21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

234 Bibliography<br />

ence on Architectural Support <strong>for</strong> Programm<strong>in</strong>g Languages and Operat<strong>in</strong>g<br />

Systems, pages 85–95. ACM Press, 2002.<br />

[115] Philip Levis, Nelson Lee, Matt Welsh, and David Culler. TOSSIM:<br />

Accurate and Scalable Simulation of Entire T<strong>in</strong>yOS Applications. In<br />

First ACM Conference on Embedded Networked <strong>Sensor</strong> Systems (Sen-<br />

Sys). ACM, 2003.<br />

[116] An Liu and Peng N<strong>in</strong>g. T<strong>in</strong>yECC: Elliptic Curve Cryptography <strong>for</strong><br />

<strong>Sensor</strong> <strong>Networks</strong> (Version 0.1). http://discovery.csc.ncsu.edu/<br />

software/T<strong>in</strong>yECC/, September 2005.<br />

[117] Donggnag Liu and Peng N<strong>in</strong>g. Establish<strong>in</strong>g Pairwise Keys <strong>in</strong> Distributed<br />

<strong>Sensor</strong> <strong>Networks</strong>. In Proceed<strong>in</strong>gs of the 10th ACM Conference on Computer<br />

and <strong>Communication</strong> Security (CCS ’03), pages 52–61. ACM Press,<br />

2003.<br />

[118] Paul Lukowicz, Oliver Amft, David Bannach, and Gerhard Tröster.<br />

Heterogeneous, Distributed On Body Comput<strong>in</strong>g <strong>in</strong> the WearIt@Work<br />

Project. In Proceed<strong>in</strong>gs of the International IEEE Conference <strong>in</strong> Mechatronics<br />

and Robotics. IEEE, 2004.<br />

[119] Nancy A. Lynch. Distributed Algorithms. Morgan Kaufmann, 1996.<br />

[120] C. Mallanda, A. Suri, V. Kunchakarra, S. S. Iyengar, R. Kannan, A. Durresi,<br />

and S. Sastry. Simulat<strong>in</strong>g <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong> with OM-<br />

NeT++. Submitted <strong>for</strong> publication, 2005.<br />

[121] Sergio Marti and Hector Garcia-Mol<strong>in</strong>a. Taxonomy of trust: Categoriz<strong>in</strong>g<br />

P2P reputation systems. Computer <strong>Networks</strong>, 50(4):472–484, 2005.<br />

[122] A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone. Handbook of<br />

Applied Cryptography. CRC Press, 1996.<br />

[123] Pietro Michiardi and Refik Molva. Simulation-based Analysis of Security<br />

Exposures <strong>in</strong> Mobile Ad Hoc <strong>Networks</strong>. In European <strong>Wireless</strong><br />

Conference, 2002. http://www.<strong>in</strong>g.unipi.it/ew2002/.<br />

[124] Steven E. M<strong>in</strong>zer. Broadband ISDN and Asynchronous Transfer Mode<br />

(ATM). IEEE <strong>Communication</strong>s Magaz<strong>in</strong>e, September 1989.<br />

[125] Mirriam-Webster Onl<strong>in</strong>e Dictionary. http://www.m-w.com, 2005.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!