1. Eschenauer, L. & Gligor. V. (2002). A key management scheme for distributed sensor networks. In CCS ’02: Proceedings of the 9th ACM conference on computer and communications security, New York, USA.
2. Chan, H. Perrig, A. & Song, D. (2003). Random key pre-distribution schemes for sensor networks. In Proceedings of the IEEE security and privacy symposium.
3. Watro, R., Kong, D., Cuti, S. F., Gardiner, C., Lynn, C. & Kruus, P. (2004). TinyPK: Securing sensor networks with public key technology. In SASN ’04, New York, USA (pp. 59–64).
4. Uhsadel, L., Poschmann, A. & Paar, C. (2007). An efficient general purpose elliptic curve cryptography module for ubiquitous sensor networks. In SPEED, www.crypto.rub.de
5. Raazi, S. M. K., & Lee, S. (2010). A survey on key management strategies for different application of wireless sensor networks. Journal of Computing Science and Engineering, 4(1), 23–51.