References
[1]. Akan O. and Akyildiz I., (2005). 'Event-to-Sink
Reliable
Transport in Wireless Sensor Networks', IEEE/ACM Transaction
Networking, Vol. 13, No. 5, pp. 1003-1017.
[2]. Boukerche and Turgut D., (2007). 'Secure Time
Synchronization Protocols for Wireless Sensor Networks', IEEE
Wireless Communication, Vol. 14, No. 5, pp. 64-69.
[3]. Fluhrer S.R., Mantin I., and Shamir A., (2001).
'Weaknesses in the Key Scheduling Algorithm of RC4',
Proceeding Revised Papers from the Eighth Annual
International Workshop Selected Areas in Cryptography
(SAC), pp. 1-24.
[4]. Ganeriwal S., Capkun S., Han C.C, and Srivastava
M.B., (2005). 'Secure time Synchronization Service for
Sensor Networks', Proceeding ACM Workshop Wireless
Security (WiSe), pp. 97-106.
[5]. Kraub C., Schneider M., Bayarou K., and Eckert C.,
(2007). 'Stef: A Secure Ticket-Based En-Route Filtering Scheme for
Wireless Sensor Networks', Proceeding Second
International Conference Availability, Reliability and
Security (ARES), pp. 310-317.
[6]. Passing M. and Dressler F., (2006). 'Experimental
Performance Evaluation of Cryptographic Algorithms on
Sensor Nodes', Proceeding in IEEE International
Conference Mobile Adhoc and Sensor Systems (MASS),
pp. 882-887.
[7]. Pottie G.F. and Kaiser W.J., (2000). 'Wireless
Integrated
Network Sensors', Communication ACM, Vol. 43, No. 5, pp.
51-58.
[8]. Ren F., Lin C., and Liu F., (2008). 'Self-
Correcting Time
Synchronization Using Reference Broadcast in Wireless
Sensor Network', IEEE Wireless Communication, Vol. 15, No.
4, pp. 79-85.
[9]. Roman R., Alcaraz C., and Lopez J., (2007). 'A
Survey
of Cryptographic Primitives and Implementations for
Hardware-Constrained Sensor Network Nodes', Mobile
Networks and Applications, Vol. 12, No. 4, pp. 231-244.
[10]. Selcuk Uluagac A., Raheem Beyah A., and John
Copeland A., (2013). 'Secure sOurce-BAsed loose
Synchronization (SOBAS) for Wireless Sensor Networks', IEEE
Transactions on Parallel and distributed systems, Vol. 24,
No. 4, pp. 803-812.
[11]. Sun K., Ning P., and Wang C., (2006). 'Secure and
Resilient Clock Synchronization in Wireless Sensor Networks',
IEEE Journal on Selected Areas Communication, Vol. 24,
No. 2, pp. 395-408.
[12]. Uluagac S., Lee C., Beyah R., and Copeland J,
(2008). 'Designing Secure Protocols for Wireless Sensor
Networks', Wireless Algorithms, Systems, and Applications,
Vol. 5258, pp. 503-514.
[13]. Venugopalan R.V., (2003). 'Encryption Overhead in
Embedded Systems and Sensor Network Nodes: Modeling
and Analysis', Proceeding of International Conference on
Compilers, Architecture and Synthesis for Embedded
Systems pp.188-197.
[14]. Xiao Y., Rayi V.K., Sun B., Du X., Hu F., and
Galloway M,
(2007). 'A Survey of Key Management Schemes in Wireless
SensorNetworks', Computer Communication, Vol. 30, No.
11/12, pp. 2314-2341.
[15]. Yu Z. and Guan Y., (2006). 'A Dynamic En-Route
Scheme for Filtering False Data Injection in Wireless Sensor
Networks', Proceeding of IEEE INFOCOM, pp. 1-12.