21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Bibliography<br />

[1] Specification of the SIM Application Toolkit <strong>for</strong> the Subscriber Identity<br />

Module - Mobile Equipment (SIM - ME) <strong>in</strong>terface . http://www.3gpp.<br />

org/, 1999.<br />

[2] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. <strong>Wireless</strong><br />

sensor networks: a survey. Computer <strong>Networks</strong>, 38(4):393–422, 2002.<br />

[3] Ross Anderson. Security Eng<strong>in</strong>eer<strong>in</strong>g. John Wiley & Sons, 2001.<br />

[4] Ross Anderson, Mike Bond, and Steven J. Murdoch. Chip and<br />

Sp<strong>in</strong>. Technical report, Computer Laboratory, University of Cambridge,<br />

2005. http://www.cl.cam.ac.uk/users/sjm217/papers/<br />

cl05chipandsp<strong>in</strong>.pdf.<br />

[5] Ross Anderson, Haowen Chan, and Adrian Perrig. Key Infection: Smart<br />

Trust <strong>for</strong> Smart Dust. In 12th IEEE International Conference on Network<br />

<strong>Protocols</strong> (ICNP’04), pages 206–215. IEEE, 2004.<br />

[6] Ross Anderson and Markus Kuhn. Tamper Resistance – a Cautionary<br />

Note. In The Second USENIX Workshop on Electronic Commerce, pages<br />

1–11. USENIX Association, 1996.<br />

[7] Brad Ark<strong>in</strong>, Scott Stender, and Gary McGraw. Software Penetration<br />

Test<strong>in</strong>g. IEEE Security & Privacy Magaz<strong>in</strong>e, 3(1):84–87, January 2005.<br />

[8] Sasikanth Avancha, Jeffrey Undercover, Anupam Joshi, and John<br />

P<strong>in</strong>kston. <strong>Secure</strong> sensor networks <strong>for</strong> perimeter protection. Elsevier<br />

Computer <strong>Networks</strong>, 43:421–435, 2003.<br />

[9] Baruch Awerbuch. Optimal Distributed Algorithms <strong>for</strong> M<strong>in</strong>imum<br />

Weight Spann<strong>in</strong>g Tree, Count<strong>in</strong>g, Leader Election and related problems.<br />

In Proceed<strong>in</strong>gs of the 19th Annual ACM Conference on Theory of Comput<strong>in</strong>g,<br />

pages 230–240. ACM Press, 1987.<br />

[10] Amitabha Bagchi, Amitabh Chaudhary, Michael T. Goodrich, and<br />

Shouhuai Xu. Construct<strong>in</strong>g Disjo<strong>in</strong>t Paths <strong>for</strong> <strong>Secure</strong> <strong>Communication</strong>. In

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!