[1]
|
I. F. Akyildiz, S. Weilian, Y. Sankarasubramaniam and E. Cayirci, “A Survey on Sensor Networks,” IEEE of Communications Magazine, Vol. 40, No. 8, 2002, pp. 102-114. doi:10.1109/MCOM.2002.1024422
|
[2]
|
T. F. Smith and M. S. Waterman, “Identification of Common Molecular Subsequences,” Journal of Molecular Biology, Vol. 147, No. 1, 1981, pp. 195-197. doi:10.1016/0022-2836(81)90087-5
|
[3]
|
E. C. H. Ngai, J. Liu, and M. R. Lyu, “An Efficient Intruder Detection Algorithm against Sinkhole Attacks in Wireless Sensor Networks,” Computer Communications, Vol. 30, No. 11-12, 2007, pp. 2353-2364. doi:10.1016/j.comcom.2007.04.025
|
[4]
|
F. Ye, H. Luo and S. W. Lu, “Statistical En-Route Filtering of Injected False Data in Sensor Networks,” Twenty-Third Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 4, 2004, pp. 2446-2457.
|
[5]
|
Z. Yu and Y. Guan, “A Dynamic En-Route Filtering Scheme for Data Reporting in Wireless Sensor Networks,” Ieee- Acm Transactions on Networking, Vol. 18, No. 1, 2010, pp. 150-163. doi:10.1109/TNET.2009.2026901
|
[6]
|
B. Xiao and B. Yu, “Detecting Selective Forwarding Attacks in Wireless Sensor Networks,” Parallel and Distributed Processing Symposium. IPDPS 2006. 20th International, 25-29 April 2006, pp. 25-29
|
[7]
|
H. J. Deng, X. M. Sun, B. W. Wang and Y. F. Cao, “Selective Forwarding Attack Detection Using Watermark in WSNs,” ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009, Sanya, 8-9 August 2009, Vol. 3, pp. 109-113. doi:10.1109/CCCM.2009.5268016
|
[8]
|
B. Xiao, B. Yu and C. S. Gao, “Chemas: Identify Suspect Nodes in Selective Forwarding Attacks,” Journal of Parallel and Distributed Computing, Vol. 67, No. 11, 2007, pp. 1218-1230. doi:10.1016/j.jpdc.2007.04.014
|
[9]
|
R. Szewczyk, A. Perrig, J. D. Tyger, V. Wen, V. Wen and D. E. Culler, “Spins: Security Protocols for Sensor Networks,” Proceedings of ACM MobiHoc, Annapolis, June 2003, pp. 177-188.
|