References
- Mao, G.; Fidan, B.; Anderson, B. Wireless sensor network location techniques. Computer Networks: The International Journal of Computer and Telecommunications Networking. 2007, 29, pp. 2529-2553.
- Arampatzis, T.; Lygeros, J.; Manesis, S. A survey of applications of wireless sensor and wireless sensor networks. In Proceedings of IEEE International Symposium on, Mediterrean Conference on Control and Automation, Limassol, Cyprus, 2005, 6, pp. 719-724.
- Yuxin, M.; Guiyi, W. A Feedback-based Multipath Approach for Secure Data Collection in Wireless Sensor Networks. Sensors. 2010, pp. 9529-9540.
- Culler, D.; Estrin, D.; Srivastava, M. Overview of sensor networks. IEEE Comput. 2004, 8, pp. 41-49.
- Tiwari, M.; Arya, K.V.; Choudhari, R.; Choudhary, K.S. Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information. 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology. 2009, pp. 824-828.
- Giruka, V. C.; Singhal, M.; Royalty J.; Varanasi, S. Security in wireless sensor networks. Wireless Communications and Mobile Computing. 2008, 8, pp. 1-24.
- Ozdemir, S. Secure and reliable data aggregation for wireless sensor networks. Lecture Notes in Computer Science. 2007, 4836, pp.102-109.
- Sang, Y.; Sang, H.; Shen, Y.; Inoguchi, Y.; Tan, Y.; Xiong, N. Secure data aggregation in wireless sensor networks: A survey. Proc. of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies. 2006, pp. 315-320.
- Karlof, C. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Proc. of IEEE SNPA 2003. 2003, pp. 113-127.
- Yang, Y.; Wang, X.; Zhu, S.; Cao, G. SDAP: A secure hop-by-Hop data aggregation protocol for sensor networks. Proc. of ACM MobiHoc 2006, 2006.
- Shu, T.; Liu, S.; KrunzSecure, M. Data collection in wireless sensor networks using randomized dispersive routes. Proc. of IEEE INFOCOM 2009, 2009, pp. 2846-2850.
- Mahesh, K.M.; Samir, R.D. Ad hoc on-demand multipath distance vector routing. ACM SIGMOBILE Mobile Comput. Commun. Rev. 2002, pp.92-93.
- Lee, S. J.; Gerla, M. Split multipath routing with maximally disjoint paths in Ad hoc networks. Proc. of ICC 2001. 2001, pp. 3201-3205.
- Guo, H.; Mu, Y.; Lin, Z.; Zhang, X. An efficient and non-interactive hierarchical key agreement protocol. Computers & Security. 2011, 30, pp. 28-34. https://doi.org/10.1016/j.cose.2010.10.003
- Boneh, D.; Franklin, M. Identity based encryption from the Weil pairing. Lecture Notes in Computer Science. 2001, 2139, pp. 213-229.
- Wu, K.; Dreef, D.; Sun, B.; Xiao, Y. Secure data aggregation without persistent cryptographic operations in wireless sensor networks. Ad Hoc Networks. 2007, 5, 1, pp.100-111. https://doi.org/10.1016/j.adhoc.2006.05.009
- Shamir, A. How to share a secret. Comm. ACM, 1979, 22, pp. 612-613. https://doi.org/10.1145/359168.359176
- Kim, H. S. Location-based authentication protocol for first cognitive radio networking standard. Journal of Network and Computer Applications. 2011, 34, pp. 1160-1167. https://doi.org/10.1016/j.jnca.2010.12.017
- He, D. An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings. Ad Hoc Networks. 2012, 10, pp. 1009-1016. https://doi.org/10.1016/j.adhoc.2012.01.002
- Gouvea, C. P. L; Lopez, J. Software implementation of pairing-based cryptography on sensor networks using the MSP430 microcontroller. Lecture Notes in Computer Science. 2009, 5922, pp. 248-262.
- Rosli, R.; Yusoff, Y. M.; Hashim, H. A review on pairing based cryptography in wireless sensor networks. Proc. of ISWTA 2011. 2011, pp. 48-51.
- Szczechowiak, P.; Oliveira, L. B.; Scott, M.; Collier, M.; Ricardo, D. NanoECC:Testing the limits of Elliptic Curve Cryptography in Sensor Networks. Lecture Notes in Computer Science. 2008, 4913, pp. 305-320.
- Xiong, X.; Wong, D. S.; Deng, X. TinyPairing: A fast and lightweight pairing-based cryptographic library for wireless sensor networks. Proc. of WCNC 2010. 2010, pp. 1-6.