[1] C. Krau?, F. Stumpf and C. Eckert, “Detecting Node Compro-mise in Hybrid Wireless Sensor Networks Using Attestation Techniques,” Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks, 2007.
[2] T. G. Handel and M. T. Sandford, “Hiding Data in the OSI Network Model,” Proceedings of the First International Workshop on Information Hiding, Vol. 1174, 1996, pp. 23-38. doi: 10.1007/3-540-61996-8_29
[3] B. W. Lampson, “A Note on the Confinement Problem,” Communications of the ACM, Vol. 16, No. 10, 1973. doi:10.1145/362375.362389
[4] G. J. Simmons, “The Prisoner’s Problem and the Subliminal Channel,” Workshop on Communications Security (CRYPTO’83), 1984.
[5] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, “Information Hiding - A Survey,” Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, 1999.
[6] National Computer Security Center, “A Guide to Understanding Covert Channel Analysis of Trusted Systems,” 1993.
[7] Crossbow Technology Inc., “MPR-MIB Users Manual,” June 2006.
[8] Crossbow Technology Inc., “MTS/MDA Sensor Board Users Manual,” June 2006.