1.
MICA2 Wireless Measurement System, Crossbow Technology, http://www.xbow.com, 2011.
2.
www.tinyos.net/
3.
R. D. Pietro, L. V. Mancini, A. Mei, And A. Panconesi, J. Radhakrishnan, Redoubtable Sensor Networks, ACM Transactions on Information and Systems Security, Vol. 11, No. 3, Article 13, Pub. date: March 2008
4.
P. Erdos and A. Renyi, “On the Evolution of Random Graphs†Publ. Math. Inst. Hungar. Acad. Sci., vol. 5, pp. 17-61, 1960.
5.
W. Diffie, M. E. Hellman, “New directions in cryptographyâ€, IEEE Transactions on Information Theory, vol. 22, pp. 644–654, November 1976.
6.
R. L. Rivest, A. Shamir, and L. M. Adleman, “A method for obtaining digital signatures and public-key cryptosystemsâ€, Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
7.
John Kohl and B. Clifford Neuman. The Kerberos Network Authentication Service (Version 5). Internet Request for Comments RFC-1510. September 1993
8.
Dierks, T., Allen, C. 1999.: The tls protocol version 1.0.
9.
Adrian Perrig, Robert Szewczyk, J.D. Tygar et al., “SPINS: Security Protocols for Sensor Networksâ€, Wireless Networks 8, 521.534, 2002-2002 Kluwer Academic Publishers Netherlands.
10.
Bocheng Lai, Sungha Kim,Ingrid Verbauwhede. "Scalable Session Key Construction Protocols for Wireless Sensor Networks." Proceedings of the IEEE Workshop on Large Scale RealTime and Embedded Systems (LARTES '02). usa, 2002.
11.
Eschenauer, L. and Gligor, V. D. 2002. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security (Washington, DC, USA, November 18 - 22, 2002). V. Atluri, Ed. CCS '02. ACM, New York, NY, 41-47. DOI= http://doi.acm.org/10.1145/586110.586117.
12.
Chan, H., Perrig, A., and Song, D. 2003. Random Key Predistribution Schemes for Sensor Networks. In Proceedings of the 2003 IEEE Symposium on Security and Privacy (May 11 - 14, 2003). SP. IEEE Computer Society, Washington, DC, 197-213.
13.
R. Blom. An optimal class of symmetric key generation systems. Advances in Cryptology: Proceedings of EUROCRYPT 84 (Thomas Beth, Norbert Cot, and Ingemar Ingemarsson, eds.), Lecture Notes in Computer Science, Springer-Verlag, 209:335–338, 1985.
14.
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. In Advances in Cryptology – CRYPTO ’92, LNCS 740, pages 471–486, 1993.
15.
W. Du, J. Deng, Y.S. Han, and P.K. Varshney, “A Pairwise Key Predistribution Scheme for Wireless Sensor Networks,†Proc. 10th ACM Conf. Computer and Comm. Security (CCS ’03), pp. 42-51, 2003.
16.
D. Liu and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,†Proc. 10th ACM Conf. Computer and Comm. Security (CCS ’03), pp. 52-61, 2003.
17.
D. Liu, P. Ning, and R. Li, “Establishing Pairwise Keys in Distributed Sensor Networks,†ACM Trans. Information Systems Security, vol. 8, no. 1, pp. 41-77, 2005.
18.
Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen, and Pramod K. Varshney, A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge, 2004. Twenty-third Annual Joint Conference of the INFOCOM 2004. IEEE Computer and Communications Societies. Volume: 1, 7-11 March 2004, DOI: 10.1109/INFCOM.2004.1354530
19.
Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod K. Varshney, A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. IEEE Transactions On Dependable And Secure Computing, Vol. 3, No. 1, January-March 2006
20.
Cungang Yang, Jie Xiao, Location-Based Pairwise Key Establishment and Data Authentication for Wireless Sensor Networks, Proceedings of the 2006 IEEE Workshop on Information Assurance United States Military Academy, West Point, NY
21.
Fang Liu, and Xiuzhen Cheng LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks, IEEE Transactions On Wireless Communications, Vol. 7, No. 1, January 2008
22.
Zhen Yu, and Yong Guan, A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks, IEEE Transactions On Parallel And Distributed Systems, Vol. 19, No. 10, October 2008
23.
Liran Ma, Xiuzhen Cheng, Member, Fang Liu, Fengguang An, and Jose Rivera, iPAK: An In Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks, IEEE Transactions On Parallel And Distributed Systems, Vol. 18, No. 8, August 2007
24.
Sajid Hussain and Md Shafayat Rahman, Laurence T. Yang, Key Predistribution Scheme using Keyed-Hash Chain and Multipath Key Reinforcement for Wireless Sensor Networks, IEEE Conference on Pervasive Computing and Communication, Galveston, TX, 9-13 March 2009, DOI: 10.1109/PERCOM.2009.4912893.
25.
Sujun Li, Boqing Zhou, Jingguo Dai, and Xingming Sun, A Secure Scheme of Continuity Based on Two-Dimensional Backward Hash Key Chains for Sensor Networks, IEEE Wireless Communications Letters, Vol. 1, No. 5, October 2012
26.
D. Gay, P. Levis, R. V. Behren, M. Welsh, E. Brewer, and D. Culler, “The nesC Language: A Holistic Approach to Networked Embedded Systemsâ€, In Proceedings of Programming Language Design and Implementation (PLDI) 2003, June 2003.
27.
P. Levis, N. Lee, M. Welsh, and D. Culler, "TOSSIM: Accurate and scalable simulation of entire TinyOS applications", in Proceedings of the First ACM Conference on Embedded Networked Sensor Systems (SenSys) 2003, Nov. 2003.