[1]
J. Zhang, V. Varadharajan, Wireless sensor network key management survey and taxonomy, Journal of Network and Computer Applications, vol. 33, no. 2, pp.63-75, (2010).
DOI: 10.1016/j.jnca.2009.10.001
Google Scholar
[2]
W. Heinzelman, A. Chandrakasan and H. Balakrishnan, Energy-efficient communication protocol for WSNs, in Proc. of the 33rd Hawaii International Conference on System Sciences, Washington, (2000).
DOI: 10.1109/hicss.2000.926982
Google Scholar
[3]
Abdoulaye Diop, Yue Qi, Qin Wang, Shariq Hussain, An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks, . International Journal of Computer Science Issues (IJCSI), Vol. 10 Issue 1, p.490.
Google Scholar
[4]
Y. Cheng and D. Agrawal, An improved key distribution mechanism for large-scale hierarchical wireless sensor networks, Ad Hoc Networks (Elsevier), vol. 5, no. 1, pp.35-48, (2007).
DOI: 10.1016/j.adhoc.2006.05.011
Google Scholar
[5]
L. B. Oliveira, A. Ferreira, M. A. Vilaca, et al., SecLEACH-on the security of clustered sensor networks, Signal Processing, vol. 87, no. 12, pp.2882-2895, (2007).
DOI: 10.1016/j.sigpro.2007.05.016
Google Scholar
[6]
P. Banerjee, D. Jacobson and S. N. Lahiri, Security and performance analysis of a secure clustering protocol for sensor networks, in Proc. 6th IEEE Intl. Symposium on Network Computing and Applications, 2007, pp.145-152.
DOI: 10.1109/nca.2007.40
Google Scholar
[7]
D. Liu and P. Ning, Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks, in Proc. of the 10th Annual Network and Distributed System Security Symposium, California, (2003).
Google Scholar
[8]
Otway D, and O. Rees, Efficient and Timely Mutual Authentication, Operating Systems Review, 21 (1987), 8-10.
DOI: 10.1145/24592.24594
Google Scholar