References
[1]. Apostolos, P. (2009). Cryptography and security in
wireless sensor networks. FRONTS 2nd Winterschool
Braunschweig, Germany (pp. 1-42).
[5]. Fernandes, L. L., Siahaan, I. S. R., & Passarone, R.
(2007). Secure routing in wireless sensor networks. Report
University of Trento.
[10]. Kalita, H. K., & Kar, A. (2009). Wireless sensor network
security analysis. International Journal of Next-Generation Networks (IJNGN), 1(1), 1-10.
[12]. Modares, H. (2009). A Scalar Multiplication in Elliptic
Curve Cryptography with Binary Polynomial Operations in
Galois Field (Doctoral dissertation, University of Malaya).
[13]. Muraleedharan, R., & Osadciw, L. A. (2003).
Balancing the performance of a sensor network using an
ant system. Electrical Engineering and Computer
Science.
[15]. Perrig, A., Szewczyk, R., Tygar, J., Wen, V., & Culler, D.
E. (2002). SPINS: Security protocols for sensor networks.
Wireless Networks, 8, 521-534.
[17]. Prabhudutta, M., Sangram, P., Nityananda, S., &
Satapathy, S. S. (2010). Security issues in wireless sensor
network data gathering protocols: a survey. Journal of
Theoretical & Applied Information Technology, 13, 14-27.
[18]. Walters, J. P., Liang, Z., Shi, W., & Chaudhary, V.
(2007). Wireless sensor network security: A survey. In
Security in Distributed, Grid, Mobile, and Pervasive
Computing (pp. 367-409). Auerbach Publications.
[21]. Yoneki, E., & Bacon, J. (2005). A Survey of Wireless
Sensor Network Technologies: Research Trends and
Middleware's Role. University of Cambridge Computer
Laboratory.
[22]. Zia, T., & Zomaya, A. (2006, February). A security
framework for wireless sensor networks. In Proceedings of
the IEEE Sensors Applications Symposium (pp. 49-53).