21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

224 Bibliography<br />

Distributed Comput<strong>in</strong>g, volume 2848, pages 181–195. Spr<strong>in</strong>ger-Verlag,<br />

2003.<br />

[11] Dirk Balfanz, D. K. Smetters, Paul Stewart, and H. Chi Wong. Talk<strong>in</strong>g<br />

to Strangers: Authentication <strong>in</strong> Ad-Hoc <strong>Wireless</strong> <strong>Networks</strong>. In Symposium<br />

on Network and Distributed Systems Security (NDSS ’02). Internet<br />

Society, February 2002.<br />

[12] A. Ballardie. Core Based Trees (CBT) Multicast Rout<strong>in</strong>g Architecture.<br />

IETF RFC 2201, September 1997. http://www.ietf.org/rfc/<br />

rfc2201.txt.<br />

[13] Stefano Basagni, Kris Herr<strong>in</strong>, Danilo Bruschi, and Emilia Rosti. <strong>Secure</strong><br />

Pebblenets. In Proceed<strong>in</strong>gs of the 2nd ACM <strong>in</strong>ternational symposium on<br />

Mobile ad hoc network<strong>in</strong>g & comput<strong>in</strong>g, pages 156–163. ACM Press,<br />

2001.<br />

[14] Matthias Bauer. Spass mit Hashes. http://www1.<strong>in</strong><strong>for</strong>matik.<br />

uni-erlangen.de/tree/Persons/bauer/new/hash.ps, 2002.<br />

[15] Alexander Becher, Z<strong>in</strong>aida Benenson, and Maximilian Dornseif. Tamper<strong>in</strong>g<br />

with Motes: Real-World Physical Attacks on <strong>Wireless</strong> <strong>Sensor</strong><br />

<strong>Networks</strong>. In 3rd Int. Conf. on Security <strong>in</strong> Pervasive Comput<strong>in</strong>g (SPC),<br />

volume 3934 of LNCS. Spr<strong>in</strong>ger-Verlag, April 2006.<br />

[16] Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Key<strong>in</strong>g Hash Functions<br />

<strong>for</strong> Message Authentication. In Advances <strong>in</strong> Cryptology – CRYPTO<br />

’96: 16th Annual International Cryptology Conference, volume 1109 of<br />

LNCS. Spr<strong>in</strong>ger-Verlag, 1996.<br />

[17] Z<strong>in</strong>aida Benenson, Felix C. Gärtner, and Dogan Kesdogan. An Algorithmic<br />

Framework <strong>for</strong> Robust Access Control <strong>in</strong> <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong>.<br />

In 2nd European Workshop on <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong> (EWSN), 2005.<br />

[18] Christian Bettstetter. On the M<strong>in</strong>imum Node Degree and Connectivity<br />

of a <strong>Wireless</strong> Multihop Network. In MOBIHOC’02. ACM, 2002.<br />

[19] Christian Bettstetter and Johannes Zangl. How to Achieve a Connected<br />

Ad Hoc Network with Homogeneous Range Assignment: An Analytical<br />

Study with Consideration of Border Effects. In 4th International Workshop<br />

on Mobile and <strong>Wireless</strong> <strong>Communication</strong> <strong>Networks</strong>. IEEE, 2002.<br />

[20] J. Beutel, O. Kasten, F. Mattern, K. Römer, F. Siegemund, and L. Thiele.<br />

Prototyp<strong>in</strong>g <strong>Wireless</strong> <strong>Sensor</strong> Network Applications with BTnodes. In

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!