References
- Carman , David W. , Kruus , Peter S. and Matt , Brian J. 2000 . Constraints and approaches for distributed sensor network security . NAI Labs Technical Report #00–010 , September
- Chan , H. , Perrig , A. and Song , D. 2003 . Random key predistribution schemes for sensor networks . IEEE Symposium on Security and Privacy . May 11–14 2003 , Berkeley, California.
- Du , Wenliang , Deng , Jing , Han , Yunghsiang S. , Chen , Shigang and Varshney , Pramod . . A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge . To appear in IEEE INFOCOM .
- Eschenauer , L. and Gligor , V. D. . A key-management scheme for distributed sensor networks . Proceedings of the Ninth ACM Conference on Computer and Communications Security . Washington, DC, USA.
- Amir , Y. , Ateniese , G. , Hasse , D. , Kim , Y. , Nita-Rotaru , C. , Schlossnagle , T. , Schultz , J. , Stanton , J. and Sudik , G. T. 2000 . Secure group communication in asynchronous networks with failures: Integration and experiments . ICDCS 2000 , Apr.
- Intanagonwiwat , C. , Govindan , R. and Estrin , D. 2000 . Directed diffusion: A scalable and robust communication paradigm for sensor networks . Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking . Aug. 2000 , Boston, MA. pp. 56 – 67 . ACM Press .
- Du , Wenliang , Deng , Jing , Han , Yunghsiang S. and Varshney , Pramod . 2003 . A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks . Proceedings of the Tenth ACM Conference on Computer and Communications Security (CCS) . October 27–31 2003 , Washington, DC.
- Subramanian , Lakshminarayanan and Katz , Randy H. 2000 . An Architecture for Building Self-Configurable Systems . IEEE MobiHoc ,
- Perrig , A. , Szewczyk , R. , Wen , V. , Culler , D. and Tygar , J. D. . SPINS: Security protocols for sensor networks . Proceedings of Mobicom .
- Steiner , Michael , Tsudik , Gene and Waidner , Michael . 2000 . Key Agreement in Dynamic Peer Groups . IEEE Transactions on Parallel and Distributed Systems , 11 ( 8 ) : 769 – 780 .
- Jiejun Kong , P. , Zerfos , Petros , Luo , Haiyun , Lu , Songwu and Zhang , Lixia . . Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks . International Conference on Network Protocols (ICNP) .
- Kim , Y. , Perrig , A. and Tsudik , G. 2000 . Simple and fault-tolerant key agreement for dynamic collaborative groups . ACM CCS 2000 . November 2000 .
- Shamir , A. 1979 . How to Share a Secret . Communications of the ACM , 22 ( 11 ) : 612 – 613 .
- Diffie , Whitfield and Hellman , Martin E. 1979 . Privacy and authentication. An introduction to cryptography . Proceedings of the IEEE , 67 ( 3 ) March : 397 – 427 .
- 15. William Stallings. Network Security Essentials Applications and Standards.
- http://www.isi.edu/nsnam/ns/
- Perkins , Charles E. and Royer , Elizabeth M. 1999 . Ad hoc On-Demand Distance Vector Routing . Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications . February 1999 , New Orleans, LA. pp. 90 – 100 .
- Perkins , Charles . . Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers . ACM SIGCOMM'94 Conference on Communications Architectures, Protocols and Applications .
- http://pf.itd.nrl.navy.mil/projects.php?name=nrlsensorsim
- http://www.xbow.com/Products/Wireless_Sensor_Networks.htm.
- Zhu , Sencun , Setia , Sanjeev and Jajodia , Sushil . . LEAP: efficient security mechanisms for large-scale distributed sensor networks . Proceedings of the Tenth ACM Conference on Computer and Communication Security .
- http://www.tinyos.net/
- http://www.cens.ucla.edu/∼mmysore/Design (www.cens.ucla.edu/~mmysore/Design)