Cite this paper
Hu, Y. , Wu, Y. and Wang, H. (2014) Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN. Wireless Sensor Network
, 237-248. doi: 10.4236/wsn.2014.611023
 Yu, Y.L., Li, K.Q., Zhou, W.L. and Li, P. (2011) Trust Mechanisms in Wireless Sensor Networks: Attack Analysis and Countermeasures. Journal of Network and Computer Applications, 35, 867-880.
 He, B., Joshi, S., Agrawal, D.P. and Sun, D. (2010) An Efficient Authenticated Key Establishment Scheme for Wireless Mesh Networks. 2010 IEEE Global Telecommunications Conference, Miami, 6-10 December 2010, 6-10.
 Butun, I., Morgera, S.D. and Sankar, R. (2013) A Survey of Intrusion Detection Systems in Wireless Sensor Networks. IEEE Communications Surveys & Tutorials, 16, 266-282.
 Cho, Y. and Qu, G. (2013) Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs. International Journal of Distributed Sensor Networks, 2013, Article ID: 205920, 16 p.
 Marti, S., Giuli, T.J., Lai, K. and Baker, M. (2000) Mitigating Routing Misbehavior in Mobile and Ad Hoc Networks. Proceedings of International Conference on Mobile Computing and Networking, Boston, 6-11 August 2000, 255-265.
 Hai, T.H. and Huh, E.-N. (2008) Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-Hops Neighbor Knowledge. 2013 IEEE 12th International Symposium on Network Computing and Applications, Cambridge, 10-12 July 2008, 325-331.
 Khalil, I., Bagchi, S., Rotaru, C.N. and Shroff, N.B. (2009) UnMask: Utilizing Neighbor Monitoring for Attack Mitigation in Multihop Wireless Sensor Networks. Ad Hoc Networks, 8, 148-164.
 Lu, Y.F., Lin, K. and Li, K.Q. (2012) Trust Evaluation Model against Insider Attack in Wireless Sensor Networks. International Conference on Cloud and Green Computing, Xiangtan, 1-3 November 2012, 319-326.
 Karlof, C. and Wagner, D. (2003) Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Ad Hoc Networks, 1, 293-315. http://dx.doi.org/10.1016/S1570-8705(03)00008-8
 Challal, Y., Ouadjaout, A., Lasla, N., Bagaa, M. and Hadjidj, A. (2011) Secure and Efficient Disjoint Multipath Construction for Fault Tolerant Routing in Wireless Sensor Networks. Journal of Network and Computer Applications, 34, 1380-1397. http://dx.doi.org/10.1016/j.jnca.2011.03.022
 Shu, T., Liu, S. and Krunz, M. (2009) Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes. Proceedings of the IEEE INFOCOM Conference, Rio de Janeiro, 19-25 April 2009, 2846-2850.
 Sun, H.-M., Che, C.-M. and Hsiao, Y.-C. (2007) An Efficient Countermeasure to the Selective Forwarding Attack in Wireless Sensor Network. IEEE Region 10 Conference (TENCON), Taipei, 30 October-2 November 2007, 1-4.