Have a personal or library account? Click to login

References

  1. REN F Y, HUANG H N, LIN C. “Wireless sensor networks”, Journal of Software, Vol.14, No. 7, 2003, pp.1282-1291.
  2. SU Z, LIN C, FENG F J, Ren FY. “Key Management Schemes and Protocols for Wireless sensor networks”. Journal of Software, Vol.18, No. 5, 2007, pp.1218-1231.10.1360/jos181218
  3. Ye, F., Luo, H., Lu, S., & Zhang, L. “Statistical en-route filtering of injected false data in sensor networks”. Joint Conference of the IEEE Computer & Communications Societies, Vol.4, 2004, pp.2446-2457
  4. Zhu, S., Setia, S., Jajodia, S., & Ning, P. “An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks”. Security & Privacy. Proceedings. IEEE Symposium on, 2004, pp.259-271.
  5. Yu L, Li JZ. “Grouping-based resilient statistical en-route filtering for sensor networks”. Proceedings of 28th Annual Joint Conference of the IEEE Computer and Communications Societies, 2009, pp.1782-1790.10.1109/INFCOM.2009.5062098
  6. F. Yang, X.H. Zhou, Q.Y. Zhang, “Multi-Dimensional Resilient Statistical En-Route Filtering in Wireless Sensor Networks”, LNCS: Lecture Notes in Computer Science, 2010, pp. 130-139.10.1007/978-3-642-13067-0_17
  7. K. Naresh, K.P. Pradeep, K.S. Sathish, “An Active En-route Filtering Scheme for Information Reporting in Wireless Sensor Networks”, IJCSIT: International Journal of Computer Science and Information Technologies,Vol.2, No. 4,2011, 1812-1819.
  8. MA M. “Resilience of sink filtering scheme in Wireless sensor networks”. Computer Communications, Vol.30, No1, 2006, pp.55-65.10.1016/j.comcom.2006.07.015
  9. F. Yang, X. H. Zhou, Q. Y. “Zhang. Multi-dimensional resilient statistical en-route filtering in Wireless sensor networks”. In: Proc. of LNCS’10, 2010, pp.130-139.10.1007/978-3-642-13067-0_17
  10. K. Naresh, K.P. PrDadeep, K.S. Sathish. “An Active En-route Filtering Scheme for Information Reporting in Wireless sensor networks”, International Journal of Computer Science and Information Technologies, Vol.2, No.4, 2011, pp.1812-1819.
  11. A. K. Bashir, S. J. Lim, C. S. Hussain, M. S. Park. “Energy Efficient In-network RFID Data Filtering Scheme in Wireless sensor networks”, IEEE Sensors Journal, Vol.11, No.7,2011, pp.7004-7021.10.3390/s110707004323167722163999
  12. X. Y. Yang, J. Lin, P. Moulema, W. Yu, X.W. Fu, W. Zhao. “A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems”. In: Proc. of ICDCS’12, 2012, pp.92-101.10.1109/ICDCS.2012.51
  13. S.Zhu, S.Setia, S.Jajodia. “An interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks”, Proceeding IEEE symposium on Security and privacy, S&P’04, 2004, pp.259-271.
  14. H.Yang, S.Lu. “Commutative Cipher Based En-route Filtering in Wireless sensor networks”, Vehicular Technology Conference, VTC’04, pp.1223-1227.
  15. R.X. Lu, X.D. Lin, H.J. Zhu, X.H. Liang, X.M. Shen. “BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless sensor networks”, IEEE Transactions on Parallel and Distributed Systems, Vol.23, No.1, 2012, pp. 32-43.10.1109/TPDS.2011.95
  16. K.Ren, W.Lou,Y.Zhang. “Providing location-aware End-to-end Data Security in Wireless sensor networks”. Proceedings of the IEEE Conference on Computing and Communicating, INFOCOM’06.2006, pp.585-598.10.1109/INFOCOM.2006.303
  17. A.Perrig, R.Szewczyk, V.Wen, D.Culler, D.Tygar. “Spins: Security Protocols for Sensor Networks”. ACM Mobile Computing and Networking, MOBICOM’02, 2002, pp. 521-534.10.1023/A:1016598314198
  18. S. Chen, A. Dunkels, F. Ö sterlind, T. Voigt, and M. Johansson. “Time synchronization for predictable and secure data collection in Wireless sensor networks,” in Proceedings of The Sixth Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), Corfu, Greece, 2007.pp.165-172
  19. H.Wang, Q.Li. “PDF: A Public-key based False Data Filtering Scheme in Sensor Networks”, Proceedings of the International Conference on Wireless Algorithms, Systems and Applications, WASA’07, 2007, pp.129-138.10.1109/WASA.2007.27
  20. Yu L, Li JZ. “Grouping-based Resilient Statistical En-route Filtering for Sensor Networks”, Proceedings of 28th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’09), 2009, pp.1782-1790.10.1109/INFCOM.2009.5062098
  21. Fan Y, Hao Y, Zhen L. “Catching’ moles’ in sensor networks”, Proc of the 27th International Conference on Distributed Computing Systems,Washington DC: IEEE Computer Society, 2007,pp.69-77.
  22. Xu J, Qian H, Ying W, et al. “A deployment algorithm for mobile wireless sensor networks based on the electrostatic field theory”, The International Journal on Smart Sensing and Intelligent Systems, Vol.8, No.1, 2015, pp. 516-537.10.21307/ijssis-2017-770
  23. Bai, Q., & Jin, C, “Image fusion and recognition based on compressed sensing theory”, International Journal on Smart Sensing & Intelligent Systems, Vol.8, No.1, 2015, pp. 159-180.10.21307/ijssis-2017-753
  24. Feng Y, Xue-hai Z, Shu-guang Z. “Hierarchical traceback in wireless sensor networks”, Proc of the 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008, pp.1-4.
  25. Qiao J, Liu S, Qi X, et al, “Transmission power control in wireless sensor networks under the minimum connected average node degree constraint”, The International Journal on Smart Sensing and Intelligent Systems, Vol.8, No. 1, 2015, pp.801-821.10.21307/ijssis-2017-784
Language: English
Page range: 1795 - 1821
Submitted on: Jun 13, 2016
Accepted on: Oct 6, 2016
Published on: Dec 1, 2016
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 times per year

© 2016 Ze LUO, Lingzhi ZHU, Yunjie CHANG, Qingyun LUO, Guixiang LI, Weisheng LIAO, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.