F. Bao, R. Chen, M. J. Chang, and J. H. Cho, Hierarchical trust management for wireless sensor networks and its applications to trust based routing and intrusion detection, IEEE Transactions of Network Service, vol.9, pp.169-183, 2012.

D. J. Bernstein, eBASH: ECRYPT Benchmarking of All Submitted Hashes, 2013.

I. Butun, S. D. Morgera, and R. Sankar, A survey of intrusion detection systems in wireless sensor networks, IEEE Communications Surveys and Tutorials, vol.16, pp.266-282, 2014.

A. P. Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz et al., Decentralized intrusion detection in wireless sensor networks, Proceedings of The First ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks (Q2SWinet'05), pp.16-23, 2005.

D. Elektronik, Datasheet IEEE 802.15.4 node RCB230 V3, vol.2, 2015.

Y. Huang and W. Lee, A cooperative intrusion detection system for ad hoc networks, Proceedings of The First ACM Workshop on Security of Ad Hoc and Sensor Networks, pp.135-147, 2003.

K. Ioannis, T. Dimitriou, and F. C. Freiling, Towards intrusion detection in wireless sensor networks, Proceedings of The 13th European Wireless Conference, pp.1-10, 2007.

I. Krontiris, Z. Benenson, T. Giannetsos, F. Freiling, and T. Dimitriou, Cooperative intrusion detection in wireless sensor networks, vol.5432, pp.263-278, 2009.

I. Krontiris, T. Dimitriou, and F. C. Freiling, Towards intrusion detection in wireless sensor networks, Proceedings of The 13th European Wireless Conference Computing, pp.1-7, 2007.

R. Roman, J. Zhou, and J. Lopez, Applying intrusion detection systems to wireless sensor networks, Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC'06), pp.640-644, 2006.

Y. , B. Saied, and A. Olivereau, D-hip: A distributed key exchange scheme for hip-based internet of things, Proceedings of The First IEEE WoWMoM Workshop on the Internet of Things: Smart Objects and Services (IoT SoS'12), pp.1-7, 2012.

R. A. Shaikh, Group-based trust management scheme for clustered wireless sen-sor networks, IEEE Transactions on Parallel Distributed Systems, vol.20, pp.1698-1712, 2009.

A. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, Energy analysis of public key cryptography for wireless sensor networks, Proceedings of The Third IEEE International Conference on Pervasive Computing and Communications, pp.324-328, 2005.

J. Zhang, A trust management architecture for hierarchical wireless sensor networks, Proceedings of The IEEE Conference on Local Computer Networks, pp.264-267, 2010.