<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462007000400004</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Exploiting Redundancy for Secure Data Dissemination in Wireless Sensor Networks]]></article-title>
<article-title xml:lang="es"><![CDATA[Explotando Redundancia para Diseminación Segura de Datos en Redes Inalámbricas de Sensores]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Palafox]]></surname>
<given-names><![CDATA[Luis E.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[García Macías]]></surname>
<given-names><![CDATA[J. Antonio]]></given-names>
</name>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,CICESE Research Center Computer Science Department ]]></institution>
<addr-line><![CDATA[Ensenada B.C.]]></addr-line>
<country>México</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2007</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2007</year>
</pub-date>
<volume>11</volume>
<numero>2</numero>
<fpage>129</fpage>
<lpage>142</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462007000400004&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462007000400004&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462007000400004&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Monitoring the environment is one of the main applications of wireless sensor networks. Given that these networks are densely populated and that local variations in the environmental variables are small, a large amount of redundant data is generated by sensor nodes. In this paper we present a protocol for data dissemination in hierarchical clustered sensor networks that integrates security and reduces communication overhead by removing data redundancy from the network. Furthermore, we show that by using our protocol we can provide security to the network without spending additional energy resources, particularly when we are dealing with high levels of redundancy. Additionally, a military monitoring application is introduced as a case study to evaluate the functionality of our protocol.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[El monitoreo del medio ambiente es una de las muchas aplicaciones de las redes inalámbricas de sensores. Dado que estas redes están densamente pobladas y que las variaciones locales de variables ambientales son pequeñas, los nodos de sensado generan una gran cantidad de datos redundantes. En este artículo se presenta un protocolo de diseminación de datos en una red de sensores jerárquica con clusters, el cual integra seguridad y reduce el sobrecosto de comunicación al remover datos redundantes de la red. Además, se muestra que al utilizar el protocolo se puede proveer de seguridad a la red sin consumir recursos energéticos adicionales, esto particularmente cuando se trata con altos niveles de redundancia. Adicionalmente, se introduce una aplicación de monitoreo militar como caso de estudio para evaluar la funcionalidad de nuestro protocolo.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Secure data dissemination]]></kwd>
<kwd lng="en"><![CDATA[secure data aggregation]]></kwd>
<kwd lng="en"><![CDATA[redundancy in WSN]]></kwd>
<kwd lng="es"><![CDATA[Diseminación segura de datos]]></kwd>
<kwd lng="es"><![CDATA[agregación segura de datos]]></kwd>
<kwd lng="es"><![CDATA[redundancia en redes inalámbricas de sensores]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="center"><font face="verdana" size="4"><b>Exploiting Redundancy for Secure Data Dissemination in Wireless Sensor Networks</b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="3"><b><i>Explotando Redundancia para Diseminaci&oacute;n Segura de Datos en Redes Inal&aacute;mbricas de Sensores</i></b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><b>Luis E. Palafox and J. Antonio Garc&iacute;a Mac&iacute;as</b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><i>CICESE Research Center Computer Science Department Km. 107 Carretera Tijuana&#150;Ensenada C.P. 22860 Ensenada, B.C., M&eacute;xico     <br> e&#150;mail:</i> <a href="mailto:palafox@cicese.mx">palafox@cicese.mx</a> ,   <a href="mailto:jagm@cicese.mx">jagm@cicese.mx</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><u>Article received on June 18, 2007; accepted on October 24, 2007</u></font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Abstract.</b></font></p>     <p align="justify"><font face="verdana" size="2">Monitoring the environment is one of the main applications of wireless sensor networks. Given that these networks are densely populated and that local variations in the environmental variables are small, a large amount of redundant data is generated by sensor nodes. In this paper we present a protocol for data dissemination in hierarchical clustered sensor networks that integrates security and reduces communication overhead by removing data redundancy from the network. Furthermore, we show that by using our protocol we can provide security to the network without spending additional energy resources, particularly when we are dealing with high levels of redundancy. Additionally, a military monitoring application is introduced as a case study to evaluate the functionality of our protocol. </font></p>     <p align="justify"><font face="verdana" size="2"><b>Keywords: </b>Secure data dissemination, secure data aggregation, redundancy in WSN.