C. Antosh, B. Mullins, R. Baldwin, and R. Raines, A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks, International Journal of Autonomous and Adaptive Communications Systems, vol.3, issue.3, pp.350-368, 2010.
DOI : 10.1504/IJAACS.2010.033386

M. Blaser, Industrial-strength security for ZigBee: The case for public-key cryptography, Embedded Computing Design, 2005.

S. Camtepe and B. Yener, Key Distribution Mechanisms for Wireless Sensor Networks: A Survey, 2005.

B. Danev and S. Capkun, Transient-based identification of wireless sensor nodes, Proceedings of the International Conference on Information Processing in Sensor Networks, pp.25-36, 2009.

C. Dubendorfer, B. Ramsey, and M. Temple, An RF-DNA verification process for ZigBee networks, MILCOM 2012, 2012 IEEE Military Communications Conference, 2012.
DOI : 10.1109/MILCOM.2012.6415804

T. Goodspeed, Extracting keys from second generation ZigBee chips, Presented at the Black Hat USA Conference, 2009.

J. Heo and C. Hong, Efficient and authenticated key agreement mechanism in low-rate WPAN environment, Proceedings of the First International Symposium on Wireless Pervasive Computing, 2006.

Q. Huang, J. Cukier, H. Kobayashi, B. Liu, and J. Zhang, Fast authenticated key establishment protocols for self-organizing sensor networks, Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications , WSNA '03, pp.141-150, 2003.
DOI : 10.1145/941350.941371

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

Q. Huang, H. Kobayashi, and B. Liu, Energy/security scalable mobile cryptosystem, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003., pp.2755-2759, 2003.
DOI : 10.1109/PIMRC.2003.1259243

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

P. Jokar, H. Nicanfar, and V. Leung, Specification-based Intrusion Detection for home area networks in smart grids, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp.208-213, 2011.
DOI : 10.1109/SmartGridComm.2011.6102320

C. Kiraly and G. Picco, Where's the mote? Ask the MoteHunter! Proceedings of the Thirty, Seventh IEEE Conference on Local Computer Networks (Workshop on Practical Issues in Building Sensor Network Applications), pp.982-990, 2012.

K. Masica, Recommended Practices Guide for Securing ZigBee Wireless Networks in Process Control System Environments, 2007.

S. Nguyen and C. Rong, ZigBee Security Using Identity-Based Cryptography, Proceedings of the Fourth International Conference on Autonomic and Trusted Computing, pp.3-12, 2007.
DOI : 10.1007/978-3-540-73547-2_3

B. Ramsey, B. Mullins, and E. White, Improved tools for indoor ZigBee warwalking, 37th Annual IEEE Conference on Local Computer Networks -- Workshops, pp.925-928, 2012.
DOI : 10.1109/LCNW.2012.6424083

B. Ramsey, M. Temple, and B. Mullins, PHY foundation for multi-factor ZigBee node authentication, 2012 IEEE Global Communications Conference (GLOBECOM), pp.813-818, 2012.
DOI : 10.1109/GLOCOM.2012.6503210

E. Shi and A. Perrig, Designing secure sensor networks, IEEE Wireless Communications, vol.11, issue.6, pp.38-43, 2004.

R. Speers and R. Melgares, Api-do: Tools for ZigBee and 802.15.4 Security Auditing, p.2012

Y. Sun and K. Liu, Hierarchical group access control for secure multicast communications, IEEE/ACM Transactions on Networking, vol.15, issue.6, pp.1514-1526, 2007.
DOI : 10.1109/TNET.2007.897955

E. Yuksel, H. Nielson, and F. Nielson, ZigBee-2007 security essentials, Proceedings of the Thirteenth Nordic Workshop on Secure IT Systems, pp.65-82, 2008.

Z. Alliance, ZigBee Smart Energy Profile Specification, ZigBee Document 075356r15, 2008.

Z. Alliance, ZigBee Health Care Profile Specification, ZigBee Document 075360r15, 2010.