1 Jennifer Yick, "Wireless sensor network survey" Elsevier BV 52 (52): 2292-2330, 2008
2 P. Porambage, "Two - phase authentication protocol for wireless sensor networks in distributed IoT applications" 2728-2733, 2014
3 S. Agemura, "On the effect of Wireless Communication Range Heterogeneity on WSN Performance" 35-40, 2017
4 A.D. Wood, "Denial of service in sensor networks" Institute of Electrical and Electronics Engineers (IEEE) 35 (35): 54-62, 2002
5 B. Schneier, "Applied crypography" John Wiley & Sons Inc 1996
6 Kaiping Xue, "A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks" Elsevier BV 36 (36): 316-323, 2013
7 H. Khemissa, "A Novel Lightweight Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Context of Internet of Things" 1-6, 2016
1 Jennifer Yick, "Wireless sensor network survey" Elsevier BV 52 (52): 2292-2330, 2008
2 P. Porambage, "Two - phase authentication protocol for wireless sensor networks in distributed IoT applications" 2728-2733, 2014
3 S. Agemura, "On the effect of Wireless Communication Range Heterogeneity on WSN Performance" 35-40, 2017
4 A.D. Wood, "Denial of service in sensor networks" Institute of Electrical and Electronics Engineers (IEEE) 35 (35): 54-62, 2002
5 B. Schneier, "Applied crypography" John Wiley & Sons Inc 1996
6 Kaiping Xue, "A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks" Elsevier BV 36 (36): 316-323, 2013
7 H. Khemissa, "A Novel Lightweight Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Context of Internet of Things" 1-6, 2016