1. Chan, H., Perrig, A.: Pike: peer intermediaries for key establishment in sensor networks. In: INFOCOM 2005: Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 1, pp. 524–535 (2005)
2. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, pp. 41–47. ACM, New York (2002)
3. Jurnečka, F., Stehlík, M., Matyáš, V.: Key Management Schemes for WSNs (2014), https://sourceforge.net/projects/kmsfwsn/ (accessed July 14, 2014)
4. Jurnečka, F., Stehlík, M., Matyáš, V.: On node capturing attacker strategies. In: Security Protocols XXII. LNCS, Springer, Heidelberg (2014)
5. Köpke, A., et al.: Simulating wireless and mobile networks in OMNeT++ the MiXiM vision. In: Simulation Tools and Techniques for Communications, Networks and Systems, Simutools 2008, pp. 71:1–71:8. Brussels, Belgium (2008)