</font></p>     <p align="justify">&nbsp;</p>     <p align="justify"><font face="verdana" size="2"><b>Resumen.</b></font></p>     <p align="justify"><font face="verdana" size="2">El monitoreo del medio ambiente es una de las muchas aplicaciones de las redes inal&aacute;mbricas de sensores. Dado que estas redes est&aacute;n densamente pobladas y que las variaciones locales de variables ambientales son peque&ntilde;as, los nodos de sensado generan una gran cantidad de datos redundantes. En este art&iacute;culo se presenta un protocolo de diseminaci&oacute;n de datos en una red de sensores jer&aacute;rquica con clusters, el cual integra seguridad y reduce el sobrecosto de comunicaci&oacute;n al remover datos redundantes de la red. Adem&aacute;s, se muestra que al utilizar el protocolo se puede proveer de seguridad a la red sin consumir recursos energ&eacute;ticos adicionales, esto particularmente cuando se trata con altos niveles de redundancia. Adicionalmente, se introduce una aplicaci&oacute;n de monitoreo militar como caso de estudio para evaluar la funcionalidad de nuestro protocolo. </font></p>     <p align="justify"><font face="verdana" size="2"><b>Palabras clave: </b>Diseminaci&oacute;n segura de datos, agregaci&oacute;n segura de datos, redundancia en redes inal&aacute;mbricas de sensores.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><a href="/pdf/cys/v11n2/v11n2a4.pdf">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a> </font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>References</b></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">1. <b>Banerjee, </b><b>S.</b> <b>and </b><b>S.</b> <b>Khuller, </b>"A clustering scheme for hierarchical control in multi&#150;hop wireless networks". In INFOCOM, 2001, pp. 1028&#150;1037.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043659&pid=S1405-5546200700040000400001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">2. <b>Bellare, M., R. Canetti and H. Krawczyk, </b>"Keying hash functions for message Authentication". In CRYPTO, edited by N. Koblitz, Vol. 1109 of Lecture Notes in Computer Science, Springer, 1996, pp. 1&#150;15.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043660&pid=S1405-5546200700040000400002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">3. <b>Bellare, M., J. Kilian and P. Rogaway, </b>"The security of the cipher block chaining message authentication code". Journal of Computer and System Sciences 61 (3) (2000) 362&#150;399.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043661&pid=S1405-5546200700040000400003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">4. <b>Black, J. and P. Rogaway, </b>"CBC MACs for arbitrary&#150;length messages: The three&#150;key constructions". Journal of Cryptology 18 (2) (2005) 111&#150;131.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043662&pid=S1405-5546200700040000400004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">5. <b>&Ccedil;am, H., D. Muthuavinashiappan and P. Nair, </b>"Energy efficient security protocol for wireless sensor networks". In Proceedings of the IEEE VTC Conference, IEEE Computer Society, 2003, pp. 2981&#150;2984.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043663&pid=S1405-5546200700040000400005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">6. <b>&Ccedil;am, H., S. &Ouml;zdemir, P. Nair, D. Muthuavinashiappan and H. O. Sanli, </b>"Energy&#150;efficient secure pattern based data aggregation for wireless sensor networks". Computer Communications 29 (4) (2006) 446&#150;455.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043664&pid=S1405-5546200700040000400006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">7. <b>Daemen, J. and V. Rijmen, </b>"Rijndael for AES". In AES Candidate Conference, 2000, pp. 343&#150;348.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043665&pid=S1405-5546200700040000400007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">8. <b>Hill, J., R. Szewczyk, A. Woo, S. Hollar, D. E. Culler and K. S. J. Pister, </b>"System architecture directions for networked  sensors".   In Proceedings  of the   9<sup>th</sup> International  Conference  on Architectural   Support for Programming Languages and Operating Systems, 2000, pp. 93&#150;104.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043666&pid=S1405-5546200700040000400008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">9. <b>IEEE,</b> "802.15.4 &#150; 2003: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications for Low Rate Wireless Personal Area Networks (LR&#150;WPANs)", IEEE Computer Society Press, 1109 Spring Street, Suite 300, Silver Spring, MD 20910, USA, 2003. URL <a href="http://www.ansi.org/" target="_blank">http://www.ansi.org/</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043667&pid=S1405-5546200700040000400009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">10. <b>ISO/IEC 9797, </b>"Data cryptographic techniques &#150; Data integrity mechanism using a cryptographic check function employing a block cipher algorithm".  International  Standards Organization (ISO),   1989.  