1 |
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirici, "A survey on sensor networks," IEEE Communications Magazine, Vol. 40, No. 8, pp. 102-114, Aug. 2002.
DOI
ScienceOn
|
2 |
D. Djenouri and L. Khelladi, "A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks," IEEE Communication Surveys and Tutorials, Vol. 7, No. 4, pp. 2-28, December 2005.
DOI
|
3 |
Zhu S, Setia S, Jajodia S, Ning P. "An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks," In Proc. S&P, pp. 259-271, 2004.
|
4 |
H.Y. Lee and T.H. Cho, "Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks," Lect. Notes Comput. Sc., Vol. 4317, pp.116-127, Dec. 2006.
|
5 |
Ye F, Luo H, Lu S. Statistical En-Route Filtering of Injected False Data in Sensor Networks. IEEE J. Sel. Area Comm., 23(4): pp. 839-850, 2005.
DOI
|
6 |
F. Li and J. Wu, "A probabilistic voting-based filtering scheme in wireless sensor networks," Proc. IWCMC, pp. 2732, July 2006.
|
7 |
B. Xia, B. Yu, C. Gao, "CHEMAS: Identify suspect nodes in selective forwarding attacks," Journal of Parallel and Distributed Computing, vol. 67 issue 11, pp. 1218-1230, Apr. 2007.
DOI
ScienceOn
|
8 |
Karlof, C., Wagner, D. 2003. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Elsevier's Ad Hoc Networks Journal, Special Issue on Sensor Network Protocols and Applications, 1( 2-3), 293-315.
|
9 |
N. Al-Karaki, and A.E. Kamal, "Routing techniques in wireless sensor networks: a survey," IEEE Wireless Communication Magazine, Vol. 11, No. 6, pp. 6-28, 2004.
DOI
ScienceOn
|
10 |
B. Przydatek, D. Song, and A. Perrig, "SIA: Secure Information Aggregation in Sensor Networks," in ACM SenSys, 2003.
|
11 |
T.H. Hai, E. Huh, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge", in Proceeding of Seventh IEEE International Symposium on Network Computing and Applications, 2008.
|
12 |
B.H. Kim and T.H. Cho, "Condition-based Key Dissemination Period Determining Method in Sensor Networks", In Proc. Of ICACT, 2008.
|
13 |
Perrig A, Szewczyk R, Tygar J D, Wen V, Culler D E. SPINS: Security Protocols for Sensor Networks. Wirel. Netw., 8(5): 521-534, 2002.
DOI
ScienceOn
|
14 |
Intanagonwiwat, C., Govindan, R., Estrin, D., Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. Proc. of MOBICOM, 56-67, ACM, 2000.
|
15 |
FFLL, http://ffll.sourceforge.net
|