References
- Akyildiz, I. F., W. Su, Y. Sankarasubramaniam and E. Cayirci, "A Survey on Sensor Networks", IEEE Communications Magazine, Vol.40, No.8(2002), 102-116. https://doi.org/10.1109/MCOM.2002.1024422
- Al Karaki, J. N. and A. E. Kamal, "Routing techniques in wireless sensor networks : a survey", IEEE Wireless Communication Magazine, Vol.11, No.6(2004), 6-28. https://doi.org/10.1109/MWC.2004.1368893
- Karlof, C. and D. Wagner, "Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures", Elsevier, Elsevier's Ad Hoc Networks Journal, Special Issue on Sensor Network Protocols and Applications, Vol.1, No.2-3(2003), 293-315.
- Djenouri, D., L. Khelladi and N. Badache, "A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks", IEEE Communications Surveys and Tutorials, Vol.7, No.4(2005), 2-28. https://doi.org/10.1109/COMST.2005.1593277
- Ye, F., H. Luo, and S. Lu, "Statistical en route filtering of injected false data in sensor networks", IEEE Journal on Selected Areas in Communications, Vol.23, No.4(2005), 839-850. https://doi.org/10.1109/JSAC.2005.843561
- Nghiem, P. T. and T. H. Cho, "A fuzzy based interleaved multi-hop authentication scheme in wireless sensor networks", Journal of Parallel and Distributed Computing, Vol.69, No.5(2009), 441-450. https://doi.org/10.1016/j.jpdc.2009.01.007
- Lee, H. Y. and T. H. Cho, "Fuzzy Based Path Selection Method for Improving the Detection of False Reports in Sensor Networks", IEICE Trans. Inf. and Syst., Vol.E92 D,No.8(2009), 1574-1416. https://doi.org/10.1587/transinf.E92.D.1574
- Sun, C. I., H. Y. Lee and T. H. Cho, "A Path Selection Method for Improving the Detection Power of the Statistical Filtering in Sensor Networks", Journal of Information Science and Engineering, Vol.25, No.4 (2009), 1163-1175.
- Lee, H. Y. and T. H. Cho, "Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks", IEICE Trans. Comm., Vol.E90 B, No.12(2007), 3346-3353. https://doi.org/10.1093/ietcom/e90-b.12.3346
- Zhu, S. "Interleaved hop by hop authentication against false data injection attacks in sensor networks", ACM Transactions on Sensor Networks(TOSN), Vol.3, No.3(2007), 1-33. https://doi.org/10.1145/1210669.1210670
- Li, F. and J. Wu, "A Probabilistic Voting based Filtering Scheme in Wireless Sensor Networks", IWCMC '06(2006), 27-32.
- Choi, H. M. and T. H. Cho, "Energy Efficient MAC Length Determination Method for Statistical En Route Filtering using Fuzzy Logic", Lecture Notes in Computer Science, Springer Verlag, LNCS 5754, (2009), 686-695.
- 전효진, 이건희, 김동규, 서정택, 손기욱, "애드혹 네트워크에서의 이웃노드 정보를 이용한 웜홀 탐지", 2006년도 한국정보과학회 가을 학술발표논문집, Vol.33, No.2(C)(2006), 586-591.
- Hu, Y. C., A. Perrig, and D. B. Johnson, "Wormhole Attacks in Wireless Networks", IEEE Journal on Selected Areas in Communications, Vol.24, No.2(2006), 370-380.
- Madria, S. and J. Yin, "SeRWA : A secure routing protocol against wormhole attacks in sensor networks", Ad Hoc Networks, Vol.7, No.6(2009), 1051-1063. https://doi.org/10.1016/j.adhoc.2008.09.005
- Yun, J-H., I-H. Kim, J-H. Lim and S-W. Seo, "WODEM : Wormhole Attack Defense Mechanism in Wireless Sensor Networks", Lecture Notes in Computer Science (LNCS), Vol.4412(2007), 200-209.
- Hill, J., R. Szewczyk, A. Woo, S. Hollar, D. Culler and K. Pister, "System Architecture Directions for Networked Sensors", in Proc. ASPLOS(2000), 93-104.
- Xbow sensor networks, http://www.xbow.com.