URL <a href="http://www.ansi.org/" target="_blank">http://www.ansi.org/</A></a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043668&pid=S1405-5546200700040000400010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">11. <b>Mainwaring, A.M., D. E. Culler, J. Polastre, R. Szewczyk and J. Anderson,</b> "Wireless sensor networks for habitat monitoring". In WSNA edited by C. S. Raghavendra and K. M. Sivalingam, ACM, 2002, pp. 88&#150;97.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043669&pid=S1405-5546200700040000400011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">12. <b>NIST (National Institute of Standards and Technology),</b> "FIPS PUB 180&#150;1: Secure Hash Standard", National Institute for Standards and Technology, Gaithersburg, MD, USA, 1995, supersedes FIPS PUB 180 1993 May 11. URL <a href="http://www.itl.nist.gov/fipspubs/" target="_blank">http://www.itl.nist.gov/fipspubs/fiP180&#150;.htm</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043670&pid=S1405-5546200700040000400012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">13. <b>NIST (National Institute of Standards and Technology), </b>"FIPS PUB 46&#150;3: Data Encryption Standard (DES)". National Institute for Standards and Technology, Gaithersburg, MD, USA, 1999, supersedes FIPS 46&#150;2. URL <a href="http://www.itl.nist.gov/fipspubs/" target="_blank">http://www.itl.nist.gov/fipspubs/fip186&#150;2.pdf</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043671&pid=S1405-5546200700040000400013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">14. <b>Perrig, A., R. Szewczyk, J. D. Tygar, V. Wen and D. E. Culler, </b>"SPINS: Security protocols for sensor networks". Wireless Networks 8 (5) (2002) 521&#150;534.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043672&pid=S1405-5546200700040000400014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">15. <b>Perrig, A. and J. Tygar, </b>"Secure Broadcast Communication in Wired and Wireless Networks". Kluwer Academic Publishers, 2003.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043673&pid=S1405-5546200700040000400015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">16. <b>Rivest, R.L., </b>"The RC5 Encryption Algorithm". In Fast Software Encryption edited by B. Preneel, Vol. 1008 of Lecture Notes in Computer Science, Springer, 1994, pp. 86&#150;96.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043674&pid=S1405-5546200700040000400016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">17. <b>Schneier, B., </b>"Applied Cryptography: Protocols, Algorithms, and Source Code in C", 2nd Edition, John Wiley, 1996.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043675&pid=S1405-5546200700040000400017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> ]]></body><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Banerjee]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Khuller]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A clustering scheme for hierarchical control in multi-hop wireless networks]]></article-title>
<source><![CDATA[INFOCOM]]></source>
<year>2001</year>
<page-range>1028-1037</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bellare]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Canetti]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Krawczyk]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Keying hash functions for message Authentication]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Koblitz]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[CRYPTO]]></source>
<year></year>
<volume>1109</volume>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bellare]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kilian]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Rogaway]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The security of the cipher block chaining message authentication code]]></article-title>
<source><![CDATA[Journal of Computer and System Sciences]]></source>
<year>2000</year>
<volume>61</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>362-399</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Black]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Rogaway]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[CBC MACs for arbitrary-length messages: The three-key constructions]]></article-title>
<source><![CDATA[Journal of Cryptology]]></source>
<year>2005</year>
<volume>18</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>111-131</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Çam]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Muthuavinashiappan]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Nair]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Energy efficient security protocol for wireless sensor networks]]></article-title>
<source><![CDATA[Proceedings of the IEEE VTC Conference, IEEE Computer Society]]></source>
<year>2003</year>
<page-range>2981-2984</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Çam]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Özdemir]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Nair]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Muthuavinashiappan]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Sanli]]></surname>
