I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102–114, August 2002.
A. Arora, P. Dutta, S. Bapat, V. Kulathumani, H. Zhang, V. Naik, V. Mittal, H. Cao, M. Gouda, Y. Choi, T. Herman, S. Kulkarni, U. Arumugam, M. Nesterenko, A. Vora, and M. Miyashita, “A line in the sand: A wireless sensor network for target detection, classification, and tracking,” Computer Networks Journal, Oct. 2004.
G. Merret and Y. Kheng Tan, “Wireless Sensor Networks: Application Centric Design,” Janeza Trdine 9, 5100 Rijeka, Croatia, 2010.
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, “Handbook of Applied Cryptography,” CRC Press, Boca Raton, Florida, USA, 1997.
M. Abadi and R. Needham, “Prudent Engineering Practice for Cryptographic Protocol,” Tech. Report, DEC SRC 125, Digital Equeipment Corporation, November 1995.
A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J. D. Tygar, “SPINS: Security Protocols for Sensor Networks,” In Proceedings of MOBICOM, 2001.
A. Perring, R. Canetti, D. Tygar, and D. Song, “The TESLA Broadcast Authentication Protocol,” Technical Report 2, RSA Laboratories, 2002.
Charles H. Romine, “SHA-3 Standard,” Federal Information Processing Standards Publication 202, 2014, available at http://csrc.nist.gov/publication/.
O. Mohatar, A. Fster-Sabater, and M. Sierra, “A light-weight authentication scheme for wireless sensor networks,” Ad Hoc Network Journal, Elsevier, 2011.
A. Bogdanov, L. R. Knudsen, G. Leander, C. Parr, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe, “PRESENT: An Ultra-Lightweight Block Cipher,” In: P. Paillier, I. Verbauwhede, (eds.) CHES 2007. LNCS, vol. 4727, pp. 450-466. Springer, Heidelberg, 2007.
W. Fumy, “Information technology-Security techniques-Lightweights Part 2: Block Ciphers,” 2012., http://webstore.iec.ch/info-isiiec 29192-2
ISO, ISO/IEC 29192-2, 2012., http://www.iso.org
NIST, “Recommendation for Key Management, Part 1: General Guideline,” Special Publication 800-57, p. 63, 2007.
S. Bulygin, “More on Linear Hulls of Prezent-like Ciphers and a Cryptanalysis of Full-round EPCBC-96,” 2013.
G.-Q. liu and C.-H. Jin, “Differential Cryptanalysis of Prezentilike Cipher, DES. Codes Crypto, vol. 76, pp. 385-408, 2015.
F. Abed, C. Forler, E. List, S. Lucks, and J. Wenzel, “Biclique Cryptanalysis of PREZENT,” LED and KLEIN, eprint, iacr, 2014.
M. H. Faghihi Serashgi, M. Dakhilalian, and M. Shakiba, “Biclique Cryptanalysis of MIBS-80 andPREZENT-80 Block Ciphers,” Security and Communication Networks, vol. 9, pp. 27-33, 2016.
A. Biryukov, “Crypto LUX Wiki,” Lightweight Hash Functions, 2014.