J. Zhang and V. , Wireless sensor network key management survey and taxonomy, Journal of Network and Computer Applications, vol.33, issue.2, pp.63-75, 2010.
DOI : 10.1016/j.jnca.2009.10.001

L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.41-47, 2002.
DOI : 10.1145/586110.586117

A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J. Tygar, SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.189-99, 2001.
DOI : 10.1145/381677.381696

N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems, 2004.
DOI : 10.1007/978-3-540-28632-5_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.585.9481

D. Malan, M. Welsh, and M. Smith, A public-key infrastructure for key distribution in Tinyos based on elliptic curve cryptography. First annual IEEE communications society conference on sensor and ad hoc communications and networks, 2004.

D. Hankerson, A. Menezes, and S. Vanstone, Guide to elliptic curve cryptography, 2004.

J. Lee, K. Kapitanova, and S. H. Son, The price of security in wireless sensor networks, Computer Networks, vol.54, issue.17, 2010.
DOI : 10.1016/j.comnet.2010.05.011

R. Hwang, C. Lai, and F. Su, An efficient signcryption scheme with forward secrecy based on elliptic curve, Applied Mathematics and Computation, vol.167, issue.2, pp.870-881, 2005.
DOI : 10.1016/j.amc.2004.06.124

Y. Zheng and H. Imai, How to construct efficient signcryption schemes on elliptic curves, Information Processing Letters, vol.68, issue.5, pp.227-233, 1998.
DOI : 10.1016/S0020-0190(98)00167-7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.2014

M. Alaghband, M. Soleimanipour, and M. , Aref,: A new signcryption scheme with forward security, Fourth information security and cryptology international conference (ISCISC), 2007.

X. Du, M. Guizani, Y. Xiao, and H. Chen, Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks, IEEE Transactions on Wireless Communications, vol.8, issue.3, 2009.
DOI : 10.1109/TWC.2009.060598

R. Riaz, A. Naureen, A. Akram, A. Hammad, K. Kim et al., A unified security framework with three key management schemes for wireless sensor networks, Computer Communications, vol.31, issue.18, pp.4269-4280, 2008.
DOI : 10.1016/j.comcom.2008.05.043

. Sk, . Md, and . Mizanur-rahman-khalil-el-khatib, Private key agreement and secure communication for heterogeneous sensor networks, Journal of parallel and distributed computing, vol.70, pp.858-870, 2010.

M. Boujelben, O. Cheikhrouhou, M. Abid, and H. Youssef, A Pairing Identity based Key Management Protocol for Heterogeneous Wireless Sensor Networks, 2009.

M. Collins, S. Dobson, and P. Nixon, A Secure Lightweight Architecture for Wireless Sensor Networks, The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and technologies, 2008.

Q. Pei, L. Wang, and H. Yin, Liaojun Pang and Hong Tang.: Layer Key Management Scheme on Wireless Sensor Networks, Fifth International Conference on Information Assurance and Security, 2009.

P. Baronti, P. Pillai, V. W. Chook, S. Chessa, A. Gotta et al., Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards, Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards, pp.1655-1695, 2007.
DOI : 10.1016/j.comcom.2006.12.020