Computer Networks, Elsevier Journal, 38(4), 393-422.
Al-Karaki, J. N. and Kamal, A. E., (2004). Routing
techniques in wireless sensor networks: a survey,
IEEE Wireless Communications, 11(6), 6-28.
Anjum F. (2007). Location dependent key management in
sensor networks without using deployment
knowledge. 2nd International Conference on
Communication Systems Software and Middleware, 1-
10.
Aranha D., Oliveira L. B., Lopez J., Dahab R. (2009).
NanoPBC: Implementing Cryptographic Pairings on
an 8-bit Platform. CHILE.
Carman D. W., Kruus P. S. and Matt B. J., (2000).
Constraints and approaches for distributed sensor
network security, NAI Labs Technical Report #00-010
Chan, H., Perrig, A., 2003, Security and Privacy in Sensor
Networks, IEEE Computer Magazine, pp. 103-105
Chan H., Perrig A. and Song, D. ( 2003). Random Key
Predistribution Schemes for Sensor Networks. IEEE
Security and Privacy Symposium, 197–213.
Chan H., Gligor V.D., Perrig A. and Muralidharan G.,
(2005 July-September). On the distribution and
revocation of cryptographic keys in sensor networks.
IEEE Transactions on Dependable and Secure
Computing, 2(3), 233- 247.
Crosby G. V., Pissinou N. and Gadze J. (2006). A
Framework for Trust-based Cluster Head Election in
Wireless Sensor Networks, Proceedings of the Second
IEEE Workshop on Dependability and Security in
Sensor Networks and Systems
Deng J., Han R. and Mishra S., (2002). INSENS:
Intrusion-Tolerant Routing in Wireless Sensor
Networks, Technical Report CUCS-939-02,
Department of Computer Science, University of
Colorado
Djenouri, D., Khelladi, L., Badache, A.N., (2005). A
survey of security issues in mobile ad hoc and sensor
networks, IEEE Communications Surveys & Tutorials,
7(4), 2- 28.
Du W., Deng J., Han Y S., Chen Sand Varshney, P. K.
(2004 April). A key management scheme for wireless
sensor networks using deployment knowledge.
INFOCOM.
Eschenauer L. and Gligor V. ( 2002 November). A Key
Management Scheme for Distributed Sensor
Networks. 9th ACM Conference. Computer. and
Communications Security, 41-47.
Ganesan D., Govindan R., Shenker S. and Estrin D.,
(2002). Highly-Resilient Energy-Efficient Multipath
Routing in Wireless Sensor Networks, ACM Mobile
Computing and Communication Review (MC2R), 1(2).
Garcia-Hernandez C. F., Ibarguengoytia-Gonzalez P. H.,
Garcia-Hernandez J. and Perez-Diaz J. A. (2007).
Wireless sensor networks and application: a survey,
International Journal of Computer Science and
Network Security (IJCSNS), 7(3).
Guorui L., Jingsha H. and Yingfang F. (2006). A hexagon-
based key predistribution scheme in sensor networks.
International Conference on Parallel Processing
Workshops, 180.
Karlof C. and Wagner D. (2003). Secure routing in
wireless sensor networks: Attacks and
Countermeasures, IEEE International Workshop on
Sensor Network Protocols and Applications, 113-127.
Liu K., Abu-Ghazaleh N. and Kang K. (2007). Location
verification and trust management for resilient
geographic routing, Location verification and trust
management for resilient geographic routing, 67(2),
215-228.
Liu D., Ning P. and Du W. (2005, September). Group-
Based Key Pre-Distribution in Wireless Sensor
Networks. ACM Workshop on Wireless Security
(WiSe ), 11–20.
Liu D. and Ning P. (2005). Improving Key Pre-
Distribution with Deployment Knowledge in Static
Sensor Networks. ACM Trans. Sensor Networks, 204–
39.
Lou W., Kwon Y., (2006). H-SPREAD: a hybrid
multipath scheme for secure and reliable data
collection in wireless sensor networks. IEEE
Transactions on Vehicular Technology, 55(4), 1320 –
1330.
Mizanur Rahman Sk. Md., Nasser N. and Saleh K. (2008).
Identity and Pairing- Based Secure Key Management
Scheme for Heterogeneous Sensor Networks. IEEE
International Conference on Wireless and Mobile
Computing, Networking and Communication, 423-
428.
Ma R., Xing L. and Michel H. E., (2007, May). A New
Mechanism for Achieving Secure and Reliable Data
Transmission in Wireless Sensor Networks. The 2007
IEEE Conference on Technologies for Homeland
Security, 274-279.
Marti S., Giuli T., Lai K., and Baker M., (2000).
Mitigating routing misbehavior in mobile ad hoc
networks, In Proceedings of MOBICOM
Ouadjaout A., Challal Y., Lasla N. andBagaa, M., (2008
March) SEIF: Secure and Efficient Intrusion-Fault
Tolerant Routing Protocol for Wireless Sensor
Networks, Third International Conference on
Availability, Reliability and Security (ARES), 503-
508.
Riaz R., Ali A. Kim K. Ahmad H. F. and Suguri, H,
(2006). Secure Dynamic Key Management for Sensor
Networks. Innovations in Information Technology, 1-
5.
Stavrou E., Pitsillides A., (2010), A survey on secure
multipath routing protocols in WSNs, accepted for
publication, Computer Networks, Elsevier Journal,
http://www.netrl.cs.ucy.ac.cy/index.php?option=com_
jombib&Itemid=60
Tanachaiwiwat S., Dave P., Bhindwale R., Helmy A.,
(2003). Secure Locations: Routing on Trust and
Isolating Compromised Sensors in Location-aware
Sensor Networks. The First ACM Conference on
Embedded Networked Sensor Systems (SenSys).
Ting Y.,Shiyong Z. and Yiping Z. (2007). A Matrix-Based
Random Key Predistribution Scheme for Wireless
Sensor Networks. IEEE International Conference on
Computer and Information Technology, 991-996.
SECURITY IN FUTURE MOBILE SENSOR NETWORKS - Issues and Challenges
285