· [1] Alberto Cerpa, Jeremy Elson, Deborah Estrin, Lewis Girod, Michael Hamiton and Jerry Zhao, "Habitat monitoring: Application driver for wireless communications technology", 2001 ACM SIGCOMM Workshop on Data Communications in Latin America and the Caribbean, April 2001.
· [2] R. Juang, H. Oki, Y. Wang, M. Martonosi, L. Peh, D. Rubenstein, "Energy-Efficient computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet", in Proceedings of ASPLOSX, October 2002.
· [3] N. Xu, S. Rangwala, K. Chintalapudi, D. Ganesan, A. Broad, R. Govindan, D. Estrin, "A Wireless Sensor Network for Structural Monitoring", In Proceedings of the ACM Conference on Embedded Networked Sensor Systems, November 2004.
· [4] Jason Hill, David Culler, "Mica: A Wireless Platform for Deeply Embedded Networks", IEEE Micro., vol22(6) pp 12-24, Nov/Dec 2002.
· [5] http://www.tinyos.net
· [6] David Gay, Phil Levis, Rob von Behren, Matt Welsh, Eric Brewer, David Culler, "The nesC Language: A Holistic Approach to Networked Embedded System", Proceedings of Programming Language Design and Implementation (PLDI) 2003, June 2003.
· [7] H. Abrach, S.Bhatt, J. Carlson, H. Dui. Rose, A. Sheth, B. Shucker, J. Dent, R. Han, “MANTIS: System Support for Multimodal Network of In-Situ Sensors”, Proceeding Of 2nd ACM Workshop on Wirless Sensor Networks and Applications (WSNA’ 03), San Diego, CA, Sep, 2003.
· [8] B.J.Bonfils, P. Bonnet, “Adaptive and Decentralized Operator Placement for In-Network Query Processing”, IPSN’03, April, 2003, LNCS 2634.
· [9] H. Han, A. Perrig, D. Song, ”Random Key Predistribution Schemes for Sensor Networks”, IEEE Symposium on Security and Privacy 2003.
· [10] J. Hill, R. Szewczyk, V. Wen, D. Culler, J.D.Tygar, “SPINS : Security Protocols for Sensor Networks”, Wireless Networks Journal (WINET), 8(5):521-534, Sep 2002.
· [11] Y. J. Zhao, R. Govindan, and D. Estrin, “Computing Aggregates for monitoring Wireless Sensor Networks”, The First IEEE International Workshop on Sensor Network Protocols and Applications (SNPA’ 03), Anchorage, AL, USA, May 11, 2003.
· [12] Anthony D. Wood, John A. Stankovic, “Denial of Service in Sensor Networks”, IEEE Computer, October 2002.
· [13] C. Intanagonwiwat et. Al., “An Application-Specific Protocol Architecture for Wireless Microsensor Networks”, IEEE/ACM Transactions on Networking, Vol.11, No.1, Feb. 2003, pp. 2-16.
· [14] Wendi B. Heinzelman et al., “An Application-Specific Protocol Architecture for Wireless Microsensor Networks ”, IEEE Trans. On Wireless Communication, Vol.1, No.4, Oct. 2002, pp. 660-670.
· [15] Chris Karlof and David Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Counter-measures”, First IEEE International Workshop on Sensor Network Protocols and Applications, May 2003.
· [16] Tieyan Li, “Security Map of Sensor Network”, http://www.i2r.a-star.edu.sh/icsd/SecureSensor/papers/security-map.pdf, Aug. 2004.
· [17] TinySec home page, http://www.cs.berkeley.edu/~nks/tinysec/
· [18] ZigBee Document 03322r6ZB, Security Services Specification Release0.80, April 2, 2004.
· [19] J. Deng, R. Han, and S. Mishra, “Security Support for In-Network Processing in Wireless Sensor Networks,” Proc. of the 1st ACM Workshop on the Security of Ad Hoc and Sensor Networks(SASN), 2003.
· [20] Sencun Zhu, Sanjeev Setia, and Sushil Jajodia, “LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,” Proc. of the 10th ACM Conference on Computer and Communication Security(CCS), 2003.
· [21] S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and Mani B. Srivastava, “On Communication Security in Wireless Ad-Hoc Sensor Network,” Proc. of WETICE’ 02, 2002.
· [22] L. Eschenauer and V. Gligor, “A Key-Management Scheme for Distributed Sensor Network,” Proc. of the 9th ACM Conference on Computer and Communications Security, 2002.
· [23] D. Liu and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” Proc. of the 10th ACM Conference on Computer and Communication Security(CCS), 2003.
· [24] D. Liu and P. Ning, “Location-Based Pairwise Key Establishments for Static Sensor Networks,” Proc. of the 1st ACM Workshop on the Security of Ad Hoc and Sensor Networks(SASN), 2003.
· [25] H. Chan, A. Perrig, and D. Song, “Random Key-Assignment for Secure Wireless Sensor Networks,” Proc. of the 1st ACM Workshop on the Security of Ad Hoc and Sensor Networks(SASN), 2003.
· [26] G. Jolly, Kuscu, and P. Kokate, “A Low-energy Key Management Protocol for Wireless Sensor Networks,” Proc. of the 8th IEEE International Symposium on Computers and Communications, June 2003.
· [27] Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, “SPIN: Security Protocols for Sensor Networks”, Mobile Computing and Networking 2001.