[1] Ye Fan, Luo Haiyun, Lu Songwu, et al. Statistical en-route filtering of injected false data in sensor networks[J]. IEEE Journal on Selected Areas in Communication, 2005, 23(4):839-850.
[2] 章曙光, 周学海, 杨峰, 等. 无线传感器网络中基于邻居节点监听的虚假数据过滤策略[J]. 中国科学技术大学学报, 2014, 44(4):317-324. Zhang Shuguang, Zhou Xuehai, Yang Feng, et al. False reports filtering scheme based on neighbor watch for wireless sensor networks[J]. Journal of University of Science and Technology of China, 2014, 44(4):317-324.
[3] 刘志雄, 王江涛, 王伟平, 等. 传感器网络中一种基于单向哈希链的过滤方案[J]. 软件学报, 2014, 25(10):2385-2396. Liu Zhixiong, Wang Jiangtao, Wang Weiping, et al. One-way hash chain based filtering scheme in wireless sensor networks[J]. Journal of Software, 2014, 25(10):2385-2396.
[4] Karlof C, Wagner D. Secure routing in wireless sensor networks:attacks and countermeasures[J]. Ad Hoc Networks, 2003, 1(2):293-315.
[5] Cui Biru, Yang S. NRE:suppress selective forwarding attacks in wireless sensor networks[C]//2014 IEEE Conference on Communications and Network Security. CA:IEEE Press, 2014:229-237.
[6] Xiao Bin, Yu Bo, Gao Chuanshan. CHEMAS:indentify suspect nodes in selective forwarding attacks[J]. Journal of Parallel and Distributed Computing, 2007, 67(11):1218-1230.
[7] Zhu Sencun, Setia S, Jajodia S. LEAP:efficient security mechanisms for large-scale distributed sensor networks[C]//the 10th ACM Conference on Computer and Communications Security. USA:ACM Press, 2003:62-72. |