References
- I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communications magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
- X. Wang, J. Luo, Y. Liu, S. Li, and D. Dong, "Component-based localization in sparse wireless networks," IEEE/ACM Transactions on Networking, vol. 19, no. 2, pp. 540-548, Apr. 2011. https://doi.org/10.1109/TNET.2010.2072965
- R. Deng, J. Chen, C. Yuen, P. Cheng, and Y. Sun, "Energy-Efficient Cooperative Spectrum Sensing by Optimal Scheduling in Sensor-Aided Cognitive Radio Networks," IEEE Transactions on Vehicular Technology, vol. 61, no.2, pp. 716-725, Feb. 2012. https://doi.org/10.1109/TVT.2011.2179323
- P. Cheng, R. Deng, and J. Chen, "Energy-Efficient Cooperative Spectrum Sensing in Sensor-Aided Cognitive Radio Networks," IEEE Wireless Communications, vol.19,no.6, pp. 100-105, Dec. 2012. https://doi.org/10.1109/MWC.2012.6393524
- R. Jiang, J. Luo, and X. Wang, "An attack tree based risk assessment for location privacy in wireless sensor networks," in Proc. of 8th IEEE International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-4, Sep. 21-23, 2012.
- C. Lai, H. Li, Y. Zhang, and J. Cao, "Security issues on machine to machine communications," KSII Transaction on Internet and Information Systems, vol. 6, no. 2, pp. 498-514, Feb. 2012.
- M. Wen, J. Li, Z. Yin, et al., "A NTRU Based Key Generation and Data Transmission Scheme for Sensor Networks," Journal of Computational Information Systems, vol. 8, no.6, pp. 2417-2424, June, 2012.
- M. Wen, Y. Zheng, W. Ye, K. Chen, and W. Qiu, "A key management protocol with robust continuity for sensor networks," Computer Standards & Interfaces, vol. 31, no. 4, pp. 642-647, Apr. 2009. https://doi.org/10.1016/j.csi.2008.06.005
- C. Lai, H. Li, X. Li, and J. Cao, "A novel group access authentication and key agreement protocol for machine-type communication," Transactions on Emerging Telecommunications Technologies, 2013.
- R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen, "BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks," IEEE Trans. on Parallel and Distributed Systems, vol. 23, no. 1, pp. 32-43, Jan. 2012. https://doi.org/10.1109/TPDS.2011.95
- S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication," ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, Sep. 2003. https://doi.org/10.1145/937503.937506
- R. Jiang, J. Luo, F. Tu, and J. Zhong, "LEP: A lightweight key management scheme based on EBS and polynomial for wireless sensor networks," in Proc. of IEEE International Conference on Signal Processing, Communications and Computing, pp. 1-5, Sep. 14-16, 2011.
- C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000. https://doi.org/10.1109/90.836475
- L. Lazos and R. Poovendran, "Secure broadcast in energy-aware wireless sensor networks," DTIC Document, Tech. Rep., 2002.
- R. Di Pietro, L. V. Mancini, Y. W. Law, S. Etalle, and P. Havinga, "LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks," in Proc. of IEEE International Conference on Parallel Processing Workshops, pp. 397-406, Oct. 6-9, 2003.
- J.-H. Huang, J. Buckingham, and R. Han, "A level key infrastructure for secure and efficient group communication in wireless sensor network," in Proc. of the IEEE First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 249-260, Sept. 2005.
- J.-H. Son, J.-S. Lee, and S.-W. Seo, "Topological key hierarchy for energy-efficient group key management in wireless sensor networks," Wireless personal communications, vol. 52, no. 2, pp. 359-382, Jan. 2010. https://doi.org/10.1007/s11277-008-9653-4
- A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. E. Culler, "SPINS: Security protocols for sensor networks," Wireless networks, vol. 8, no. 5, pp. 521-534, Sept. 2002. https://doi.org/10.1023/A:1016598314198
- Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Communications Surveys Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006.
- M. Shi, X. Shen, Y. Jiang, and C. Lin, "Self-healing group-wise key distribution schemes with time-limited node revocation for wireless sensor networks," IEEE Wireless Communications, vol. 14, no. 5, pp. 38-46, Oct. 2007. https://doi.org/10.1109/MWC.2007.4396941
- J. Polastre, R. Szewczyk, C. Sharp, and D. Culler, "The mote revolution: Low power wireless sensor network devices," in Proc. of IEEE HotChips 16, vol. 16, pp. 22-24, 2004.
- D. Wei, S. Kaplan, and H. A. Chan, "Energy efficient clustering algorithms for wireless sensor networks," in Proc. of IEEE International Conference on Communications Workshops, pp. 236-240, May 19-23, 2008.
- D.-Y. Kim, J. Cho, and B.-S. Jeong, "Practical data transmission in cluster-based sensor networks." KSII Transact0ions on Internet and Information Systems (TIIS), vol. 4, no. 3 pp. 224-242, June 2010.
- R. Lu, X. Lin, H. Zhu, and X. Shen, "TESP2: Timed efficient source privacy preservation scheme for wireless sensor networks," in Proc. of IEEE International Conference on Communications (ICC), pp. 1-6, May 23-27, 2010.
- X. Lin, R. Lu, and X. Shen, "MDPA: Multidimensional Privacy-Preserving Aggregation Scheme for Wireless Sensor Networks," Wireless Communications and Mobile Computing (Wiley), vol. 10, no. 6, pp. 843-856, June, 2010.
- T. I. Inc, "Single-chip 2.4GHz IEEE 802.15.4 compliant and Zigbee (TM) ready RF transceiver," Tech. Rep., 2007.