References
- W. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Microsensor Networks," IEEE Transactions on Wireless Communications, Vol. 1, No. 4, pp. 660-670, Oct. 2002. https://doi.org/10.1109/TWC.2002.804190
- O. Younis and S. Fahmy, "HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks," IEEE Transactions on Mobile Computing, Vol. 3, No. 4, pp. 366-379, Oct. 2004. https://doi.org/10.1109/TMC.2004.41
- G. Gupta and M. Younis, "Performance Evaluation of Load-Balanced Clustering of Wireless Sensor Networks," in Proc. of the 10th Int'l Conf. on Telecommunications, Vol. 2, pp. 1577-1583, Mar. 2003.
- G. Wang, K. Song, and G. Cho, "DIRECT: Dynamic Key Renewal Using Secure Cluster Head Election in Wireless Sensor Networks," IEICE Transactions on Information and Systems, Vol. E93-D, No. 6, pp. 1560-1571, Jun. 2010 https://doi.org/10.1587/transinf.E93.D.1560
- G. Wang and G. Cho, "Clustering-based Key Renewals for Clustered Sensor Networks," IEICE Transactions on Communications, Vol. E92-B, No. 2, 612-615, Feb. 2009. https://doi.org/10.1587/transcom.E92.B.612
- M. Sirivianos, D. Westhoff, F. Armknecht, and J. Girao, "Non-manipulable Aggregator Node Election Protocols for Wireless Sensor Networks," in Proc. of Int'l Symposium On Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, pp. 1-10, Apr. 2007.
- Q. Dong and D. Liu, "Resilient Cluster Leader Election for Wireless Sensor Networks, in Proc. of IEEE 6th Annual Communication Society Conf. on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 108-116, Rome, Italy, Jun. 2009.
- G. Wang and G. Cho, "Secure Cluster Head Election Using Mark Based Exclusion in Wireless Sensor Networks," IEICE Transactions on Communications, Vol. E93-B, No. 11, pp. 2925-2935, Nov. 2010. https://doi.org/10.1587/transcom.E93.B.2925
- A. C. Ferreira, M. A. Vilaca, L. B. Oliveira, E. Habib, H. C. Wong, and A. A. Loureiro, "On the Security of Cluster-based Communication Protocols for Wireless Sensor Networks," in Proc. of 4th IEEE Int'l Conf. on Networking, Vol. 3420, pp. 449-458, 2005.
- L. B. Oliveira, H. C. Wong, M. W. Bern, R. Dahab, and A. A. Loureiro, "SecLEACH-A Random Key Distribution Solution for Securing Clustered Sensor Networks," in Proc. of 5th IEEE Int'l Symposium On Network Computing and Applications, pp. 145-154, Cambridge, MA, USA, Jul. 2006.
- D. Liu, "Resilient Cluster Formation for Sensor Networks," in Proc. of 27th Int'l Conf. on Distributed Computing Systems, pp. 40-48, Toronto, ON, Canada, Jun. 2007.
- K. Sun, P. Peng, P. Ning, and C. Wang, "Secure Distributed Cluster Formation in Wireless Sensor Networks," in Proc. of the 22nd Annual Conf. on Computer Security Applications, pp. 131-140, Miami, FL, USA, Dec. 2006.
- A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "SPINS: Security Protocols for Sensor Networks," Wireless Networks, Vol. 8, No. 5, pp. 521-534, Sep. 2002. https://doi.org/10.1023/A:1016598314198
- A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S.C. Shantz, "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks," in Proc. of 3rd Int'l Conf. on Pervasive Computing and Communications, pp. 324-328, Mar. 2005.
- J. R. Douceur, "The Sybil Attack," in Proc. of the 1st Int'l Workshop on Peer-to-peer Systems, pp. 251-260, Cambridge, MA, USA, Mar. 7-8, Mar. 2002.
- Y. C. Hu, A. Perrig, and D. B. Johnson, "Wormhole Attacks in Wireless Networks," IEEE Journal of Selected Areas in Communications, Vol. 24, No. 2, pp. 370-380, Feb. 2006 https://doi.org/10.1109/JSAC.2005.861394
- B. Parno, A. Perrig, and V. Gilgor, "Distributed Detection of Node Replication Attacks in Sensor Networks," in Proc. of 2005 IEEE Symposium on Security and Privacy, pp. 49-63, Washington, DC, USA, May 2005.