[1]
|
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “A Survey on Sensor Networks,” IEEE Communications Magazine, Vol. 40, No. 8, 2002, pp. 102-114.
doi:10.1109/MCOM.2002.1024422
|
[2]
|
L. Buttyan, et al., “Statistical Wormhole Detection in Sensor Networks,” Lecture Notes in Computer Science, Vol. 3813, 2005, pp. 128-141. doi:10.1007/11601494_11
|
[3]
|
B. Przydatek, D. Song and A. Perrig, “SIA: Secure Information Aggregation in Sensor Networks,” Proceedings of the First International Conference on Embedded Networked Sensor Systems, Vol. 15, No. 1, 2003, pp. 255-265. doi:10.1145/958491.958521
|
[4]
|
A. C. Ferreira, M. A. Vilaca, L. B. Oliveira, E. Habib, H. C. Wong and A. A. Loureiro, “On the Security of Cluster-Cased Communication Protocols for Wireless Sensor Networks,” Lecture Note in Computer Science, Vol. 3420, 2005, pp. 449-458. doi:10.1007/978-3-540-31956-6_53
|
[5]
|
S. Park, A. Savvides and M. B. Srivastava, “SensorSim: A Simulation Framework for Sensor Networks,” Proceedings of International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2000, pp. 104-111.
|
[6]
|
M. Tubaishat and S. Madria, “Sensor Networks: An Overview,” IEEE Potentials, Vol. 22, No. 2, 2003, pp. 20-23. doi:10.1109/MP.2003.1197877
|
[7]
|
F. Ye, H. Luo and S. Lu, “Statistical En-Route Filtering of Injected False Data in Sensor Networks,” IEEE Journal on Selected Areas in Communications, Vol. 23, No. 4, 2005, pp. 839-850. doi:10.1109/JSAC.2005.843561
|
[8]
|
H. Yang ans S. Lu, “Commutative Cipher Based En-Route Filtering in Wireless Sensor Networks,” Proceedings of the 60th IEEE Vehicular Technology Conference, Vol. 2, 2004, pp. 1223-1227.
|
[9]
|
J. N. Al-Karaki and A. E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey,” IEEE Wireless Communications, Vol. 11, No. 6, 2004, pp. 6-28.
doi:10.1109/MWC.2004.1368893
|
[10]
|
Z. Yu and Y. Guan, “A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks,” Proceedings of the 25th IEEE International Conference on Computer Communications, 2006, pp. 1-12.
|
[11]
|
S. Zhu, S. Setia, S. Jajodia and P. Ning, “An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks,” Proceedings of IEEE Symposium on Security and Privacy, 2004, pp. 259-271.
|
[12]
|
F. Li and J. Wu, “A Probabilistic Voting-Based Filtering Scheme in Wireless Sensor Networks,” Proceedings of the 2006 International Conference on Wireless Communications and Mobile Computing, 2006, pp. 27-32.
doi:10.1109/ICWMC.2006.5
|
[13]
|
H. Y. Lee and T. H. Cho, “Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks,” IEICE Transactions on Communications, Vol. E90-B, No. 12, 2007, pp. 3346-3353.
|
[14]
|
H. Y. Lee and T. H. Cho, “Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks,” Lecture Notes in Computer Science, Vol. 4317, 2006, pp. 116-127. doi:10.1007/11951957_11
|
[15]
|
Y. C. Hu, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks,” IEEE Infocom, 2003, Vol. 3, 2003, pp. 1976-1986
|
[16]
|
L. Hu and D. Evans, “Using Directional Antennas to Prevent Wormhole Attacks,” Proceedings of the 11th Annual Network and Distributed System Security Symposium, 2004, pp. 1-11.
|
[17]
|
I. Khalil, “LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks,” Proceedings of International Conference on Dependable Systems and Networks, 2005, pp. 612-621.
|
[18]
|
S. Capkun, L. Buttyán and J.-P. Hubaux, “SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks,” Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003, pp. 21-32. doi:10.1145/986858.986862
|