References
[1] N. Ali, Sh. Javad, A. Fateme," Key exchange in wireless sensor networks for energy management approach", Tenth international conference Iranian security, pages 88-93, 2013.
[2] S. Lawrence, L. Qiaoliang, N. Mary and F. Bo, "Key Pre-Distribution And The Average Distance In Wireless Sensor Networks", Second International Conference On Computer And Network Technology(ICCNT), pp.212-216,China,2010.
[3] F. Etimad, V. C. Gungor, L. Nassef, N. Akkari, MG A. Maik, S. Almasri and I. F. Akyildiz. "A survey on wireless sensor networks for smart grid," Computer Communications, volume 71, pages22-33, 1november 2015.
[4] C.L. Wang, T.P. Hong, G. Hoing, W.H. Wang, "A GA- Based Key- Management Scheme in Hierarchical Wireless Sensor Networks", International Journal of Innovative Computing, Information and Control, Vol. 5, Number 12, pp. 4693-4702, December 2009.
[5] Perrig.A, Szewczyk. R, Wen.V, Culler.D, Tygar.J.D, “SPINS: Security Protocols for Sensor Networks”, int,Journal of Wireless networks, volume 8, issue 5, pages 521-534, September 2002.
[6] Chan. H, Perrig. A, “Random key predistribution schemes for sensor networks”. In: Proceedings of the 2003 IEEE symposium on security andprivacy, pages 197-213, May 2003.
[7] Du .W, Han .Y S, Chen .S, Varshney .P K, “A key management scheme for wireless sensor networks using deployment knowledge”, Int, Conference of the IEEE Computer and Communications Societies, Volume 1, pages 586-597, April 2004.
[8] Y.J. Huang, I.E. Liao and H.W. Tang, “A forward authentication key management scheme for heterogeneous wireless sensor network”, EURASIP Journal on Wireless Communications and Networking, Vol. 2011, No.6, January 2011.
[9] B. Walid, Y. Challal, A. Bouabdallah, and V.Tarokh, "A highly scalable key pre-distribution scheme for wireless sensor networks,"International Journal of Emerging Engineering Research and Technology, Volume 2, Issue 8, Pages 18-23, November 2014.
[10] A. Moshaddique, J. Liu, and K. Kwak. "Security and privacy issues in wireless sensor networks for healthcare applications." Journal of medical systems, Volume 36, Issue 1, pages 93-101, February 2012.
[11] C.-L. Wang, T.-P. Hong, G. Hoing, W.-H. Wang, "A GA- Based Key- Management Scheme in Hierarchical Wireless Sensor Networks", International Journal of Innovative Computing, Information and Control, Vol. 5, Number 12(A), pp. 4693-4702, December 2009.
[12] Lai. B, Kim. S, Verbauwhede. I, “Scalable session key construction protocol for wireless sensor networks”, In: Proceedings of the IEEE workshop on Large Scale Real Time and Embedded Systems LARTES, pages 1-6, December 2002.
[13] Chan. H, Perrig. A, “PIKE: peer intermediaries for key establishment in sensor networks”, in: Proceedings of the 24th annual joint conference of the IEEE computer and communications societies (INFOCOM’05), pages 524-535, March 2005.
[14] Nanda. S, Jagannath, and G. Panda, "A survey on nature inspired metaheuristic algorithms for partitional clustering", Swarm and Evolutionary Computation, Volume 16, pp. 1-18, June 2014.
[15] B. Kadri, D. Moussaoui, M. Feham and A. Mhammed an, “Efficient Key Management Scheme for Hierarchical Wireless Sensor Networks”, Vol. 4, N0 6, pp. 155-161, June 2012.
[16] H. Xiaobing, M. Niedermeier & H. D. Meer, "Dynamic key management in wireless sensor networks: A survey", Journal of Network and Computer Applications, Vol.36, No.2, pp. 611-622, March 2013.
[17] M. Ito and M. Tanaka, "Localization of a Moving Sensor by Particle Filters", International Journal of Innovative Computing, Information and Control, Vol. 4, No. 1, pp. 165-173, January 2008.
[18] Ellis, R. Steven, “Entropy, large deviations, and statistical mechanics Entropy, large deviations, and statistical mechanics”, Springer Science & Business Media, ISBN: ISBN: 978-1-46-13-8532-2, 2012.
[19] David. E. Goldberg, “Genetic Algorithm in Search, Optimization and Machine Learning”, Kluwer Academic Publishers, Boston, MA, ISBN: ISBN: 0201157675, Pages 95-99, 1989.