[1]
Information on Smart Dust. http://robotics.eecs.berkeley.edu/~pister/SmartDust/
Google Scholar
[2]
C.Y. Chen and H.C. Chao: A survey of key distribution in wireless sensor networks, Security and Communication Networks, published online 2011.
Google Scholar
[3]
G. Tia, D. Greenspan, M. Welsh, R. Juang, and A. Alm: Vital Signs Monitoring and Patient Tracking Over a Wireless Network, in Conference of the Engineering in Medicine and Biology Society, (2005), 102-105.
DOI: 10.1109/iembs.2005.1616352
Google Scholar
[4]
C. Otto, C. Sanders, and E. Jovanov: System architecture of a wireless body area sensor network for ubiquitous health monitoring, Journal of Mobile Multimedia, 1, (2006), 307-326.
Google Scholar
[5]
D.J. Malan, M. Welsh, and M.D. Smith: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in Conference of Sensor and Ad Hoc Communications and Networks (SECON), (2004), 71-80.
DOI: 10.1109/sahcn.2004.1381904
Google Scholar
[6]
K. Chintalapudi, T. Fu, J. Paek, N. Kothari, S. Rangwala, J. Caffrey, R. Govindan, E. Johnson, and S. Masri: Monitoring civil structures with a wireless sensor network, Journal of Internet Computing, IEEE, 10, (2006), 26-34.
DOI: 10.1109/mic.2006.38
Google Scholar
[7]
A.S.K. Pathan, L. Hyung-Woo, and H. Choong Seon: Security in wireless sensor networks: issues and challenges, in Internation Conference of Advanced Communication Technology(ICACT), (2006), 1043 - 1048.
DOI: 10.1109/icact.2006.206151
Google Scholar
[8]
D. Kundur, W. Luh, U.N. Okorafor, and T. Zourntos: Security and Privacy for Distributed Multimedia Sensor Networks, Proceedings of the IEEE, 96, (2008), 112-130.
DOI: 10.1109/jproc.2007.909914
Google Scholar
[9]
L. Eschenauer and V. D. Gligor: A key-management scheme for distributed sensor networks, in Proceedings of the 9th ACM Conference on Computer and Communications Security, (2002), 41-47.
DOI: 10.1145/586110.586117
Google Scholar
[10]
B. Parno, A. Perrig, and V. Gligor: Distributed detection of node replication attacks in sensor networks, in IEEE Symposium on Security and Privacy, (2005), 49-63.
DOI: 10.1109/sp.2005.8
Google Scholar
[11]
Z. Bo, S. Setia, S. Jajodia, S. Roy, and W. Lingyu: Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks, IEEE Transactions on Mobile Computing, 9, (2010), 913-926.
DOI: 10.1109/tmc.2010.40
Google Scholar
[12]
W. Yong, G. Attebury, and B. Ramamurthy: A survey of security issues in wireless sensor networks, IEEE Journal of Communications Surveys & Tutorials, 8, (2006), 2-23.
DOI: 10.1109/comst.2006.315852
Google Scholar