[1]
D. W. Carman, P. S. Kruus, and B. J. Matt. Constraints and Approaches for Distributed Sensor Security, NAI Labs Tech. Rep. #00-010, (2000).
Google Scholar
[2]
N. Sastry and D. Wagner. Security Considerations for IEEE 802. 15. 4 Networks, Proc. 2004 ACM Wksp. Wireless Sec., 2004, pp.32-42.
Google Scholar
[3]
G. Yang, W. Chen and X. Cao. Wireless sensor network security, Beijing Science Press. (2010).
Google Scholar
[4]
L. Eschenauer and V. D. Gligor. A Key-Management Scheme for Distributed Sensor Networks, Proc. 9th ACM Conf. Comp. and Commun. Sec., 2002, pp.41-47.
DOI: 10.1145/586110.586117
Google Scholar
[5]
W. Du, J. Deng, Y. S. Han, S. Chen. A Pairwise Key Predistribution Scheme for Wireless Sensor Networks, Proc. 10th ACM Conf. Comp. Commun. Sec., 2003, pp.42-51.
Google Scholar
[6]
R. Blom An Optimal Class of Symmetric Key Generation Systems, " Proc. EUROCRYPT , 84 Wksp. Advances in Cryptology: Theory and App. of Cryptographic Techniques, 1985, pp.335-38.
Google Scholar
[7]
M. Steiner, G. Tsudik, M. Waidner, Key Agreement in Dynamic Peer Groups, IEEE Transactions on Parallel and Distributed Systems 11(8): 769-780, (2000).
DOI: 10.1109/71.877936
Google Scholar
[8]
B. Panja, S. K. Madria, and B. Bhargava. Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks, " SUTC '06: Proc. IEEE Int, l. Conf. Sensor Networks, Ubiquitous, and Trustworthy Comp., 2006, pp.384-93.
DOI: 10.1109/sutc.2006.1636204
Google Scholar
[9]
S. Zhu, S. Setia, and S. Jajodia. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks, Proc. 10th ACM Conf. Comp. and Commun. Sec., 2003, pp.62-72.
DOI: 10.1145/948109.948120
Google Scholar
[10]
A. Perrig, R. Szewczyk, J. Tygar, V. Wen, D. Culler. SPINS: Security protocols for sensor networks, ACM Wireless Network, 2002, 8(5): 521-534.
DOI: 10.1023/a:1016598314198
Google Scholar
[11]
J. Jang, T. Kwon, J. Song. A time-based key management protocol for wireless sensor networks, Information Security Practice and Experience, (2007) 314-328.
DOI: 10.1007/978-3-540-72163-5_24
Google Scholar
[12]
B. Maala, H. Bettahar, and A. Bouabdallah. TLA: A Tow Level Architecture for Key Management in Wireless Sensor Networks, pp.639-644, (2008).
DOI: 10.1109/sensorcomm.2008.36
Google Scholar
[13]
C. Kyung, Y. Minjung, C. Kijoon, and K. Mihui. An Enhanced Key Management Using ZigBee Pro for Wireless Sensor Networks, in Information Networking (ICOIN), 2012 International Conference on, 2012, pp.399-403.
Google Scholar
[14]
Certicom. Standards for Efficient Cryptography, SEC 1 : Elliptic Curve Cryptography, Ver 1. 0, September (2000).
Google Scholar
[15]
ZigBee Alliance, ZigBee-2007 Specification, January (2008).
Google Scholar
[16]
M. Younis, K. Ghumman, M. Eltoweissy. Location-Aware combinatorial key management scheme for clustered sensor networks, IEEE Trans. on Parallel and Distribution System, 2006, 17 (8): 865-882.
DOI: 10.1109/tpds.2006.106
Google Scholar
[17]
M. Eltoweissy, M. Moharrum, R. Mukkamala. Dynamic key management in sensor networks, IEEE Communications Magazine, 2006, 44(4): 122-130.
DOI: 10.1109/mcom.2006.1632659
Google Scholar
[18]
H. Chan, A. Perrig, D. Song. Random key predistribution schemes for sensor networks, In: Proc. of the 2003 IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 2003. 197-213.
Google Scholar
[19]
D. Liu, P. Ning. Establishing pairwise keys in distributed sensor networks, In: Proc. of the 10th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2003. 52-61.
DOI: 10.1145/948109.948119
Google Scholar
[20]
D. Liu, P. Ning. Location-Based pairwise key establishments for static sensor networks, In: Proc. of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2003. 72-82.
DOI: 10.1145/986858.986869
Google Scholar
[21]
W. Du, J. Deng, Y. S. Han, S. Chen, P. K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge, In: Proc. of the IEEE INFOCOM. Piscataway: IEEE Press, 2004. 586-597.
DOI: 10.1109/infcom.2004.1354530
Google Scholar
[22]
D. Huang, M. Mehta, D. Medhi, L. Harn. Location-Aware key management scheme for wireless sensor networks, In: Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2004. 29-42.
DOI: 10.1145/1029102.1029110
Google Scholar
[23]
H. Chan, A. Perrig. PIKE: Peer intermediaries for key establishment in sensor networks, In: Proc. of the IEEE INFOCOM 2005. Piscataway: IEEE Communication Society, 2005. 524-535.
DOI: 10.1109/infcom.2005.1497920
Google Scholar
[24]
S. A. Camtepe, B. Yener. Combinatorial design of key distribution mechanisms for wireless sensor networks, In: Proc. of the Computer Security—ESORICS. Berlin: Springer-Verlag, 2004. 293-308.
DOI: 10.1007/978-3-540-30108-0_18
Google Scholar
[25]
J. C. Lee, V. C. M. Leung, K. H. Wong, and J. Cao. Key management issues in wireless sensor networks: current proposals and future developments, IEEE Wireless Communications, vol. 14, pp.76-84 October (2007).
DOI: 10.1109/mwc.2007.4396946
Google Scholar
[26]
D. Aguayo, J. Bicket, S. Biswas, G. Judd, and R. Morris. Link-level measurements from an 802. 11b mesh network, In ACM SIGCOMM 2004, August (2004).
DOI: 10.1145/1030194.1015482
Google Scholar
[27]
Q. Huang, J. Cukier, H. Kobayashi, B. Liu, J. Zhang. Fast authenticated key establishment protocols for self-organizing sensor networks, " In: Proc. of the 2nd ACM Int, l Conf. on Wireless Sensor Networks and Applications. New York: ACM Press, 2003. 141-150.
DOI: 10.1145/941350.941371
Google Scholar
[28]
Z. Su, C. Lin, F. Feng and F. Ren. Key Management Schemes and Protocols for Wireless Sensor Networks, Journal of Software, May 2007, pp.1218-1231.
Google Scholar
[29]
X. Huang and M. Yang. Survey on Key Management for Wireless Sensor Networks, Application Research of Computers, March 2007, Vol 24, No. 3, pp.10-15.
Google Scholar