1 |
F. Li and J. Wu, "A probabilistic voting-based filtering scheme in wireless sensor networks," Proc. IWCMC, pp. 27–32, 2006.
|
2 |
H. Yang and S. Lu, "Commutative Cipher Based En-route Filtering in Wireless Sensor Networks," IEEE in Proc. of VTC, pp. 1223-1227, 2004.
|
3 |
Przydatek, B., Song, D., and Perrig, A., "SIA: Secure Information Aggregation in Sensor Networks," ACM, in Proc. of SenSys, pp. 255-265, 2003.
|
4 |
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical En-route Filtering of Injected False Data in Sensor Networks," IEEE Journals on Selected Areas in Communications, vol. 23, no. 4, pp. 839-850, 2005.
DOI
|
5 |
I.F. Akyldiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci., "A Survey on Sensor Networks," IEEE Wireless Communication Magazine, vol. 40, no. 8, pp. 102-116, 2002.
DOI
ScienceOn
|
6 |
J.N. Al-Karaki and A.E. Kamal., "Routing techniques in wireless sensor networks: a survey," IEEE Wireless Communication Magazine, vol. 11, no. 6, pp. 6-28, 2004.
DOI
ScienceOn
|
7 |
Buttyan, L. et al, "Statistical Wormhole Detection in Sensor Networks," Lecture Notes in Computer Science. 3813, 128-141, 2005.
|
8 |
Chris Karlof and David Wagner, "Secure routing in wireless sensor networks: attacks and countermeasure," IEEE SPNA, pp. 113-127, 2002.
|
9 |
김상률, 조대호, "통계적 여과 기법기반의 센서 네트워크를 위한 퍼지로직을 사용한 보안 경계 값 결정 기법," 한국시뮬레이션학회지, 16(2), pp. 27-35, 2007.
과학기술학회마을
|
10 |
H.Y. Lee, T.H. Cho, "Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks," Lect. Notes Comput. Sc. vol. 4317, pp.116-127 , 2006.
|
11 |
Perrig, A., Szewczyk, R., Tygar, J., Wen, V. and Culler, D. "SPINS: Security Protocols for Sensor Networks," Wirel. Netw., vol. 8, pp. 521-534, 2002.
DOI
ScienceOn
|
12 |
Zhu S, Setia S, Jajodia S, and Ning P, "An Interleaved Hop-by- Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks," In Proc. S&P, pp. 259-271, 2004.
|
13 |
Lee, H.Y., Cho, T,H., "Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks," IEICE Trans. Commun. E90--B(12), 3346-3353, 2007.
|
14 |
Yu Z and Guan Y, "A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks," In Proc. SenSys, pp. 294-295, 2005.
|