共 15 条
- [11] Zhu S., Setia S., Jajodia S., Ning P., An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks, IEEE Proceedings of Symposium on Security and Privacy, pp. 259-271, (2004)
- [12] Shukla V., Qiao D., Distinguishing Data Transience from False Injection in Sensor Networks, 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 41-50, (2007)
- [13] Ma M., Resilience of sink filtering scheme in wireless sensor networks [J], Computer Communications, 30, 1, pp. 55-65, (2006)
- [14] Li F.W.J., A probabilistic voting-based filtering scheme in wireless sensor networks, Proceedings of the International Wireless Communications and Mobile Computing Conference, pp. 255-265, (2006)
- [15] Wang H., Li Q., PDF: A public-key based false data filtering scheme in sensor networks, Proceedings of the International Conference on Wireless Algorithms, Systems and Applications, pp. 129-138, (2007)