Mihir Bellare. New proofs for nmac and hmac: Security without collision-resistance. In Advances in Cryptology-CRYPTO 2006, pages 602-619. Springer, 2006.10.1007/11818175_36
Dan Boneh and Matthew Franklin. Identity-based encryption from the Weil pairing. SIAM Journal on Computing, 32(3):586-615, 2003.10.1137/S0097539701398521
Lander Casado and Philippas Tsigas. Contikisec: A secure network layer for wireless sensor networks under the contiki operating system. In Identity and Privacy in the Internet Age, pages 133-147. Springer, 2009.10.1007/978-3-642-04766-4_10
Barry Doyle, Stuart Bell, Alan F Smeaton, Kealan McCusker, and Noel E O’Connor. Security considerations and key negotiation techniques for power constrained sensor networks. The Computer Journal, 49(4):443-453, 2006.10.1093/comjnl/bxl023
Adam Dunkels, Bjorn Gronvall, and Thiemo Voigt. Contiki - a lightweight and flexible operating system for tiny networked sensors. In Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, LCN ‘04, pages 455-462, Washington, DC, USA, 2004. IEEE Computer Society.
Adam Dunkels, Bjorn Gronvall, and Thiemo Voigt. Contiki-a lightweight and flexible operating system for tiny networked sensors. In Local Computer Networks, 2004. 29th Annual IEEE International Conference on, pages 455-462. IEEE, 2004.
Switzerland International Organization for Standardization, Gen’eve. Iso/iec 19772, information technology security techniques authenticated encryption mechanisms. In Advances in Cryptology-CRYPTO 2006, pages 602-619. 2009.
Yu-Ming Hsu Jiann-Lian Chen and I-Cheng Chang. Adaptive routing protocol for reliable sensor network applications. International Journal on Smart Sensing and Intelligent Systems, 2(4):515, 2009.10.21307/ijssis-2017-365
Chris Karlof, Naveen Sastry, and David Wagner. Tinysec: a link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on Embedded networked sensor systems, pages 162-175. ACM, 2004.10.1145/1031495.1031515
Hugo Krawczyk. Hmqv: A high-performance secure Diffie-Hellman protocol. In Advances in Cryptology-CRYPTO 2005, pages 546-566. Springer, 2005.10.1007/11535218_33
Philip Levis, Sam Madden, David Gay, Joseph Polastre, Robert Szewczyk, Alec Woo, Eric Brewer, and David Culler. The emergence of networking abstractions and techniques in tinyos. In Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation - Volume 1, NSDI’04, pages 1-1, Berkeley, CA, USA, 2004. USENIX Association.
An Liu and Peng Ning. Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In Information Processing in Sensor Networks, 2008. IPSN’08. International Conference on, pages 245-256. IEEE, 2008.10.1109/IPSN.2008.47
Zhe Liu, Erich Wenger, and Johann Großschädl. Mote-ecc: Energy-scalable elliptic curve cryptography for wireless sensor networks. In Applied Cryptography and Network Security, pages 361-379. Springer, 2014.10.1007/978-3-319-07536-5_22
Leonardo B Oliveira, Diego F Aranha, Conrado PL Gouve^a, Michael Scott, Danilo F Ca^mara, Julio Lo’pez, and Ricardo Dahab. Tinypbc: Pairings for authenticated identity-based non-interactive key distribution in sensor networks. Computer Communications, 34(3):485– 493, 2011.
Fredrik Osterlind, Adam Dunkels, Joakim Eriksson, Niclas Finne, and Thiemo Voigt. Crosslevel sensor network simulation with cooja. In Local Computer Networks, Proceedings 2006 31st IEEE Conference on, pages 641–648. IEEE, 2006.10.1109/LCN.2006.322172
Piotr Szczechowiak, Leonardo B Oliveira, Michael Scott, Martin Collier, and Ricardo Dahab. Nanoecc: Testing the limits of elliptic curve cryptography in sensor networks. In Wireless sensor networks, pages 305–320. Springer, 2008.10.1007/978-3-540-77690-1_19
Tony Tam, Mohamed Alfasi, and Mohammad Mozumdar. Securing resource constraints embedded devices using elliptic curve cryptography. In SPIE Defense+ Security, pages 90850N–90850N. International Society for Optics and Photonics, 2014.10.1117/12.2053977
Chiu Chiang Tan, Haodong Wang, Sheng Zhong, and Qun Li. Ibe-lite: a lightweight identity-based cryptography for body sensor networks. Information Technology in Biomedicine, IEEE Transactions on, 13(6):926–932, 2009.
Chu-Sing Yang Yueh-Min Huang Tien-Wen Sung, Ting-Ting Wi. Reliable data broadcast for zig-bee wireless sensor networks. International Journal On Smart Sensing and Intelligent Systems, 3(3):504, 2010.10.21307/ijssis-2017-405
Xiaokang Xiong, Duncan S Wong, and Xiaotie Deng. Tinypairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks. In Wireless Communications and Networking Conference (WCNC), pages 1 –6. IEEE, 2010.10.1109/WCNC.2010.5506580
Geng Yang, Jiang-Tao Wang, Hong-Bing Cheng, and Chun-Ming Rong. A key establish scheme for wsn based on ibe and diffie-hellman algorithms. Dianzi Xuebao(Acta Electronica Sinica), 35(1):180–184, 2007.