1 |
J.Buchmann, E.Dahmen, and M.Szydlo, "Hash-based digital signature schemes," Post-quantum Cryptography, pp.35-93, 2009.
|
2 |
A.Burns et al., "SHIMMER-A wireless sensor platform for noninvasive biomedical research," IEEE Sensors Journal, vol.10, no.9, pp.1527-1534, 2010.
DOI
ScienceOn
|
3 |
M.Di Francesco, S.K.Das, and G.Anastasi, "Data collection in wireless sensor networks with mobile elements: A survey," ACM Trans. on Sensor Networks, vol.8, no.1, pp.1-31, 2011.
|
4 |
M. Johnson et al., "A comparative review of wireless sensor network mote technology," Proc of IEEE Sensors 2009, pp.1439-1442, 2009.
|
5 |
A.Perrig et al., "SPINS: Security protocols for sensor networks," Wireless networks, vol.8, no.5, pp.512-534, 2002.
|
6 |
A.Rasheed and R.Mahapatra "Secure data collection scheme in wireless sensor networks with mobile sink," Proc. IEEE Int. Symp. on Network Computing and Applications, pp.332-340, 2008.
|
7 |
A.Rasheed and R.Mahapatra "The three-tier security scheme in wireless sensor networks with mobile sinks," IEEE Trans. on Parallel and Distributed Systems, vol.23, no.5, pp.958-965, 2011.
|
8 |
H.Song, S.Zhu, W.Zhang, and G.Cao. "Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks," ACM Trans. on Sensor Networks, vol.4, no.4, pp.1-30, 2008.
|
9 |
M.A.Simplicio Jr, P.S.L.M.Barreto, C.B.Margi, and T.C.M.B.Carvalho, "A survey on key management mechanisms for distributed wireless sensor networks," Computer Networks, vol.54, no.15, pp.2591-2612, 2010.
DOI
ScienceOn
|
10 |
X.Xiao, V.K.Rayi, B.Sun, X.Du, F.Hu, and M.Galloway, "A survey of key management schemes in wireless sensor networks," Computer Communications, vol.30, pp.2314-2341, 2007.
DOI
ScienceOn
|
11 |
L.Zhou, J.Ni, and C.V.Ravishankar, "Supporting secure communication and data collection in mobile sensor networks," Proc. IEEE INFOCOM, pp.1-12, 2006.
|
12 |
S.Zhu, S.Setia, and S.Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks," ACM Trans. on Sensor Networks, vol.2, no.4, pp.500-528, 2006.
DOI
|
13 |
A.Rasheed and R.Mahapatra "Key predistribution schemes for establishing pairwise keys with a mobile sink in sensor networks," IEEE Trans. on Parallel and Distributed Sys., vol.22, no.1, pp.176-184, 2011.
DOI
ScienceOn
|
14 |
LAN-MAN Standards Committee of the IEEE Computer Socity, Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate personal area networks (LR-WPAN),
|