[1]
|
K. Romer and F. Mattern, “The Design Space of Wireless Sensor Networks,” IEEE Wireless Communications, Vol. 11, No. 6, 2004, pp. 54-61.
|
[2]
|
C. F. Garcia-Hernandez, P. H. Ibarguengoytia-Gonzalez, J. Garcia-Hernandez and J. A. Perez-Diaz, “Wireless Sensor Networks and Application: A Survey,” International Journal of Computer Science and Network Security, Vol. 7, No. 3, 2007, pp. 264-273.
|
[3]
|
C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Proceedings of IEEE International Workshop on Sensor Network Protocols and Applications, Alaska, 11-13 May 2003, pp. 113-127.
|
[4]
|
W. Heinzelman, A. Chandrakasan and H. Balakrishnan, “Energy Efficient Communication Protocol for Wireless Sensor Networks,” Proceedings of the Hawaii International Conference on System Sciences, Maui, 4-7 January 2000, pp. 3005-3014.
|
[5]
|
N. Nasser and Y. F. Chen, “Secure and Energy-Efficient Multi-Path Routing Protocol for Wireless Sensor Networks,” Computer Communications, Vol. 30, No. 11-12, 2007, pp. 2401-2412.
|
[6]
|
I. Khalil, S. Bagchi, C. N. Rotaru and N. B. Shroff, “UNMASK: Utilizing Neighbor Monitoring for Attack Mitigation in Multi-Hop Wireless Sensor Networks,” Ad Hoc Networks, Vol. 8, No. 1, 2010, pp. 148-164.
|
[7]
|
S.-B. Lee and Y.-H. Choi, “A Secure Alternate Path Routing in Sensor Networks,” Computer Communications, Vol. 30, No. 1, 2006, pp. 153-165.
|
[8]
|
S. Madria and J. Yin, “SeRWA: A Secure Routing Protocol against Wormhole Attacks in Sensor Networks,” Ad Hoc Networks, Vol. 7, No. 6, 2009, pp. 1051-1063.
|
[9]
|
R. Mavropodi and P. Kotzanikolaou, “SecMR: A Secure Multi-Path Routing Protocol for Ad Hoc Networks,” Ad Hoc Networks, Vol. 5, No. 1, 2007, pp. 87-99.
|
[10]
|
S. Song, K. Hwang, R. Zhou and Y. K. Kwok, “Trusted P2P Transactions with Fuzzy Reputation Aggregation,” IEEE Internet Computing, Vol. 9, No. 6, 2005, pp. 24-34.
|