C. Wang, T. Feng, J. Kim, G. Wang, "Catching Packet Droppers and modifiers in Wireless sensor Networks", IEEE Transactions on Parallel and Distributed Syst ,Vol.23 ,2012 View Artical
H. Chan and A. Perrig, "Security and Privacy in Sensor Networks ,2003 View Artical
C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures", Workshop Sensor Network Protocols and Applications ,2003 View Artical
V. Bhuse, A. Gupta, and L. Lilien, "DPDSN: Detection of Packet-Dropping Attacks for Wireless Sensor Networks ,2005 View Artical
M. Kefayati, H.R. Rabiee, S.G. Miremadi, and A. Khonsari, "Misbehavior Resilient Multi-Path Data Transmission in Mobile Ad-Hoc Networks ,2006 View Artical
R. Mavropodi, P. Kotzanikolaou, and C. Douligeris, "Secmr?A Secure Multipath Routing Protocol for Ad Hoc Networks ,2007 View Artical
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical En-Route Filtering of Injected False Data in Sensor Networks ,2004 View Artical
S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An Interleaved Hop-by- Hop Authentication Scheme for Filtering False Data in Sensor Networks ,2004 View Artical
H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, "Toward Resilient Security in Wireless Sensor Networks", Proc. Sixth ACM Int?l Symp.Mobile Ad Hoc Networkin ,2005 View Artical
[Z. Yu and Y. Guan, "A Dynamic En-route Scheme for Filtering False Data in Wireless Sensor Networks ,2006 View Artical
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks ,2000 View Artical
M. Just, E. Kranakis, and T. Wan, "Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks ,2003 View Artical
R. Roman, J. Zhou, and J. Lopez, "Applying Intrusion Detection Systems to Wireless Sensor Networks ,2006 View Artical
S. Lee and Y. Choi, "A Resilient Packet-Forwarding Scheme against Maliciously Packet-Dropping Nodes in Sensor Networks, ,2006 View Artical
I. Khalil and S. Bagchi, "MISPAR: Mitigating Stealthy Packet Dropping in Locally-Monitored Multi-Hop Wireless Ad Hoc Networks", Proc. Fourth Int?l Conf. Security and Privacy in C ,2008 View Artical
I. Krontiris, T. Giannetsos, and T. Dimitriou,, "LIDeA: A Distributed Lightweight Intrusion Detection Architecture for Sensor Networks ,2008 View Artical
S. Ganeriwal, L.K. Balzano, and M.B. Srivastava, "Reputation- Based Framework for High Integrity Sensor Networks ,2008 View Artical
W. Li, A. Joshi, and T. Finin, "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach ,2010 View Artical
P. Michiardi and R. Molva, "Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks ,2002 View Artical
S. Buchegger and J. Le Boudec, "Performance Analysis of the Confidant Protocol ,2002 View Artical
F. Ye, H. Yang, and Z. Liu, "Catching Moles in Sensor Networks ,2007 View Artical
Q. Li and D. Rus, "Global Clock Synchronization in Sensor Networks ,2004 View Artical
K. Sun, P. Ning, C. Wang, A. Liu, and Y. Zhou, "Tinysersync: Secure and Resilient Time Synchronization in Wireless Sensor Networks ,2006 View Artical
H. Song, S. Zhu, and G. Cao, "Attack-Resilient Time synchronization for Wireless Sensor Networks ,2007 View Artical
B. Xiao, B. Yu, and C. Gao, "Chemas: Identify Suspect Nodes in Selective Forwarding Attacks", J. Parallel and Distributed Computing ,2007 View Artical