[1]
|
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Ca- yirci, “A Survey on Sensor Networks,” IEEE Communications Magazine, Vol. 40, No. 8, 2002, pp. 102-114.
doi:10.1109/MCOM.2002.1024422
|
[2]
|
K. Akkaya and M. Younis., “A Survey on Routing protocols for Wireless Sensor Networks,” Ad Hoc Network, Vol.3, No.3, 2005, pp. 325-349.
doi:10.1016/j.adhoc.2003.09.010
|
[3]
|
J. N. Al-Karaki and A. E. Kanmal, “Routing techniques in wireless sensor networks: a survey,” IEEE Wireless Communication Society, Vol. 11, No. 6, 2004, pp. 6-28.
doi:10.1109/MWC.2004.1368893
|
[4]
|
D. Culler, D. Estrin and M. Srivastava, “Guest Editors’ Introduction: Overview of sensor networks,” IEEE Computer Society, Vol.37, No. 8, 2004, pp. 41-49.
doi:10.1109/MC.2004.93
|
[5]
|
C. Karlof et al., “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Elsevier's Ad Hoc Networks Journal, Special Issue on Sensor Network Protocols and Applications, Vol. 1, No. 2-3, 2003, pp. 293-315. doi:10.1109/SNPA.2003.1203362
|
[6]
|
F. Ye, H. Luo and S. Lu, “Statistical En-route Filtering of Injected False Data in Sensor Networks,” IEEE Journal Selected Area Communications, Vol. 23, No. 4, 2005, pp. 839-850. doi:10.1109/JSAC.2005.843561
|
[7]
|
C. I. Sun, H. Y. Lee and T. H. Cho, “A Path Selection Method for Improving the Detection Power of Statistical Filtering in Sensor Networks,” Journal of Information Science and Engineering, Vol. 25, No. 4, 2009, pp. 1163-1175.
|
[8]
|
J. M. Kim, Y. S. Han, H. Y. Lee and T. H. Cho, “Path Renewal Method in Filtering Based Wireless Sensor Networks,” Vol. 11, No. 2, 2011, pp. 1396-1404.
doi:10.3390/s110201396
|
[9]
|
S. J. Lee, H. Y. Lee and T. H. Cho, “Environment-Based Selection Method for En-route Filtering Scheme Using Fuzzy Logic,” Journal of Networks, Vol. 5, No 3, 2010, pp. 292-299. doi:10.4304/jnw.5.3.292-299
|
[10]
|
S. H. Lee and T. H. Cho, “Fuzzy Based Key Re-Distribution Period Determination Method in Wireless Sensor Networks,” Lecture Notes in Computer Science, Vol. 6216, 2010, pp. 495-502.
doi:10.1007/978-3-642-14932-0_62
|
[11]
|
H. Y. Lee and T. H. Cho, “Fuzzy-Based Adaptive Thre- shold Determining Method for the Interleaved Authentication in Sensor Networks,” ICDCIT 2006, Lecture Notes in Computer Science, Vol. 4319, 2006, pp. 116-127.
doi:10.1007/11925231_11
|
[12]
|
Louder than a Bomb Software, “Free Fuzzy Logic Library,” 2001, http://ffll.sourceforge.net
|
[13]
|
L. A. Zadeh, “Fuzzy Logic,” 2011,
http://en.wikipedia.org/wiki/Fuzzy_logic
|