References
- Anderson R, Chan H, Perrig A, "Key infection: smart trust for smart dust," in Proc. of 12th IEEE international conference on network protocols, pp 206-215, 2004.
- Carman DW, Kruus PS, Matt BJ, "Constraints and approaches for distributed sensor network security," NAI Labs Technical Report #00-010, 2000.
- Yick J, Mukherjee B, Ghosal D, "Wireless Sensor Network Survey," Computer networks 52(12), pp 2292-2330, 2008. https://doi.org/10.1016/j.comnet.2008.04.002
- Yoneki E, Bacon J, "A Survey of wireless sensor network technologies:research trends and middleware's role," University of Cambridge TR 646, Cambridge, 2005.
- Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E, "A survey on sensor networks," IEEE communication magazine 40(8), pp 102-114, 2002. https://doi.org/10.1109/MCOM.2002.1024422
- Li, Wenjia, and Houbing Song, "ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks," IEEE Transactions on Intelligent Transportation Systems 17(4), pp. 960-969, 2016. https://doi.org/10.1109/TITS.2015.2494017
- Yang Jiachen, Jianxiong Zhou, Zhihan Lv, Wei Wei, and Houbing, "A real-time monitoring system of industry carbon monoxide based on wireless sensor networks," Sensors 15(11), pp 29535-29546, 2015. https://doi.org/10.3390/s151129535
- Zhang J, Vardharajan V, "Wireless sensor network Survey and taxonomy," Journal of Network and computer applications 33(2)", pp 63-75, 2010. https://doi.org/10.1016/j.jnca.2009.10.001
- Alemdar A, Ibnkahla M, "Wireless Sensor Networks:applications and challenges," in Proc. of 9th international symposium on signal processing and its applications, pp 1-6, 2007.
- Xiao Y, Rayi VK, Sun B, Du X, Hu F, Galloway M, "A survey of key management schemes in wireless sensor networks," Computer communication 30(11), pp 2314-2341, 2007. https://doi.org/10.1016/j.comcom.2007.04.009
- Jilna P, Pattathil DP, "A key Management Technique based on Elliptic Curves for Static Wireless Sensor Network," Security communication networks, pp 3726-3738, 2015.
- Baojiang Cui, Ziyue Wang, Bing Zhao, Xiaobing Liang, and Yuemin Ding, "Enhanced Key Management Protocols for Wireless Sensor Networks," Mobile Information Systems, vol. 2015, Article ID 627548, 10 pages, 2015.
- Liu A, Kampanakis P, Ning P, "TinyECC:eliptic curve cryptography for sensor networks," TinyECC Software, 2007.
- Watro R, Kong D, Cuti Sf, Gardiner C, Lynn C Kruus P, "Tinypk: Securing sensor networks with public key technology," in Proc. of 2nd ACM workshop on security of ad hoc and sensor networks, pp 59-64, 2004.
- Eschenauer L, Gligor VD, "A key management scheme for distributed sensor networks," in Proc. of 9th ACM conference on computer and communications security, pp 41-47, 2002.
- Ahmadi, Ali, et al., "An efficient routing algorithm to preserve k-coverage in wireless sensor networks," The Journal of Supercomputing 68(2), pp 599-623, 2014. https://doi.org/10.1007/s11227-013-1054-0
- Naranjo, Paola G. Vinueza, et al., "P-SEP: a prolong stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks," The Journal of Supercomputing, pp, 1-23, 2016.
- Mostafaei, Habib, and Mohammad Reza Meybodi, "An energy efficient barrier coverage algorithm for wireless sensor networks," Wireless personal communications 77(3), pp. 2099-2115, 2014. https://doi.org/10.1007/s11277-014-1626-1
- Zhu S, Setia S, Jajodia S, "Leap: Efficient security mechanisms for large-scale distributed sensor networks," in Proc. of 10th ACM conference on computer and communications security, 2003.
- Blom R, "an optimal class of symmetric key generation systems," Brickel EF(ed) Cryptographic LNCS, vol. 740, Springer, Heidelberg, pp 471-486, 1985.
- Blundo C, De Santis A, Herzberg A, Kutten S, Vaccaro U, Yung M, "perfectly-secure key distribution for dynamic conference," Brickel EF(ed) Cryptographic LNCS, vol. 740, Springer, Heidelberg, pp 471-486, 1993.
- Liu D, Ning P, Li R, "Establising pairwise keys in distributed sensor network," ACM transactions information systems Security 8(1), pp 41-77, 2005. https://doi.org/10.1145/1053283.1053287
- Chan H, Perrig A, Song D, "Random key pre-distribution scheme for sensor networks," in Proc. ofIEEE symposium on security and privacy, pp 197-213, 2003.
- Liu D, Ning P, "establishing pairwise keys in distributed sensor networks," in Proc. of 10th ACM CSS'03 Washington DC, 2003.
- Zuhu S, Setia S, Jajodia S, "Leap+: efficient security mechanisms for large-scale distributed sensor networks," ACM Transactions sensor networks (TOSN) 2(4), pp. 500-528. https://doi.org/10.1145/1218556.1218559
- Das AK, "A random key establishment scheme for multi-phase deployment in large-scale distributed sensor network," International journal of information security 11(3)", pp.189-211, 2012. https://doi.org/10.1007/s10207-012-0162-9
- Castelluccia C, Spognardi A, "Rok: a robust key pre-distribution protocol for multi-phase wireless sensor networks," in Proc. of IEEE third international conference on security and privacy in communications networks and the workshop, pp. 351-360, 2007.
- Rahman M, Sampalli S, "An Efficient Pairwise and Group Key Management Protocol for Wireless Sensor Network," Wirel Personal Communication 84(3):2035-2053, 2015. https://doi.org/10.1007/s11277-015-2546-4
- Sarimuraat S, Levi A, "HaG:hash graph based key pre-distribution scheme for multiphase wireless sensor networks," in Proc. of IEEE international conference on communications(ICC), PP:2079-2083, 2013.
- Suganthi N, Vembu S, "An efficient pairwise and group key management protocol for wireless sensor network," International Journal of computer communication and control 9(1), pp. 71-78, 2014. https://doi.org/10.15837/ijccc.2014.1.235
- Huyen, N. T. T., Jo, M., Nguyen, T.-D. and Huh, E.-N., "A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks," Security Comm. Networks, vol.5(5), pp 485-495, May 2012. https://doi.org/10.1002/sec.337
- I. Butun, M. Erol-Kantarci, B. Kantarci and H. Song, "Cloud-centric multi-level authentication as a service for secure public safety device networks," IEEE Communications Magazine, vol. 54, no. 4, pp. 47-53, April 2016. https://doi.org/10.1109/MCOM.2016.7452265
- Q. Xu, P. Ren, H. Song and Q. Du, "Security Enhancement for IoT Communications Exposed to Eavesdroppers with Uncertain Locations," IEEE Access, vol. 4, pp. 2840-2853, 2016. https://doi.org/10.1109/ACCESS.2016.2575863