|
[1] Akyildiz, I.F., Weilian Su, Sankarasubramaniam, Y., Cayirci, E., \A survey on sensor networks," in IEEE Communications Magazine, Vol.40, no.8, pp.102 - 114, 2002. [2] Yun Zhou, Yuguang Fang, Yanchao Zhang, \Securing wireless sensor networks: a survey," in IEEE Communications Surveys & Tutorials, Vol.10, no.3, pp.6 - 28, 2008. [3] Xiaojiang Du, Hsiao-Hwa Chen, \Security in wireless sensor networks," in IEEE Wireless Communications, Vol.15, no.4, pp.60 - 66, 2008. [4] M. Boujelben, O.Cheikhrouhou, M. Abid, H. Youssef, \Establishing Pairwise Keys in Heterogeneous Two-Tiered Wireless Sensor Networks," in The Third International Conference on Emerging Security Information, Systems and Tech- nologies SECURWARE, Greec, 2009. [5] Kui Ren, Wenjing Lou, Yanchao Zhang, \LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks," in IEEE Transactions on Mobile Computing, Vol.7, no.5, pp.585 - 598, May 2008. [6] R. Blom, \An Optimal Class of Symmetric Key Generation Systems," in Ad- vances in Cryptology: PROCEEDINGS EUROCRYPT 84, Lecture Notes in Computer Science, vol.209, pp.335 - 38, 1985. [7] C. Blundo et al., \Perfectly-Secure Key Distribution for Dynamic Conferences," in Advances in Cryptology: CRYPTO' 92, Lecture Notes in Computer Science, vol.740, pp.471-486, 1993. [8] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, \SPINS:Security Protocols for Sensor Networks," in Proc. MobiCom, July 2001. [9] Kejie Lu, Yi Qian, Guizani, M., Hsiao-Hwa Chen, \A framework for a dis- tributed key management scheme in heterogeneous wireless sensor networks," in IEEE Transactions on Wireless Communications, Vol.7, no.2, pp.639 - 647, Feb 2008. [10] P. Traynor, R. Kumar, H. Choi, G. Cao, \E cient Hybrid Security Mecha- nisms for Heterogeneous Sensor Networks," in IEEE Transactions on Mobile Computing, Vol.6, no.6, pp.663 - 677, 2007. [11] S. Cui, A. Goldsmith, and A. Bahai, \Energy-e ciency of MIMO and coopera- tive MIMO techniques in sensor networks," in IEEE Journal on Selected Areas in Communications, Vol.22, no.6, pp.1089 - 1098, Aug 2004. [12] M.F. Younis, K. Ghumman, M. Eltoweissy, \Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks," in IEEE Transac- tions on Parallel and Distributed Systems, Vol.17, no.8, pp.865 - 882, 2006. [13] M.H. Guo, H.T. Liaw, D.J. Deng, H.C. Chao, \Cluster-based secure communi- cation mechanism in wireless ad hoc networks," in IET Information Security, Vol.4, no.4, pp.352 - 360, Dec 2010. [14] W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, \Energy-E cient Com- munication Protocol forWireless Microsensor Networks," in IEEE Proceedings of the Hawaii International Conference on System Sciences, pp.1 - 10, Jan 2000. [15] S. Lee, H.S. Lee, \Analysis of Network Lifetime in Cluster-Based Sensor Net- works," in IEEE Communications Letters, Vol.14, no.10, pp.900 - 902, Oct 2010. [16] Gicheol Wang, D. Choi, D. Kang, \Securing Wireless Sensor Networks Using Cluster Reformations," in IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Vol.2, pp.306 - 311, 2008. [17] Zhihong Liu, Jianfeng Ma, Qingqi Pei, Liaojun Pang, YoungHo Park, \Key Infection, Secrecy Transfer, and Key Evolution for Sensor Networks," in IEEE Transactions on Wireless Communications, Vol.9, no.8, pp.2643 - 2653, May 2010. [18] Yanchao Zhang, Wei Liu, Yuguang Fang, Dapeng Wu , \Secure localization and authentication in ultra-wideband sensor networks," in IEEE Journal on Selected Areas in Communications, Vol.24, no.4, pp.829 - 835, Apr 2006. [19] H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, \Toward resilient security in wireless sensor networks," in Proc. ACM MobiHoc '05, 2005. [20] F. Ye, H. Luo, S. Lu, and L. Zhang, \Statistical en-route ltering of injected false data in sensor networks," in Proc. IEEE INFOCOM '04, 2004. [21] S. Zhu, S. Setia, S. Jajodia, and P. Ning, \An interleaved hop-by-hop authen- tication scheme for ltering of injected false data in sensor networks," in Proc. IEEE Symp. Security and Privacy '04, May 2004. [22] a. Shamir, \How to share a secret," in Comm. ACM, vol.22, no.11, pp.612 - 613, Nov 1979.
|