참고문헌
- I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks," Communications Magazine, IEEE, vol. 40, pp. 102-114, 2002 .
- K. Akkaya and M. Younis, "A survey on routing protocols for wireless sensor networks," Ad Hoc Networks, vol. 3, pp. 325-349, 2005. https://doi.org/10.1016/j.adhoc.2003.09.010
- Jong-Kyun Jeong and In-Ho Ra. Asynchronous and adaptive massage passing scheme for wireless sensor networks. Journal of Korean Institute of Intelligent Systems 23(3), pp. 196-201. 2013. https://doi.org/10.5391/JKIIS.2013.23.3.196
- Hyun-Tae Kim and In-Ho Ra. A fault-tolerant QoS routing scheme based on interference awareness for wireless sensor networks. Journal of Korean Institute of Intelligent Systems 22(2), pp. 148-153. 2012. https://doi.org/10.5391/JKIIS.2012.22.2.148
- Hyuk Park and Tae Ho Cho. Partial path selection method in each subregion for routing path optimization in SEF based sensor networks. Journal of Korean Institute of Intelligent Systems 22(1), pp. 108-113. 2012. https://doi.org/10.5391/JKIIS.2012.22.1.108
- Tae Hyoung Kim, Geuntaek Kang and Won Chang Lee. Clustering algorithm for efficient use of energy in wireless sensor network. Journal of Korean Institute of Intelligent Systems 20(1), pp. 36-41. 2010. https://doi.org/10.5391/JKIIS.2010.20.1.036
- X. Du and H. Chen, "Security in wireless sensor networks," Wireless Communications, IEEE, vol. 15, pp. 60-66, 2008 .
- J. Deng, R. Han and S. Mishra, "INSENS: Intrusion-tolerant routing for wireless sensor networks," Comput. Commun., vol. 29, pp. 216-230, 2006. https://doi.org/10.1016/j.comcom.2005.05.018
- E. Shi and A. Perrig, "Designing secure sensor networks," Wireless Communications, IEEE, vol. 11, pp. 38-43, 2004 .
- S. Zhu, S. Setia and S. Jajodia, "LEAP : Efficient security mechanisms for large-scale distributed sensor networks," ACM Transactions on Sensor Networks (TOSN), vol. 2, pp. 500-528, 2006. https://doi.org/10.1145/1218556.1218559
- Su-Man Nam and Tae-Ho Cho. Dynamic states consideration for next hop nodes selection method to improve energy efficiency in LEAP based wireless sensor networks. Journal of Korean Institute of Intelligent Systems 23(6), pp. 558-564. 2013. https://doi.org/10.5391/JKIIS.2013.23.6.558
- (Accessed: Jan. 11, 2016). MICAz: wireless measurement system. Available: http://trl.iba.edu.pk/Memsic-set-2.pdf.
- E. C. Ngai, J. Liu and M. R. Lyu, "An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks," Comput. Commun., vol. 30, pp. 2353-2364, 2007 . https://doi.org/10.1016/j.comcom.2007.04.025
- N. Gandhewar and R. Patel, "Detection and prevention of sinkhole attack on AODV protocol in mobile adhoc network," in Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on, 2012, pp. 714-718.
- I. Krontiris, T. Giannetsos and T. Dimitriou, "Launching a sinkhole attack in wireless sensor networks; the intruder side," in Networking and Communications, 2008. WIMOB'08. IEEE International Conference on Wireless and Mobile Computing, 2008, pp. 526-531.
- Kyu-Hyun Song and Tae-Ho Cho. Improvement robust bidirectional verification scheme for detecting routing attacks in enhanced INSENS based seneor netowrks. 2015, .
- F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," Selected Areas in Communications, IEEE Journal on, vol. 23, pp. 839-850, 2005 . https://doi.org/10.1109/JSAC.2005.843561