[1]
L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks, presented at the Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, (2002).
DOI: 10.1145/586110.586117
Google Scholar
[2]
H. Chan, A. Perrig, and D. Song, Random key predistribution schemes for sensor networks, presented at the Proceedings of Symposium on Security and Privacy, (2003).
Google Scholar
[3]
R. D. Pietro, L. V. Mancini, and A. Mei, Random key-assignment for secure Wireless Sensor Networks, presented at the Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, Fairfax, Virginia, (2003).
DOI: 10.1145/986858.986868
Google Scholar
[4]
D. Liu, P. Ning, and R. Li: ACM Transaction on Information System Security vol. 8(2005), pp.41-77, (2005).
Google Scholar
[5]
D. J. Malan, M. Welsh, and M. D. Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, presented at the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks(SECON), Santa Clara, California, USA, (2004).
DOI: 10.1109/sahcn.2004.1381904
Google Scholar
[6]
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus, TinyPK: securing sensor networks with public key technology, presented at the Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, Washington DC, USA, (2004).
DOI: 10.1145/1029102.1029113
Google Scholar
[7]
L. B. Oliveira, D. F. Aranha, C. P. L. Gouvêa, M. Scott, D. F. Câmara, J. López, et al.: Computer Communications vol. 34 (2011), pp.485-493.
Google Scholar
[8]
G. Yang and H. Cheng: Chinese Journal of Electronics vol. 36(2008), pp.1389-13958. In Chinese.
Google Scholar
[9]
RELIC Cryptographic Toolkit on http: /code. google. com/p /relic-toolkit.
Google Scholar
[10]
P. Levis, N. Lee, M. Welsh, and D. Culler, TOSSIM: accurate and scalable simulation of entire TinyOS applications, presented at the Proceedings of the 1st international conference on Embedded networked sensor systems, Los Angeles, California, USA, (2003).
DOI: 10.1145/958491.958506
Google Scholar
[11]
Avrora: The AVR Simulation and Analysis Framework on http: /compilers. cs. ucla. edu/ avrora.
Google Scholar
[12]
Special Publication 800-57: Recommendation for Key Management on http: /csrc. nist. gov/ CryptoToolkit/ kms/guideline-1-Jan03. pdf.
Google Scholar