[1]
|
[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cyirci, “Wireless Sensor Networks: A Survey,” Computer Networks, Vol. 38, No. 4, 2002, pp. 393-422.
doi:10.1016/S1389-1286(01)00302-4
|
[2]
|
M. Yu, H. Mokhtar and M. Merabti, “Fault Management in Wireless Sensor Networks,” IEEE Wireless Communications, Vol. 14, No. 6, 2007, pp. 13-19.
doi:10.1109/MWC.2007.4407222
|
[3]
|
H. Huangshui and Q. Guihe, “Fault Management Frameworks in Wireless Sensor Networks,” 4th International Conference on Intelligent Computation Technology and Automation, Shenzhen, 28-29 March 2011, pp. 1093-1096.
|
[4]
|
S. Rajasegarar, C. Leckie and M. Palaniswami, “Anomaly Detection in Wireless Sensor Networks,” IEEE Wireless Communications, Vol. 15, No. 4, 2008, pp. 34-40.
doi:10.1109/MWC.2008.4599219
|
[5]
|
Y. Zhang, N. Meratnia and P. Havinga, “Outlier Detection Techniques for Wireless Sensor Networks: A Survey,” IEEE Communications Surveys & Tutorials, Vol. 12, No. 2, 2010. pp. 1-12.
|
[6]
|
M. H. Lee and Y.-H. Choi, “Fault Detection of Wireless Sensor Networks,” Computer Communications, Vol. 31, No. 14, 2008, pp. 3469-3475.
doi:10.1016/j.comcom.2008.06.014
|
[7]
|
X. Xu, B. Zhou and J. Wan, “Tree Topology Based Fault Diagnosis in Wireless Sensor Networks,” International Conference on Wireless Networks and Information Systems, Hangzhou, 28-29 December 2009, pp. 65-69.
|
[8]
|
B. Krishnamachari and S. Iyengar, “Distributed Bayesian Algorithms for Fault-Tolerant Event Region Detection in Wireless Sensor Networks,” IEEE Transactions on Computers, Vol. 53, No. 3, 2004, pp. 241-250.
doi:10.1109/TC.2004.1261832
|
[9]
|
X. Luo, M. Dong and Y. Huang, “On Distributed Fault-Tolerant Detection in Wireless Sensor Networks,” IEEE Transactions on Computers, Vol. 55, No. 1, 2006, pp. 58-70. doi:10.1109/TC.2006.13
|
[10]
|
M. Ding, D. Chen, K. Xing and X. Cheng, “Localized Fault-Tolerant Event Boundary Detection in Sensor Networks,” IEEE INFOCOM, Miami, 13-17 March 2005, pp. 902-913.
|
[11]
|
K. Ren, K. Zeng and W. Lou, “Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks,” IEEE Transactions on Wireless Communications, Vol. 7, No. 1, 2008, pp. 354-363.
doi:10.1109/TWC.2008.060550
|
[12]
|
M. Bahrepour, N. Meratnia, M. Poel, Z. Taghikhaki and P. Havinga, “Distributed Event Detection in Wireless Sensor Networks for Disaster Management,” 2nd International Conference on Intelligent Networking and Collaborative Systems, Thessaloniki, 24-26 November 2010, pp. 507-512.
|
[13]
|
C.-R. Li and C.-K. Liang, “A Fault-Tolerant Event Boundary Detection Algorithm in Sensor Networks,” In-formation Networking: Towards Ubiquitous Networking and Services, Vol. 5200, 2008, pp. 406-414.
doi:10.1007/978-3-540-89524-4_41
|
[14]
|
D. I. Curiac, O. Banias, F. Dragan, C. Volosencu and O. Dranga, “Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique,” 3rd International Conference on Networking and Services, 19-25 June 2007. doi:10.1109/ICNS.2007.79
|
[15]
|
W. Junior, T. Figueiredo, H. Wong and A. Loureiro, “Malicious Node Detection in Wireless Sensor Networks,” 18th International Parallel and Distributed Processing Symposium, Belo Horizonte, 26-30 April 2004, p. 24.
|
[16]
|
X.-Y. Xiao, W.-C. Peng, C.-C. Hung, and W.-C. Lee, “Using Sensor Ranks for In-Network Detection of Faulty Readings in Wireless Sensor Networks,” International Workshop Data Engineering for Wireless and Mobile Access, June 2007.
|
[17]
|
I. M. Atakli, H. Hu, Y. Chen, W.-S. Ku and Z. Su, “Malicious Node Detection in Wireless Sensor Networks Using Weighted Trust Evaluation,” Proceedings of Spring Simulation Multi-Conference, Ottawa, 14-17 April 2008, pp. 836-842.
|
[18]
|
L. Ju, H. Li, Y. Liu, W. Xue, K. Li and Z. Chi, “An Improved Detection Scheme Based on Weighted Trust Evaluation for Wireless Sensor Networks,” Proceedings of the 5th International Conference on Ubiquitous Information Technology and Applications, Sanya, 16-18 December 2010, pp. 1-6.
|
[19]
|
M. Momani and S. Challa, “Survey of Trust Models in Different Network Domain,” International Journal Ad Hoc, Sensor & Ubiquitous Computing, Vol. 1, No. 3, 2010, pp. 1-19. doi:10.5121/ijasuc.2010.1301
|
[20]
|
M. Momani, S. Challa and R. Alhmouz, “Can We Trust Trusted Nodes in Wireless Sensor Networks?” International Conference on Computer and Communication Engineering, Kuala Lumpur, 13-15 May 2008, pp. 1227-1232.
|
[21]
|
Y. Li, S. Xiong, Q. Chen and F. Fang, “Grid-Based Directed Diffusion for Wireless Sensor Networks,” Second International Conference on Communications and Networking in China, Shanghai, 22-24 August, 2007, pp. 814-818.
|
[22]
|
H. Yuan, H. Ma and H. Liao, “Coordination Mechanism in Wireless Sensor and Actor Networks,” First International Multi-Symposiums on Computer and Computational Sciences, Hanzhou, 20-24 June 2006, pp. 627-634.
|
[23]
|
L. Yu, N. Wang, W. Zhang, and C. Zheng, “GROUP: A Grid-Clustering Routing Protocol for Wireless Sensor Networks,” International Conference on Wireless Communications, Networking and Mobile Computing, Wuhan, 22-24 September 2006, pp. 1-5.
doi:10.1109/WiCOM.2006.287
|
[24]
|
S. Chugh, S. Dharia and D. P. Agrawal, “An Energy Efficient Collaborative Framework for Event Notification in Wireless Sensor Networks,” 28th Annual IEEE International Conference on Local Computer Networks, Bonn, 20-24 October 2003, pp. 430-438.
|
[25]
|
M. Asim, H. Mokhtar and M. Merabti, “A Cellular Approach to Fault Detection and Recovery in Wireless Sensor Networks,” Third International Conference on Sensor Technologies and Applications, Athens, 18-23 June 2009, pp. 352-357. doi:10.1109/SENSORCOMM.2009.61
|
[26]
|
C.-W. Cho and Y.-H Choi, “Concurrent Diagnosis of Clustered Sensor Networks,” LNCS, Vol. 3976, 2006, pp. 1267-1272.
|