19 references, page 1 of 2 [1] Y. Ben saied, A. Olivereau and D. Zeghlache,” Energy Efficiency in M2M Networks: A Cooperative Key Establishment System”, 3rd Int. Congress on Ultra Modern Telecommunications and Control Systems (ICUMT), 2011.
[2] H. Chan, A. Perrig and D. Song,“Key Distribution Techniques for Sensor Networks,” Wireless Sensor Networks, T. Znati et al., eds., 2004.
[3] P. Szczechowiak, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab, “NanoECC: testing the limits of elliptic curve cryptography in sensor networks,” Proceedings of the 7th international Conference on Information Processing in Sensor Networks (IPSN '08), pp. 305-320, 2008.
[4] H. Wang and Q. Li, “Efficient implementation of public key cryptosystems on mote sensors,” in Proceedings of the International Conference on Information and Communication Security (ICICS '06), pp. 519-528, December 2006.
[5] R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, P. Kruss, “TinyPK: Securing sensor networks with public key technology,” in Proceedings of the 2nd ACM workshop W. Hu, P. Corke , W. C. Shih, L. Overs, “secFleck: A Public Key Technology Platform for Wireless Sensor Networks,” in Proceedings of the 6th European Conference on Wireless Sensor Networks, February 11-13, 2009, Cork, Ireland.
P. Pecho, J. Nagy, and P. Hanáček, “Power consumption of hardware cryptography platform for wireless sensor,” in Proceedings of the International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT '09), pp. 318-323, December 2009.
[8] G. Murphy, A. Keeshan, R. Agarwal, and E. Popovici, “Hardwaresoftware implementation of public-key cryptography for wireless sensor networks,” in IET Irish Signals and Systems Conference, pp. 463-468, June 2006.
[9] R. Riaz, A. Naureen, A. Akram, A. Akbar, K. Kim, and H. Farooq Ahmed, “A unified security framework with three key management schemes for wireless sensor networks,” Computer Communications, vol. 31, no. 18, pp. 4269-4280, 2008.
[10] J. Mache, C.-Y. Wan, and M. Yarvis, “Exploiting heterogeneity for sensor network security,” in Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, June 2008, pp. 591-593.
[11] M. Petrova et al, “ Overall secure PN architecture,” in My Personal Adaptive Global NET (MAGNET), D2.1.2/D4.1.3,Octobre 2005