[1]
L. Eschenauer, V.D. Gligor, A key management scheme for distributed sensor networks. In: Proceedings of (CCS '02. ), pp.41-47, Washington, (2002).
Google Scholar
[2]
H. Chan, A. Perrig, and D. Song, Random key pre distribution schemes for sensor networks, In IEEE Symposium on Research in Security and Privacy, (2003).
Google Scholar
[3]
X. Du, Y. Xiao, M. Guizani, and H. -H. Chen. An effective key management scheme for heterogeneous sensor networks, Ad Hoc Networks, 5(1): 24–34, (2007).
DOI: 10.1016/j.adhoc.2006.05.012
Google Scholar
[4]
S. Hussain., F. Kausar, A. Masood, An efficient key distribution scheme for heterogeneous sensor networks. In: the international conference on wireless communications and mobile computing, pp.388-392. Hawaii(2007).
DOI: 10.1145/1280940.1281023
Google Scholar
[5]
P. Gupta and P. Kumar, The capacity of wireless networks, IEEE Transactions on Information Theory IT 2000, vol. IT-46(2), p.388–404, (2000).
DOI: 10.1109/18.825799
Google Scholar
[6]
X. Du, Y. Xiao, M. Guizani, H.H. Chen, An Effective Key Management Scheme for Heterogeneous Sensor Networks, Ad Hoc Networks, Elsevier, vol. 5, issue 1, 2007, p.24–34.
DOI: 10.1016/j.adhoc.2006.05.012
Google Scholar
[7]
J. R. Douceur, The Sybil Attack, " in 1st International Workshop on Peer-to- Peer Systems (IPTPS , 02), March (2002).
Google Scholar
[8]
Y.C. Hu, A. Perrig, and D. B. Johnson, Wormhole detection in wireless ad hoc networks, Department of Computer Science, Rice University, Tech. Rep. TR01-384, June (2002).
Google Scholar
[9]
S. A. Camtepe and B. Yener, Key Distribution Mechanisms for Wireless Sensor Networks: a Survey, Department of Computer Science, Rensselaer Polytechnic Institute, Technical Report TR-05- 07, March 23, (2005).
Google Scholar
[10]
R. Blom, An optimal class of symmetric key generation systems, Advances in Cryptology: Proceedings of EUROCRYPT 84, Lecture Notes in Computer Science, Springer-Verlag, 1985, 209: 335–338.
DOI: 10.1007/3-540-39757-4_22
Google Scholar
[11]
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, Perfectly-secure key distribution for dynamic conferences, Lecture Notes in Computer Science, 1993, 740: 471–486.
DOI: 10.1007/3-540-48071-4_33
Google Scholar
[12]
G. Xing, X. Wang, Y. Zhang, C. Lu, R. Pless, and C. Gill, Integrated Coverage and Connectivity Configuration for Energy Conservation in Sensor Networks, ACM Transactions on Sensor Networks, (2005).
DOI: 10.1145/1077391.1077394
Google Scholar
[13]
T. Yan, T. He, and J. Stankovic, Differentiated Surveillance for Sensor Networks, in ACM SenSys, (2003).
Google Scholar
[14]
Z. Abrams, A. Goel, and S. Plotkin, Set K-Cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks, in ACM/IEEE IPSN, (2004).
DOI: 10.1145/984622.984684
Google Scholar
[15]
C. Hsin and M. Liu, Network Coverage using Low Duty- Cycled Sensors; Random and Coordinated Sleep Algorithms, in ACM/IEEE IPSN, (2004).
DOI: 10.1145/984622.984685
Google Scholar
[16]
J. Hwang, T. He, and Y. Kim, Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks, in ACM SenSys, (2007).
Google Scholar
[17]
S. Kumar, T. Lai, and A. Arora, Barrier Coverage With Wireless Sensors, in ACM MobiCom, (2005).
Google Scholar
[18]
X. Luo, M. Dong, and Y. Huang, On Distributed Fault-Tolerant Detection in Wireless Sensor Networks, IEEE Transactions on Computers, vol. 55, no. 1, p.58–70, (2006).
DOI: 10.1109/tc.2006.13
Google Scholar
[19]
T. Clouqueur, K. K. Saluja, and P. Ramanathan, Fault Tolerance in Collaborative Sensor Networks for Target Detection, IEEE Transactions on Computers, vol. 53, no. 3, p.320–333, (2004).
DOI: 10.1109/tc.2004.1261838
Google Scholar
[20]
N. Katenka, E. Levina, and G. Michailidis, Local Vote Decision Fusion for Target Detection in Wireless Sensor Networks, IEEE Transactions on Signal Processing, vol. 56, no. 1, p.329–338, (2008).
DOI: 10.1109/tsp.2007.900165
Google Scholar
[21]
M. Yarvis et al., Exploiting Heterogeneity in Sensor Networks, IEEE INFOCOM, (2005).
Google Scholar