[1] Zhang, J. and Varadharajan, V. (2010). Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications, 33, 63-75.
[2] Zhou, Y., Fang, Y. and Zhang, Y. (2008). Securing Wireless Sensor Networks: A Survey. IEEE Communications Surveys & Tutorials, 10, 6-28.
[3] Yang, H., Luo, H. Y., Ye, F., Lu, S. W. and Zhang, L. (2004). Security in Mobile Ad hoc Networks: Challenges and Solutions. IEEE Wireless Communications, Vol. 11, pp. 38-47.
[4] Sarma, H. K., Kar, A. and Mall, R. (2009). Energy Efficient Communication Protocol for Mobile Wireless Sensor Network System. IJCSNS, Vol. 9, pp.386-394.
[5] Gautan, N., Lee, W. and Pyun, J. (2009). Track-sector Clustering for Energy Efficient Routing in Wireless Sensor Network. The 9th IEEE International Conference on Computer and Information Technology, Vol. 2, pp. 116-121.
[6] Eschenauer, L. and Gligor, D. (2002). A key management scheme for distributed sensor networks. The 9th ACM Conference on Computer and Communications Security, Washington DC , USA.
[7] Chan, H., Perrig, A. and Song, D. (2003). Random Key Predistribution Schemes for Sensor Networks. IEEE Symposium on Research in Security and Privacy Oakland, California USA.
[8] Liu, D., Ning, P. and Du, W. (2005). Group-Based Key Pre-Distribution in Wireless Sensor Networks. Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005).
[9] Shen, L., Feng, H., Qiu, Y. and Ding, H. (2008). A New Kind of Cluster-based Key Management Protocol in Wireless Sensor Network. Proceedings of the IEEE Conference of Networking, Sensing and Control.
[10] Deng, J., Han, Y., Chen, S. and Varshney, P. (2004). A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. IEEE INFOCOM 2004. Los Alamitos, CA , USA.
[11] Liu, D. and Ning, P. (2003). Location-based pairwise key establishments for static sensor networks. First ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’03), New York, NY, USA
[12] Yu, Z. and Guan, Y. (2008). A key management scheme using deployment knowledge for wireless sensor networks. IEEE Transactions on Parallel Distribution and Systems, 19, 1411–1425.
[13] Huang, D., Mehta, M., Medhi, D. and Harn, L. (2004). Location-aware key management scheme for wireless sensor networks. The 2nd ACM workshop on Security of Ad Hoc and Sensor Networks.
[14] Kifayat, K., Merabti, M., Shi, Q. and Llewellyn-Jones, D. (2010). Group-based key management for mobile sensor networks. Proceedings of 2010 IEEE Sarnoff Symposium. Princeton, NJ, USA.
[15] Zhou, Y., Ni, J. and Ravishankar, C. (2005). Efficient Key Establishment for Group-Based Wireless Sensor Deployments. Proceedings of the 4th ACM Workshop on Wireless Security (WiSe '05), Cologne, Germany, September, 2005.
[16] Ünlü, A. and Levi, A. (2010). Two-tier, scalable and highly resilient key predistribution scheme for location-aware wireless sensor network deployments. Mob. Netw. Appl., Vol. 15, No. 4, pp. 517-529.
[17] Dong, Q. and Liu, D. (2007). Using auxiliary sensors for pair-wise key establishment in WSN. Proceedings of the 6th international IFIPTC6 Conference on Ad Hoc and Sensor Networks, Wireless Networks, Next Generation internet, Atlanta, GA, USA, May 14 - 18, 2007.
[18] Sensoria (2012). Sensoria. Sensoris Corporation [Online]. Available on: www.sensoria.com.
[19] Sharma, K., Ghost, S.K. and Ghost, M.K. (2009). Security Model For Hierarchical Clustered Wireless Sensor Network. International Journal of Computer Science and Security.