1 |
I. F. Akyildiz, and W. Su, Weilian, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, August, 2002. Article (CrossRef Link).
DOI
|
2 |
X. Chen, K. Makki, K. Yen and N. Pissinou, “Sensor network security: a survey,” IEEE Communications Surveys & Tutorials, vol. 11, no. 2, pp. 52-73, 2009. Article (CrossRef Link).
DOI
|
3 |
J. Zhang, and V. Varadharajan, “Wireless sensor network key management survey and taxonomy,” Journal of Network and Computer Applications, vol. 33, no. 2, pp. 63-75, March, 2010. Article (CrossRef Link).
DOI
|
4 |
L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proc. of 9th ACM Conf. on Computer and Communications Security, pp. 41-47, November 18-22, 2002. Article (CrossRef Link).
|
5 |
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. of 2003 Symposium on Security and Privacy, pp. 197-213, May 11-14, 2003. Article (CrossRef Link).
|
6 |
W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, “A pairwise key predistribution scheme for wireless sensor networks,” ACM Transactions on Information and System Security, vol. 8, no. 2, pp. 228–258, May, 2005. Article (CrossRef Link).
DOI
|
7 |
S. Zhu, S. Setia, and S. Jajodia, “LEAP+: Efficient security mechanisms for large-scale distributed sensor networks,” ACM Transactions on Sensor Networks, vol. 2, no. 4, pp. 500–528, November, 2006. Article (CrossRef Link).
DOI
|
8 |
M. Yarvis, N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu, and S. Singh, "Exploiting heterogeneity in sensor networks," in Proc. of 24th Annual Joint Conf. of the IEEE Computer and Communications Societies, pp. 878-890, March 13-17, 2005. Article (CrossRef Link).
|
9 |
X. Du, Y. Xiao, M. Guizani, and H. Chen, “An effective key management scheme for heterogeneous sensor networks,” Ad Hoc Networks, vol. 5, no. 1, pp. 24-34, January, 2007. Article (CrossRef Link).
DOI
|
10 |
Traynor, R. Kumar, H. Choi, G. Cao, S. Zhu, and T. La Porta, “Efficient hybrid security mechanisms for heterogeneous sensor networks,” IEEE Transactions on Mobile Computing, vol. 6, no. 6, pp. 663-677, June, 2007. Article (CrossRef Link).
DOI
|
11 |
G. J. Popek, and C. S. Kline, “Encryption and secure computer networks,” ACM Computing Surveys, vol. 11, no. 4, pp. 331-356, December, 1979. Article (CrossRef Link).
DOI
|
12 |
D. Malan, M. Welsh, and M. Smith, "A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography," in Proc. of 1st Annual IEEE Communications Society Conf. on Sensor and Ad Hoc Communications and Networks, pp. 71-80, October 4-7, 2004. Article (CrossRef Link).
|
13 |
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in Proc. of 3rd IEEE Int. Conf. on Pervasive Computing and Communications, pp. 324-328, March 8-12, 2005. Article (CrossRef Link).
|
14 |
N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, pp. 203–209, 1987. Article (CrossRef Link).
DOI
|
15 |
R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120-126, February, 1978. Article (CrossRef Link).
DOI
|
16 |
R. Azarderakhsh, A. Reyhani-Masoleh, and Z. Abid, "A key management scheme for cluster based wireless sensor networks," in Proc. of IEEE/IFIP Int. Conf. on Embedded and Ubiquitous Computing, pp. 222-227, December 17-20, 2008. Article (CrossRef Link).
|
17 |
W. Abdallah, N. Boudriga, D. Kim, and S. An, "An efficient and scalable key management mechanism for wireless sensor networks," in Proc. of 16th Int. Conf. on Advanced Communication Technology, pp. 687-692, February 16-19, 2014. Article (CrossRef Link).
|
18 |
X. Du, M. Guizani, Y. Xiao, and H. Chen, “A routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp. 1223-1229, March, 2009. Article (CrossRef Link).
DOI
|
19 |
K. Lu, Y. Qian, M. Guizani, and H. Chen, “A framework for a distributed key management scheme in heterogeneous wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 2, pp. 639-647, February, 2008. Article (CrossRef Link).
DOI
|
20 |
D. Kim, S. Kang, and S. An, "Energy efficient time synchronization for target tracking in heterogeneous sensor networks," in Proc. of 8th Int. Conf. for Internet Technology and Secured Transactions, pp. 238-243, December 9-12, 2013. Article (CrossRef Link).
|
21 |
F. Simjee and P. H. Chou, "Everlast: long-life, supercapacitor-operated wireless sensor node," in Proc. of 2006 Int. Symposium on Low Power Electronics and Design, pp. 197-202, October 4-6, 2006. Article (CrossRef Link).
|
22 |
X. Du, and F. Lin, “Maintaining differentiated coverage in heterogeneous sensor networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2005, no. 4, pp. 565-572, September, 2005. Article (CrossRef Link).
DOI
|
23 |
W. Leveque, Elementary theory of numbers, Dover, 1990.
|
24 |
D. Liu, and P. Ning, “Multilevel μTESLA: Broadcast authentication for distributed sensor networks,” ACM Transactions on Embedded Computing Systems, vol. 3, no. 4, pp. 800-836, November, 2004. Article (CrossRef Link).
DOI
|
25 |
Certicom Research, "Standards for efficient cryptography, SEC 1: Elliptic Curve Cryptography," Version 2.0, May, 2009. Article (CrossRef Link).
|
26 |
F. K. Cameron and D. G. Patrick, “Digital signature standard (DSS),” U.S. Department of Commerce, FIPS PUB 186-4, 2013.
|
27 |
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “SPINS: Security protocols for sensor networks,” Wireless Networks, vol. 8, no. 5, pp. 521-534, September, 2002. Article (CrossRef Link).
DOI
|
28 |
K. Ren, S. Yu, W. Lou, and Y. Zhang, “Multi-user broadcast authentication in wireless sensor networks,” IEEE Transactions on Vehicular Technology, vol. 58, no. 8, pp. 4554-4564, October, 2009. Article (CrossRef Link).
DOI
|
29 |
L. Lamport, “Password authentication with insecure communication,” Communications of the ACM, vol. 24, no. 11, pp. 770-772, November, 1981. Article (CrossRef Link).
DOI
|
30 |
H. Alzaid, D. Park, J. G. Nieto, C. Boyd, and E. Foo, “A forward and backward secure key management in wireless sensor networks for pcs/scada,” Sensor Systems and Software, pp. 66-82, 2010. Article (CrossRef Link).
|
31 |
C. E. Perkins, and E. M. Royer, "Ad-hoc on-demand distance vector routing," in Proc. of 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp. 90-100, February 25-26, 1999. Article (CrossRef Link).
|
32 |
E. W. Weisstein, "Circle-circle intersection" MathWorld-A Wolfram Web Resource, Available: http://mathworld.wolfram.com/Circle-CircleIntersection.html. Article (CrossRef Link).
|