References
- M. Abuhelaleh, T. Mismar and A. Abuzneid, "Armor-leach - energy efficient, secure wireless networks communication," in Proc. of 17th International Conference on Computer Communications and Networks, St. Thomas, Aug.2008.
- E. Klaoudatou, E. Konstantinou, G. Kambourakis and S. Gritzalis, "Clustering oriented architectures in medical sensor environments," in Proc. of Third International Conference on Availability, Reliability and Security, pp.929 -934, Mar.2008.
- M.R. Kanjee, K. Divi and L. Hong. "A Physiological Authentication Scheme in Secure Healthcare Sensor Networks," in Proc. of 7th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks, Jun.2010.
- R. Mukesh, A. Damodaram and V. S. Bharathi, "Energy Efficient Security Architecture for Wireless BioMedical Sensor Networks," International Journal of Computer Science and Information Security, vol.6, no.1, pp.116-122, 2009.
- T. Dimitriou and K. Ioannis, "Security issues in biomedical wireless sensor networks," in Proc. of First International Symposium on Applied Sciences on Biomedical and Communication Technologies, Oct.2008.
- R. Söderlund, Energy Efficient Authentication in Wireless Sensor Network. Ph.D. Thesis, 2006.
- A.-S. Pathan and C. Hong, "A secure energy-efficient routing protocol for WSN," In Parallel and Distributed Processing and Applications, pp.407-418, 2007.
- A. Papadimitriou, F. Le Fessant, A. Viana and C. Sengul, "Cryptographic protocols to fight sinkhole attacks on tree-based routing in wireless sensor networks," in Proc. of 5th IEEE Workshop on Secure Network Protocols, pp.43-48, Oct.2009.
- R. Soderlund, S. Svensson and T. Lennvall, "Energy efficient authentication in wireless sensor networks," in Proc. of IEEE Conference on Emerging Technologies and Factory Automation, pp.1412 -1416, Sep.2007.
- K. Ren, W. Lou, K. Zeng and P. Moran, "On broadcast authentication in wireless sensor networks," IEEE Transactions on Wireless Communications, vol.6, no.11, pp.4136-4144, Nov.2007. https://doi.org/10.1109/TWC.2007.060255
- H.-L.Yeh, T.-H. Chen, P.-C. Liu, T.-H. Kim and H.-W. Wei, "A secured authentication protocol for wireless sensor networks using elliptic curves cryptography," Sensors, vol.11, no.5, pp.4767-4779, May.2011. https://doi.org/10.3390/s110504767
- S. Gupta, H. Verma and A. Sangal, "Authentication protocol for wireless sensor networks," World Academy of Science, Engineering and Technology, 66, pp.643-649, 2010.
- L. Liu, Z. Ling and Y. Zuo, "Low-delay Node-disjoint Multi-path Routing using Complementary Trees for Industrial Wireless Sensor Networks," KSII Transactions on Internet and Information Systems, vol.5, no.11, pp.2052-2067, Nov.2011.
- M. Al-Harbawi, M. Rasid and N. Noordin, "Improved Tree Routing (ImpTR) Protocol For ZigBee Network," International Journal of Computer Science and Network Security, vol.9, no.10, pp.146-152, Oct.2009.
- W. Qiu, E. Skafidas and P. Hao, P. "Enhanced tree routing for wireless sensor networks," Ad Hoc Networks, vol.7, no.3, pp.638-650, May.2009. https://doi.org/10.1016/j.adhoc.2008.07.006
- Y. Park, E.-S. Jung, "Plus-tree: A routing protocol for wireless sensor networks," In Advances in Hybrid Information Technology, 2007.
- I. Almomani and M. Saadeh, M. "FEAR: Fuzzy-Based Energy Aware Routing Protocol for Wireless Sensor Networks," International Journal of Communications, Network and System Sciences, vol.4, no.6, pp.403-415, Jun.2011. https://doi.org/10.4236/ijcns.2011.46048
- IEEE. ZigBee Specification Version 1.0, ZigBee Alliance, 2005.
- NIST, the National Institute of Standards and Technology. Federal Information Processing Standards Publication-Announcing the ADVANCED ENCRYPTION STANDARD (AES), 2001.
- Rivest, R. L. The RC5 Encryption Algorithm. Springer-Verlag, pp.86-96, 1995.
- NIST, The National Institute of Standards and Technology, Skipjack and KEA algorithms specifications, version 2 1998.
- D. Wheeler and R. Needham. Correction to XTEA. Cambridge University, 1998.
- J. Lee, K. Kapitanova and S. H. Son, "The price of security in wireless sensor networks," Computer Networks, vol.54, no.17, pp.2967-2978, Dec.2010. https://doi.org/10.1016/j.comnet.2010.05.011
- R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems" Communication ACM, vol.21, no.2, pp.120-126, Feb.1978. https://doi.org/10.1145/359340.359342
- D. Johnson, A. Menezes and S. Vanstone, "The Elliptic Curve Digital Signature Algorithm (ECDSA)," International Journal of Information Security, vol.1, no.1, pp.1, 36-63, Aug.2001.
- E. Mamdani, "Application of fuzzy logic to approximate reasoning using linguistic synthesis," IEEE Transactions on Computers, vol.C-26, no. 2, pp.1182-1191, 1977.
- W. Heinzelman, A. Sinha, A. Wang and A. Chandrakasan, "Energy-scalable algorithms and protocols for wireless microsensor networks," in Proc. of the 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '00), pp.3722-3725, Jun.2000.
- P. Trakadas, T. Zahariadis, H. Leligou, S. Voliotis and K. Papadopoulos, "Analyzing energy and time overhead of security mechanisms in wireless sensor networks," in Proc. of the 15th International Conference on Systems, Signals and Image Processing, pp.137 -140, Jun.2008.
- Crossbow Technology, Inc., http://www.xbow.com/.
Cited by
- Logic-Based Security Architecture for Systems Providing Multihop Communication vol.9, pp.1, 2012, https://doi.org/10.1155/2013/768489