共 12 条
- [1] Zhang Y., The Study on Security Problems of Wireless Sensor Networks, pp. 5-18, (2013)
- [2] Prathap U., Shenoy P.D., Venugopal K.R., CMNTS: catching malicious nodes with trust support in wireless sensor networks, 2016 IEEE Region 10 Symposium, pp. 77-82, (2016)
- [3] Althunibat S., Antonopoulos A., Kartsakli E., Et al., Countering intelligent-dependent malicious nodes in target detection wireless sensor networks, IEEE Sensors Journal, 16, 23, pp. 8627-8639, (2016)
- [4] Cui H., Pan J., Yan D., Malicious node detection algorithm based on reputation with voting machanism in wireless sensor networks, Journal of China University of Metrology, 24, 4, pp. 353-359, (2013)
- [5] Singh S.S., Jinila Y.B., Sensor node failure detection using check point recovery algorithm, 2016 International Conference on Recent Trends in Information Technology, pp. 1-4, (2016)
- [6] Prabha V.R., Latha P., Fuzzy trust protocol for malicious node detection in wireless sensor networks, Wireless Personal Communications, 94, 4, pp. 1-11, (2016)
- [7] Varshney K.K., Samundiswary P., Performance analysis of malicious nodes in IEEE 802.15.4 based wireless sensor network, 2014 International Conference on Information Communication and Embedded Systems, pp. 1-5, (2014)
- [8] Das S., Das A., An algorithm to detect malicious nodes in wireless sensor network using enhanced LEACH protocol, 2015 International Conference on Advances in Computer Engineering and Applications, pp. 875-881, (2015)
- [9] Ma Z., A study on cluster head selection scheme for LEACH-C in wireless sensor network, (2016)
- [10] Liu H., Cui J., Dai H., Multivariate classification-based malicious detection for wireless sensor network, Chinese Journal of Sensors and Actuators, 24, 5, pp. 771-777, (2011)