1 |
Akyildiz, F., Su, W., Sangkarasubramaniam, Y. and Cayirci, E. (2002), "A Survey on Sensor Networks" IEEE Communications Magazine, pp. 102-114.
|
2 |
Ye, F., Luo, H. and Lu, S. Zhang, L. (2005), "Statistical En- Route Filtering of Injected False Data in Sensor Networks", IEEE Journals on Selected Areas in Communications, Vol. 23, No. 4, pp. 839-850.
DOI
|
3 |
Al-Karaki, J.N., Kamal, A.E. (2004), "Routing Techniques in wireless sensor networks: a survey", IEEE Wireless Communication Magazine, Vol. 11, No. 6, pp. 6-28.
DOI
ScienceOn
|
4 |
Moon, S. Y., Cho, T. H. (2008), "Report Verification Probability Control Method for Energy Efficiency in Sensor Networks", Thesis, University of sunkyunkwan, pp. 2-3.
|
5 |
Karlof, Chris., Wagner, David. (2003), "Secure routing in wireless sensor networks: attacks and countermeasures", Ad Hoc Networks Vol. 1, No. 2-3, pp. 293-315.
DOI
ScienceOn
|
6 |
Zhen, Y, Yong, G. (2005), "A dynamic en-route scheme for filtering false data injection in wireless sensor networks", Proceedings of the 3rd international conference on Embedded networked sensor systems, November San Diego, California, USA.
|
7 |
Hao, Y., Chris., Songwu, L. (2004), "Commutative cipher based en-route filtering in wireless sensor networks", VTC2004-Fall. 2004 IEEE 60th , Vol. 2, No., pp. 1223- 1227 Vol. 2, 26-29 Sept.
|
8 |
Sencun, Z., Seti, S., Jajodia, S. (2004), Peng, Ning., "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks", Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on, pp. 259- 271, 9-12 May.
|