[1]
Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: Security protocols for sensor networks. In: Proc. of the 7th Annual Int'l Conf. on Mobile Computing and Networks. Rome: ACM Press, 2001. 189−199.
DOI: 10.1145/381677.381696
Google Scholar
[2]
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: A survey. Computer Networks, 2002,38(4):393−422.
DOI: 10.1016/s1389-1286(01)00302-4
Google Scholar
[3]
Zhu S, Setia S, Jajodia S. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In: Proc. of the 10th ACM Conf. on Computer and Communications Security (CCS 2003). Washington D.C., 2003. 62−72.
DOI: 10.1145/948109.948120
Google Scholar
[4]
J. Deng, R. Han, S. Mishra, Defending against path-based DoS attacks in wireless sensor networks, in: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks SASN-2005, 2005, 89–96.
DOI: 10.1145/1102219.1102235
Google Scholar
[5]
M. Manzo, T. Roosta, Time synchronization attacks in sensor networks, in: Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), 2005, p.107–116.
DOI: 10.1145/1102219.1102238
Google Scholar
[6]
Zhang W, Cao G. Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-basedapproach. http://www.cse.psu.edu/~wezhang/papers/paper-infocom05.pdf
DOI: 10.1109/infcom.2005.1497918
Google Scholar
[7]
Malan DJ, Welsh M, Smith MD. A public-key infrastructure for key distribution in Ting OS based on elliptic curve cryptography.http://airclic.eecs.harvard.edu/publications/secon04.pdf
DOI: 10.1109/sahcn.2004.1381904
Google Scholar
[8]
Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. In: Proc. of the IEEE Symp. on Research in Security and Privacy. Oakland: IEEE Computer Society, 2003. 197−213.
Google Scholar
[9]
Du WL, Wang RH, Ning P. An efficient scheme for authenticating public keys in sensor networks. In: Proc. of the 6th ACM Int'l Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc 2005). Urbana-Champaign: ACM Press, 2005. 58−67.
DOI: 10.1145/1062689.1062698
Google Scholar
[10]
Eschenauer L, Gligor VD. A key-management scheme for distributed sensor networks. In: Proc. of the 9th ACM Conf. onComputer and Communications Security. Washington DC: ACM Press, 2002. 41−47.
DOI: 10.1145/586110.586117
Google Scholar
[11]
A.Chadha, Y. Liu, S.K. v, Group key distribution via local collaboration in wireless sensor networks, in: Proc. IEEE SECON 05, 2005, 46–54.
DOI: 10.1109/sahcn.2005.1556863
Google Scholar