References
[1]. Akyildiz, I. F., Su, W., Sankasubramaniam, Y., & Cayirci. E. (2002). Wireless sensor networks: A survey. Computer Networks, 38, 393–422.
[2]. Anand, M., Cronin, E., Sherr, M., Ives, Z. G., & Lee, I. (2006, July). Sensor network security: More interesting than you think. In Proceedings of the 1st USENIX Workshop on Hot Topics in Security (HOTSEC’06). USENIX Association,USA. (pp.25-30).
[3]. Biryukov, A., & Cannière, C. D. (2005). Data encryption standard (DES). In Henk C. A. van Tilborg (ed.) Encyclopedia of Cryptography and Security. Springer. https://doi.org/10.1007/0-387-23483-7_94
[4]. Burman, S. (2007). Cryptography and security - future challenges and issues. In 15th International Conference on Advanced Computing and Communications (ADCOM 2007) (pp.547 - 551). https://doi.org/10.1109/ ADCOM.2007.141
[5]. Gan, R., Xiao, Y., Shao, J., & Qin, J. (2019). An analysis on optimal attack schedule based on channel hopping scheme in cyber-physical systems. IEEE Transactions on Cybernetics. https://doi.org/10.1109/TCYB.2019. 2914144
[6]. Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F., & Sichitiu, M. (2003, September). Analyzing and modeling encryption overhead for sensor network nodes. In Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications (pp. 151-159). ACM. https://doi.org/10. 1145/941350.941372
[7]. Guimaraes, G., Souto, E., Sadok, D., & Kelner, J. (2004). The Impact of security mechanisms on nodes. In Proceedings of the VI Workshop on Adhoc Wire-less Comunication (WCSF), Fortaleza, Brazil.
[8]. Guimaraes, G., Souto, E., Sadok, D., & Kelner, J. (2005). Evaluation of security mechanisms in wireless sensor networks. Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05), (pp. 428-433). IEEE. https://doi.org/10.1109/ ICW.2005.47
[9]. Healy, M., Newe, T., & Lewis, E. (2007, October). Resources Implications for Data Security in Wireless Sensor Network Nodes. In 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007) (pp. 170-175). IEEE. https://doi.org/10.1109/SENSOR COMM.2007.4394916
[10]. Heinzelman, W., R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for ad-hoc wireless microsensor networks, In rd Proceedings 33 Hawaii International Conference on System Sciences (pp. 1-10).
[11]. Law, Y. W., & Havinga, P. J. M. (2005, December). How to secure a wireless sensor network. In 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (pp. 89-95). IEEE. https://doi.org/10.1109/ISSNIP.2005.1595561
[12]. Li, H., Shen, C., Zhao, Y., Sahin, G., Choi, H. A., & Shah, Y. (2019). High entropy secrecy generation from wireless CIR. Journal of Communications and Networks, 21(2), 177-191. https://doi.org/10.1109/JCN.2019.000 019
[13]. Liu, S., Gavrylyako, O. V., & Bradford, P. G. (2004). Implementing the TEA algorithm on sensors. In Proceedings 42nd Annual Southeast Regional Conference, (pp. 64–69). https://doi.org/10.1145/9865 37.986553
[14]. Mini, R. A., Loureiro, A. A., & Nath, B. (2003, September). Prediction-based energy map for wireless sensor networks. In IFIP International Conference on Personal Wireless Communications (pp. 12-26). Springer. https://doi.org/10.1007/978-3-540-39867-7_2
[15]. Pathan, A. S. K.., Lee, H. W., & Hong, C. S. (2006, February). Security in wireless sensor networks: Issues and challenges. In 2006 8th International Conference Advanced Communication Technology (Vol. 2, pp. 1043-1048). IEEE. https://doi.org/10.1109/ICACT.2006. 206151
[16]. Perrig, A., Szewczyk, R., Wen, V., Culler, D., & Tygar, J. D. (2001). SPINS: Security protocols for networks. In Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, (pp. 1-11).
[17]. Xia, Z., Wang, X., Sun, X., & Wang, Q. (2016). A secure and dynamic Multi-Keyword Ranked Search Scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2), 340-352. https://doi.org/10.1109/TPDS.2015.2401003
[18]. Xiao, M., Wang, X., & Yang, G. (2006). Cross-layer design for the security of wireless sensor networks. Proceedings of the 6th World Congress on Intelligent Control and Automation, Dalian, China, (pp.104-108).
[19]. Yang, H., & Wang, F. (2019). Wireless network intrusion detection based on improved convolutional neural network. IEEE Access, 7, 64366-64374. https:// doi.org/10. 1109/ACCESS.2019.2917299
[20]. Zhong, L. C., Rabaey, J. M., & Wolisz, A. (2004, June). An integrated data-link energy model for wireless sensor networks. In 2004 IEEE International Conference on Communications (Vol. 7, pp. 3777-3783). IEEE. https://doi. org/10.1109/ICC.2004.1313260