[1] Zhang Yongmin, He Shibo, Chen Jiming. Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks[J]. Sensor, Mesh & Ad Hoc Communications & Networks, 2013, 24(3):273-281.
[2] Hu Yanling, Liu Anfeng. An efficient heuristic subtraction deployment strategy to guarantee quality of event detection for WSNs[J]. Computer Journal, 2015, 58(8):1747-1762.
[3] Jiang Liangshan, Liu Anfeng, Hu Yanling, et al. Lifetime maximization through dynamic ring-based routing scheme for correlated data collecting in WSNs[J]. Computers & Electrical Engineering, 2015, 41(1):191-215.
[4] Abdelsalam H S, Olariu S. Toward adaptive sleep schedules for balancing energy consumption in wireless sensor networks[J]. IEEE Transactions on Computers, 2012, 61(10):1443-1458.
[5] Shashidhar N, Kari C, Verma R. The efficacy of epidemic algorithms on detecting node replicas in wireless sensor networks[J]. Journal of Sensor & Actuator Networks, 2015, 4(4):378-409.
[6] Lin Chi, Wu Guowei, Yu Chang Wu, et al. Maximizing destructiveness of node capture attack in wireless sensor networks[J]. Journal of Supercomputing, 2015, 71(8):3181-3212.
[7] Lin Xiaodong. CAT:building couples to early detect node compromise attack in wireless sensor networks[C]//Global Telecommunications Conference. Honolulu:IEEE Press, 2009:1-6.
[8] Ding Wei, Yu Yingbing, Yenduri S. Distributed first stage detection for node capture[C]//Global Telecommunications Conference. Miami:IEEE Press, 2010:1566-1570.
[9] Song Hui, Xie Liang, Zhu Sencun, et al. Sensor node compromise detection:the location perspective[C]//International Conference on Wireless Communications and Mobile Computing. Honolulu:ACM Press, 2007:242-247.
[10] Zeng Yingpei, Cao Jiannong, Zhang Shigeng, et al. Random-walk based approach to detect clone attacks in wireless sensor networks[J]. IEEE Journal on Selected Areas in Communications, 2010, 28(5):677-691.
[11] Ren Ju, Zhang Yaoxue, Zhang Kuan, et al. Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks[J]. IEEE Transactions on Wireless Communications, 2016, 15(5):3718-3731.
[12] Liu Yuxin, Dong Mianxiong, Ota K, et al. ActiveTrust:secure and trustable routing in wireless sensor networks[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(9):2013-2027.
[13] Abbas S, Merabti M, Llewellyn-Jones D, et al. Lightweight sybil attack detection in MANETs[J]. IEEE Systems Journal, 2013, 7(2):236-248.
[14] Nam S M, Cho T H. Context-aware architecture for probabilistic voting-based filtering scheme in sensor networks[J]. IEEE Transactions on Mobile Computing, 2017, 16(10):2751-2763.
[15] Al-Riyami A, Zhang Ning, Keane J. An adaptive early node compromise detection scheme for hierarchical WSNs[J]. IEEE Access, 2016, 4(1):4183-4206.
[16] Becher A, Benenson Z, Dornseif M. Tampering with motes:real-world physical attacks on wireless sensor networks[C]//Third International Conference on Security in Pervasive Computing. York:ACM, 2006:104-118.
[17] Ding Wei, Yu Yingbing, Yenduri S. Energy saving by centralized sleep in early detection of captured nodes[C]//IEEE International Workshop on Robotic and Sensors Environments. Phoenix:IEEE Press, 2010:1-6.
[18] Hsin C, Liu Mingyan. Self-monitoring of wireless sensor networks[J]. Computer Communications, 2006, 29(4):462-476. |