Efficient Hierarchical Routing Protocols in Wireless Sensor Networks Routing Protocols in Wireless Sensor Networks Routing Protocols in Wireless Sensor Networks Routing Protocols in Wireless Sensor Networks

[1]  Chee-Onn Chow,et al.  A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.

[2]  Sanjay Kumar Jena,et al.  A survey on secure hierarchical routing protocols in wireless sensor networks , 2011, ICCCS '11.

[3]  Othman Ibrahim,et al.  Empirical Study on Secure Routing Protocols in Wireless Sensor Networks , 2010, Int. J. Adv. Comp. Techn..

[4]  Vijay Varadharajan,et al.  Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..

[5]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[6]  Cong Wang,et al.  A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[7]  Gang Hu,et al.  Research and Improve on Secure Routing Protocols in Wireless Sensor Networks , 2008, 2008 4th IEEE International Conference on Circuits and Systems for Communications.

[8]  Sajid Hussain,et al.  An Authenticated Key Management Scheme for Hierarchical Wireless Sensor Networks , 2008 .

[9]  Ricardo Dahab,et al.  SecLEACH - On the security of clustered sensor networks , 2007, Signal Process..

[10]  Dharma P. Agrawal,et al.  An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.

[11]  I. Mahgoub,et al.  A Secure Hierarchical Routing Protocol for Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.

[12]  Sanjay Kumar Madria,et al.  SecRout: a secure routing protocol for sensor networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[13]  Antonio Alfredo Ferreira Loureiro,et al.  On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.

[14]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[15]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[16]  Sanjay Kumar Madria,et al.  A secure hierarchical model for sensor network , 2004, SGMD.

[17]  Sencun Zhu,et al.  LEAP: efficient security mechanisms for large-scale distributed sensor networks , 2003, CCS '03.

[18]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[19]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[20]  Gang Qu,et al.  Design space exploration for energy-efficient secure sensor network , 2002, Proceedings IEEE International Conference on Application- Specific Systems, Architectures, and Processors.

[21]  Cauligi S. Raghavendra,et al.  PEGASIS: Power-efficient gathering in sensor information systems , 2002, Proceedings, IEEE Aerospace Conference.

[22]  Paul E. Jones,et al.  US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.

[23]  Robert Szewczyk,et al.  System architecture directions for networked sensors , 2000, ASPLOS IX.

[24]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[25]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[26]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .