1 |
H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, "Toward Resilient Security in Wireless Sensor Networks," In ACM Proceedings of MobiHoc 2005, 2005, pp.34-45.
|
2 |
S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks," IN IEEE Proceedings of Symposium on Security and Privacy 2004, 2004, pp.259-271.
|
3 |
S. Zhu, S. Setia, and S. Jajodia, "LEAP: efficient security mechanisms for large-scale distributed sensor networks," In 10th ACM conference on Computer and communication security, pp. 62-72. 2003.
|
4 |
O. Goldreich, S. Goldwasser, and S. Micali, "How to Construct Random Functions," Journal of the ACM, Vol. 33, No. 4, 1986, pp 210-217.
|
5 |
Sang-Jin Lee, Tae-Ho Cho, "The Desision Method for Security Threshold according to Dynamic Environment on Wireless Sensor Networks," Proceedings of KISS Spring Conference 2009 Vol. 19, No. 1
|
6 |
S. Soro and W.Heinzelman, "Prolonging the Lifetime of Wireless Sensor Networks via Unequal Clustering," Proceedings of the 5th International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks (IEEE WMAN '05), April 2005.
|
7 |
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical En-route Filtering of Injected False Data in Sensor Networks," IN IEEE Proceedings of INFOCOM 2004, 2004, pp.839-850.
|
8 |
F. Li and J. Wu, "A probabilistic voting-based filtering scheme in wireless sensor networks," Proc. IWCMC, pp.27-.32, July 2006.
|