[1]A Mpitziopoulos,D Gavalas D,C Konstantopoulos.A survey on jamming attacks and countermeasures in WSNs[J].Communications Surveys&Tutorials,IEEE 2009,11(4):42-56.
[2]X Chen,K Makki,K Yen,and N Pissinou.Sensor network security:a survey[J].Communications Surveys&Tutorials,IEEE,2009,11:52-73.
[3]B M?ller.Securing elliptic curve point multiplication against side-channelattacks[M].inInformationSecurity,ed:Springer,2001:324-334.
[4]A Prayati,C Antonopoulos,T Stoyanova,C Koulamas,and G Papadopoulos.A modeling approach on the TelosB WSN platform power consumption[J].Journal of Systems and Software,2010,83:1355-1363.
[5]R Watro,D Kong,S-f Cuti,C Gardiner,C Lynn,and P Kruus.TinyPK:securing sensor networks with public key technology[C].in Proceedings of the 2ndACM workshop on Security of ad hoc and sensor networks,2004:59-64.
[6]R D'Souza,G Varaprasad.Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks[J].Sensors Journal,IEEE,2012,12:2941-2949.
[7]C De Canniere,C Rechberger.Finding SHA-1 characteristics:General results and applications[M].in Advances in Cryptology-ASIACRYPT 2006,ed:Springer,2006:1-20.
[8]B Chen,W Wu,and Y Zhang.The Design and Implementation of Digital Signature System Based on Elliptic Curve[C].in Proceedings of the 2012 International Conference on Cybernetics and Informatics,2014:2041-2047.
[9]G D Sutter,J Deschamps,and J L Ima?a.Efficient elliptic curve point multiplication using digit-serial binary field operations[J].Industrial Electronics,IEEE Transactions on,2013,60:217-225.
[10]A Sakthivel,R Nedunchezhian.Decreasing point multiplicationoverECC(Zp)usingtreecomputations[C].inComputing,Communication and Applications (ICCCA),2012 International Conference,2012:1-5.
[11]V S Dimitrov,L Imbert,P Mishra.Fast Elliptic Curve Point Multiplication using Double-Base Chains[J].IACR Cryptology ePrint Archive,2005,2005:69.
[12]K J?rvinen,J Skytt?.Fast point multiplication on Koblitz curves:Parallelization method and implementations[J].Microprocessors and Microsystems,2009,33:106-116.
[13]A Liu,P Ning.Tiny ECC:A configurable library for elliptic curve cryptography in wireless sensor networks[C].in Information Processing in Sensor Networks,2008.IPSN'08.International Conference,2008:245-256.
[14]M B O Rafik,F Mohammed.The impact of ECC's scalar multiplication on wireless sensor networks[C].in Programming and Systems(ISPS),2013 11thInternational Symposium,2013:17-23. |