[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “A Survey on Sensor Networks,” IEEE Communications Magazine, Vol. 40, No. 8, 2002, pp. 102-114. doi:10.1109/MCOM.2002.1024422
[2] L. Buttyan, et al., “Statistical Wormhole Detection in Sensor Networks,” Lecture Notes in Computer Science, Vol. 3813, 2005, pp. 128-141. doi:10.1007/11601494_11
[3] B. Przydatek, D. Song and A. Perrig, “SIA: Secure Information Aggregation in Sensor Networks,” Proceedings of the First International Conference on Embedded Networked Sensor Systems, Vol. 15, No. 1, 2003, pp. 255-265. doi:10.1145/958491.958521
[4] A. C. Ferreira, M. A. Vilaca, L. B. Oliveira, E. Habib, H. C. Wong and A. A. Loureiro, “On the Security of Cluster-Cased Communication Protocols for Wireless Sensor Networks,” Lecture Note in Computer Science, Vol. 3420, 2005, pp. 449-458. doi:10.1007/978-3-540-31956-6_53
[5] S. Park, A. Savvides and M. B. Srivastava, “SensorSim: A Simulation Framework for Sensor Networks,” Proceedings of International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2000, pp. 104-111.
[6] M. Tubaishat and S. Madria, “Sensor Networks: An Overview,” IEEE Potentials, Vol. 22, No. 2, 2003, pp. 20-23. doi:10.1109/MP.2003.1197877
[7] F. Ye, H. Luo and S. Lu, “Statistical En-Route Filtering of Injected False Data in Sensor Networks,” IEEE Journal on Selected Areas in Communications, Vol. 23, No. 4, 2005, pp. 839-850. doi:10.1109/JSAC.2005.843561
[8] H. Yang ans S. Lu, “Commutative Cipher Based En-Route Filtering in Wireless Sensor Networks,” Proceedings of the 60th IEEE Vehicular Technology Conference, Vol. 2, 2004, pp. 1223-1227.
[9] J. N. Al-Karaki and A. E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey,” IEEE Wireless Communications, Vol. 11, No. 6, 2004, pp. 6-28. doi:10.1109/MWC.2004.1368893
[10] Z. Yu and Y. Guan, “A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks,” Proceedings of the 25th IEEE International Conference on Computer Communications, 2006, pp. 1-12.
[11] S. Zhu, S. Setia, S. Jajodia and P. Ning, “An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks,” Proceedings of IEEE Symposium on Security and Privacy, 2004, pp. 259-271.
[12] F. Li and J. Wu, “A Probabilistic Voting-Based Filtering Scheme in Wireless Sensor Networks,” Proceedings of the 2006 International Conference on Wireless Communications and Mobile Computing, 2006, pp. 27-32. doi:10.1109/ICWMC.2006.5
[13] H. Y. Lee and T. H. Cho, “Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks,” IEICE Transactions on Communications, Vol. E90-B, No. 12, 2007, pp. 3346-3353.
[14] H. Y. Lee and T. H. Cho, “Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks,” Lecture Notes in Computer Science, Vol. 4317, 2006, pp. 116-127. doi:10.1007/11951957_11
[15] Y. C. Hu, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks,” IEEE Infocom, 2003, Vol. 3, 2003, pp. 1976-1986
[16] L. Hu and D. Evans, “Using Directional Antennas to Prevent Wormhole Attacks,” Proceedings of the 11th Annual Network and Distributed System Security Symposium, 2004, pp. 1-11.
[17] I. Khalil, “LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks,” Proceedings of International Conference on Dependable Systems and Networks, 2005, pp. 612-621.
[18] S. Capkun, L. Buttyán and J.-P. Hubaux, “SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks,” Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003, pp. 21-32. doi:10.1145/986858.986862