<given-names><![CDATA[H. O.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Energy-efficient secure pattern based data aggregation for wireless sensor networks]]></article-title>
<source><![CDATA[Computer Communications]]></source>
<year>2006</year>
<volume>29</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>446-455</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Daemen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Rijmen]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Rijndael for AES]]></article-title>
<source><![CDATA[AES Candidate Conference]]></source>
<year>2000</year>
<page-range>343-348</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hill]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Szewczyk]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Woo]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hollar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Culler]]></surname>
<given-names><![CDATA[D. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Pister]]></surname>
<given-names><![CDATA[K. S. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[System architecture directions for networked sensors]]></article-title>
<source><![CDATA[Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems]]></source>
<year>2000</year>
<page-range>93-104</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<collab>IEEE</collab>
<source><![CDATA[802.15.4 - 2003: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications for Low Rate Wireless Personal Area Networks (LR-WPANs)]]></source>
<year>2003</year>
<publisher-loc><![CDATA[Silver Spring ]]></publisher-loc>
<publisher-name><![CDATA[IEEE Computer Society Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<collab>ISO/IEC 9797</collab>
<source><![CDATA[Data cryptographic techniques: Data integrity mechanism using a cryptographic check function employing a block cipher algorithm]]></source>
<year>1989</year>
<publisher-name><![CDATA[International Standards Organization (ISO)]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mainwaring]]></surname>
<given-names><![CDATA[A.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Culler]]></surname>
<given-names><![CDATA[D. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Polastre]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Szewczyk]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Anderson]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Wireless sensor networks for habitat monitoring]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Raghavendra]]></surname>
<given-names><![CDATA[C. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Sivalingam]]></surname>
<given-names><![CDATA[K. M.]]></given-names>
</name>
</person-group>
<source><![CDATA[WSNA]]></source>
<year>2002</year>
<page-range>88-97</page-range><publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<collab>National Institute of Standards and Technology</collab>
<source><![CDATA[FIPS PUB 180-1: Secure Hash Standard]]></source>
<year>1995</year>
<publisher-loc><![CDATA[Gaithersburg ]]></publisher-loc>
<publisher-name><![CDATA[National Institute for Standards and Technology]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<collab>National Institute of Standards and Technology</collab>
<source><![CDATA[FIPS PUB 46-3: Data Encryption Standard (DES)]]></source>
<year>1999</year>
<publisher-loc><![CDATA[Gaithersburg ]]></publisher-loc>
<publisher-name><![CDATA[National Institute for Standards and Technology]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Perrig]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Szewczyk]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Tygar]]></surname>
<given-names><![CDATA[J. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Wen]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Culler]]></surname>
<given-names><![CDATA[D. E.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[SPINS: Security protocols for sensor networks]]></article-title>
<source><![CDATA[Wireless Networks]]></source>
<year>2002</year>
<volume>8</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>521-534</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Perrig]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Tygar]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Secure Broadcast Communication in Wired and Wireless Networks]]></source>
<year>2003</year>
<publisher-name><![CDATA[Kluwer Academic Publishers]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rivest]]></surname>
<given-names><![CDATA[R.L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The RC5 Encryption Algorithm]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Preneel]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Fast Software Encryption]]></source>
<year>1994</year>
<volume>1008</volume>
<page-range>86-96</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schneier]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Applied Cryptography: Protocols, Algorithms, and Source Code in C]]></source>
<year>1996</year>
<edition>2</edition>
<publisher-name><![CDATA[John Wiley]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
