. In Proc. the 4th ACMWorkshop on Wireless security, pp. 1-10, 2005.
- G. Li, J. He, and Y. Fu, A Hexagon-Based KeyPredistribution Scheme in Sensor Networks. InProc. of the 2006 International ConferenceWorkshops on Parallel Processing, pp. 175-180,2006.
- H.T.T. Nguyen, S. Na, G. Lee, and E. Huh.Accomplishment of the key setting up: The fexibleapproach. The 2008 World Congress in ComputerScience, Computer Engineering, and AppliedComputing, July 2008, U.S.A.
- D.W. Carman. New directions in sensor networkkey management. International Journal ofDistributed Sensor Networks, Volume 1:3.15,13-5, 2005.
- A. M. Hegland, E. Winjum, S. F. Mjolsnes, C.Rong, O. Kure, and P. Spilling, A Survey of KeyManagement in Ad Hoc Networks. In IEEECommunications Surveys & Tutorials, 3rdQuarter, Vol. 8, No. 3, pp. 48-66, 2006. https://doi.org/10.1109/COMST.2006.253271
- Y. Wang, G. Atterbury, and B. Ramamurthy, “ASurvey of Security Issues in Wireless SensorNetworks,” IEEE Communications Surveys andTutorials, 2nd Quarter, Vol. 8, No. 2, pp. 2-23,2006. https://doi.org/10.1109/COMST.2006.315852
- A. Vaseashta and S. Vaseashta, A Survey ofSensor Network Security. Sensors andTransducers Journal, V.7, pp. 91, 2007.
- R. Maheshwari, J. Gao, S. R Das, "DetectingWormhole Attacks in Wireless Networks usingConnectivity Information", In IEEE INFOCOM,2007, USA