[1]
C. Karlof and D. Wagner: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Ad Hoc Networks Vol. 1 (2003), pp.293-315.
DOI: 10.1016/s1570-8705(03)00008-8
Google Scholar
[2]
J. Walters, Z. Liang, W. Shi and V. Chaudhary, in: Wireless Sensor Networks Security: a Survey, edited by Y. Xiao CRC Press, Boca Raton, FL (2006), in press.
Google Scholar
[3]
H. Sun, C. Chen and Y. Hsiao: An Efficient Countermeasure to the Selective Forwarding Attack in Wireless Sensor Networks, edited by J.F. Wang, volume 1 of IEEE Region 10 Annual International Conference, IEEE (2007).
DOI: 10.1109/tencon.2007.4428866
Google Scholar
[4]
G. Li, J. He and Y. Fu: Group-based Intrusion Detection System in Wireless Sensor Networks. Computer Communications Vol. 31 (2008), pp.4324-4332.
DOI: 10.1016/j.comcom.2008.06.020
Google Scholar
[5]
B. Carbunar, I. Ioannidis and C. Nita-Rotaru: JANUS: towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks, edited by M. Jakobsson and A. Perrig, volume 1 of the 3rd ACM Workshop on Wireless Security, ACM (2004).
DOI: 10.1145/1023646.1023649
Google Scholar
[6]
B. Yu and B. Xiao: Detecting Selective Forwarding Attacks in Wireless Sensor Networks, edited by P. Spirakis and H.J. Siegel, volume 1 of the 20th International Parallel and Distributed Processing Symposium, IEEE (2006).
DOI: 10.1109/ipdps.2006.1639675
Google Scholar
[7]
B. Yu and B. Xiao: CHEMAS: Identify Suspect Nodes in Selective Forwarding Attacks. Journal of Parallel and Distributed Computing Vol. 67 (2007), pp.1218-1230.
DOI: 10.1016/j.jpdc.2007.04.014
Google Scholar
[8]
K. Ioannis and T. Dimitriou: Toward Intrusion Detection in Sensor Networks, edited by A. Sibille, volume 1 of the 13th European Wireless Conference, VDE (2007).
Google Scholar
[9]
S. Kaplantzis, A. Shilton, N. Mani and Y. Sekercioglu: Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines, edited by M. Palaniswami, S. Marusic and Y.W. Law, volume 1 of the 3rd Conference of Intelligent Sensors Sensor Networks and Information Processing, IEEE (2007).
DOI: 10.1109/issnip.2007.4496866
Google Scholar
[10]
J. Brown and X. Du: Detection of Selective Forwarding Attacks in Heterogeneous Sensor Networks, edited by K. Gong, K. Letaief and Z. Niu , volume 1 of International Conference on Communications, IEEE (2008).
DOI: 10.1109/icc.2008.306
Google Scholar
[11]
G. Li, X. Liu and C. Wang: A Sequential Mesh Test based Selective Forwarding Attack Detection Scheme in Wireless Sensor Networks, edited by H. Darabi, volume 1 of the 2010 IEEE International Conference on Networking, Sensing and Control, IEEE (2010).
DOI: 10.1109/icnsc.2010.5461599
Google Scholar