21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Bibliography 235<br />

[126] Anne Marie Mohan. RFID key to FDA’s anti-counterfeit<strong>in</strong>g strategy.<br />

Packag<strong>in</strong>g Digest, June 2004. http://www.packag<strong>in</strong>gdigest.com/<br />

articles/200406/54.php.<br />

[127] Patrick Moor and Mario Strasser. Key Management <strong>for</strong> <strong>Sensor</strong> <strong>Networks</strong>.<br />

Student project report, ETH Zürich, Institute <strong>for</strong> Pervasive Comput<strong>in</strong>g,<br />

2005.<br />

[128] J. Moy. OSPF Version 2. IETF RFC 2328, April 1998. http://www.<br />

ietf.org/rfc/rfc2328.txt.<br />

[129] Randall K. Nichols and Panos C. Lekkas. <strong>Wireless</strong> Security. Models,<br />

Threats, and Solutions. McGraw-Hill TELECOM, 2001.<br />

[130] The Network Simulator – ns-2. http://www.isi.edu/nsnam/ns/.<br />

[131] Peter Oehlert. Violat<strong>in</strong>g Assumptions with Fuzz<strong>in</strong>g. IEEE Security &<br />

Privacy Magaz<strong>in</strong>e, 3(2):58–62, March 2005.<br />

[132] National Institute of Standards and Technology. Specification <strong>for</strong> the<br />

Advanced Encryption Standards (AES). FIPS 197, http://csrc.nist.<br />

gov/publications/fips/fips197/fips-197.pdf, November 2001.<br />

[133] National Institute of Standards and Technology. The Keyed-Hash Message<br />

Authentication Code (HMAC). FIPS 198, http://csrc.nist.<br />

gov/publications/fips/fips198/fips-198a.pdf, March 2002.<br />

[134] Andy Oram. Peer-to-Peer: Harness<strong>in</strong>g the Power of Disruptive Technologies.<br />

O’Reilly Media, Inc., 2001.<br />

[135] Christof Paar. Embedded Security <strong>in</strong> Automobilanwendungen. Elektronik<br />

Automotive, January 2004.<br />

[136] Jeongyeup Paek, Krishna Ch<strong>in</strong>talapudi, Ramesh Gov<strong>in</strong>dan, John Caffrey,<br />

and Sami Masri. A <strong>Wireless</strong> <strong>Sensor</strong> Network <strong>for</strong> Structural Health<br />

Monitor<strong>in</strong>g: Per<strong>for</strong>mance and Experience. In 2nd IEEE Workshop on<br />

Embedded Networked <strong>Sensor</strong>s. IEEE, 2005.<br />

[137] Bryan Parno, Adrian Perrig, and Virgil Gligor. Distributed Detection of<br />

Node Replication Attacks <strong>in</strong> <strong>Sensor</strong> <strong>Networks</strong>. In IEEE Symposium on<br />

Privacy and Security, pages 49–63. IEEE, 2005.<br />

[138] Marshall Pease, Robert Shostak, and Leslie Lamport. Reach<strong>in</strong>g Agreement<br />

<strong>in</strong> the Presence of Faults. Journal of the Association <strong>for</strong> Comput<strong>in</strong>g<br />

Mach<strong>in</strong>ery, 27(2):228–234, April 1980.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!