Volume 59 | Number 3 | Year 2018 | Article Id. IJMTT-V59P521 | DOI : https://doi.org/10.14445/22315373/IJMTT-V59P521
A Santha Devi, Dr. V Vinoba, "A Security Based Routing Algorithm and Unique Key Distribution in Wireless Sensor Network," International Journal of Mathematics Trends and Technology (IJMTT), vol. 59, no. 3, pp. 137-142, 2018. Crossref, https://doi.org/10.14445/22315373/IJMTT-V59P521
[1] H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy (S&P’03), pages 197–213, may 2003.
[2] W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili. A pairwise key pre-distribution scheme for wireless sensor networks. ACM Transactions on Information and System Security, 2005. Also appeared in ACM CCS ’03.
[3] L. Eschenauer and V. D. Gligor. A key management scheme for distributed sensor networks. In 9th ACM conference on Computer and communications security, pages 41–47, 2002.
[4] D. Estrin, R. Govindan, J. S. Heidemann, and S. Kumar. Next century challenges: Scalable coordination in sensor networks. In Mobile Computing and Networking, pages 263–270, Seattle, WA USA, 1999.
[5] C. Ferreira, M. A. Vilac¸a, L. B. Oliveira, E. Habib, H. C. Wong, and A. A. F. Loureiro. On the secur ity of cluster-based communication protocols for wireless sensor networks. In 4th IEEE International Conference on Networking (ICN’05), volume 3420 of Lecture Notes in Computer Science, pages 449–458, Reunion Island, April 2005.
[6] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-efficient communication protocol for wireless microsensor networks. In IEEE Hawaii Int. Conf. on System Sciences, pages 4–7, january 2000.
[7] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister. System architecture directions for networked sensors. In int’l Conf. on Architectural support for programming languages and operating systems, pages 93–104, 2000.
[8] J. Hwang and Y. Kim. Revisiting random key predistribution schemes for wireless sensor networks. In 2nd ACM workshop on Security of ad hoc and sensor networks, pages 43–52. ACM Press, 2004.
[9] R. Kannan, L. Ray, and A. Durresi. Efficient key predistribution schemes for sensor networks. In 1st European Workshop on Security in Wireless and Ad-Hoc Sensor Networks (ESAS´ 04), Heidelberg, Germany, August 2004.
[10] C. Karlof, N. Sastry, and D. Wagner. Tinysec: A link layer security architecture for wireless sensor networks. In 2nd ACM SensSys, pages 162–175, Nov 2004.
[11] C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s Ad-Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, 1(2–3):293–315, 2003. Also appeared in 1st IEEE International Workshop on Sensor Network Protocols and Applications.