21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Bibliography 241<br />

[192] Eric W. Weisste<strong>in</strong>. Birthday Problem. MathWorld – A Wolfram Web Resource,<br />

http://mathworld.wolfram.com/BirthdayProblem.html.<br />

[193] Eric W. Weisste<strong>in</strong>. L<strong>in</strong>e L<strong>in</strong>e Pick<strong>in</strong>g. MathWorld – A Wolfram Web Resource,<br />

http://mathworld.wolfram.com/L<strong>in</strong>eL<strong>in</strong>ePick<strong>in</strong>g.html.<br />

[194] Eric W. Weisste<strong>in</strong>. Square L<strong>in</strong>e Pick<strong>in</strong>g. MathWorld – A Wolfram Web<br />

Resource, http://mathworld.wolfram.com/SquareL<strong>in</strong>ePick<strong>in</strong>g.<br />

html.<br />

[195] Eric W. Weisste<strong>in</strong>. Student’s t-Distribution. MathWorld –<br />

A Wolfram Web Resource, http://mathworld.wolfram.com/<br />

Studentst-Distribution.html.<br />

[196] Birthday paradox. Wikipedia, http://en.wikipedia.org/wiki/<br />

Birthday_paradox, accessed March 2007.<br />

[197] M. Wong and W. Schlitt. Sender Policy Framework (SPF) <strong>for</strong> Authoriz<strong>in</strong>g<br />

Use of Doma<strong>in</strong>s <strong>in</strong> E-Mail, Version 1. IETF, RFC 4408,<br />

http://www.ietf.org/rfc/rfc4408.txt, April 2006.<br />

[198] A. D. Wood and J. A. Stankovic. Denial of Service <strong>in</strong> <strong>Sensor</strong> <strong>Networks</strong>.<br />

Computer, 35(10):54–62, October 2002.<br />

[199] Xip<strong>in</strong>g Yang, Keat G. Ong, William R. Dreschel, Kefeng Zeng, Casey S.<br />

Mungle, and Craig A. Grimes. Design of a <strong>Wireless</strong> <strong>Sensor</strong> Network <strong>for</strong><br />

Long-term, In-Situ Monitor<strong>in</strong>g of an Aqueous Environment. <strong>Sensor</strong>s,<br />

2:455–472, November 2002.<br />

[200] T. Ylonen. The <strong>Secure</strong> Shell (SSH) Protocol Architecture. IETF RFC<br />

4251, January 2006. http://www.ietf.org/rfc/rfc4251.txt.<br />

[201] Yan Yu, Ramesh Gov<strong>in</strong>dan, and Deborah Estr<strong>in</strong>. Geographical and Energy<br />

Aware Rout<strong>in</strong>g: a recursive data dissem<strong>in</strong>ation protocol <strong>for</strong> wireless<br />

sensor networks. Technical Report USC-CSD-TR-01-745, UCLA Computer<br />

Science Department, May 2001.<br />

[202] Yongguang Zhang and Wenke Lee. Intrusion Detection <strong>in</strong> <strong>Wireless</strong> Ad-<br />

Hoc <strong>Networks</strong>. In Proc. of the 6th annual <strong>in</strong>ternational conference on<br />

Mobile comput<strong>in</strong>g and network<strong>in</strong>g (MOBICOM), pages 275–283. ACM<br />

Press, 2000.<br />

[203] Lidong Zhou and Zygmunt J. Haas. Secur<strong>in</strong>g Ad Hoc <strong>Networks</strong>. IEEE<br />

Network, 13(6):24–30, 1999.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!