1. E. Barker, A. Roginsky, Recommendation for the Transitioning of Cryptographic Algorithms and Key Lengths, Draft NIST Special Publication 800–131, U.S. Department of Commerce, National Institute of Standards and Technology, Computer Security Division, Information Technology Laboratory, June 2010.
2. H. Chan, A. Perrig, D. Song, Random key pre-distribution schemes for sensor networks, in: Proc. IEEE Symposium on Security and Privacy, Berkeley, CA, May 2003, pp. 197–213.
3. Key distribution techniques for sensor networks;Chan,2004
4. Crossbow Technology Inc., imote2 Hardware Reference Manual, September 2007.
5. H. Deng, A. Mukherjee, D.P. Agrawal, Threshold and Identity-Based Key Management and Authentication for Wireless ad hoc Networks, in: Proc. International Conference on Information Technology: Coding and Computing (ITCC’04), vol. 2, Las Vegas, NV, April 2004, pp. 107–111.