1. [1] Cao, Z., Deng, H., Guan, Z. and Chen, Z.: Information-theoretic modeling of false data filtering schemes in wireless sensor networks, ACM Trans. Sensor Networks, Vol.8, No.2, pp.1-19 (2012).
2. [2] Chen, M., Kwon, T., Yuan, Y. and Leung, V.C.: Mobile agent based wireless sensor networks, Journal of Computers, Vol.1, No.1, pp.14-21 (2006).
3. [3] Dini, G. and Lo Duca, A.: Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network, Ad Hoc Networks, Vol.10, No.7, pp.1167-1178 (2012).
4. [4] Dong, Q., Banerjee, S., Adler, M. and Hirata, K.: Efficient Probabilistic Packet Marking, Proc. IEEE ICNP, pp.368-377 (2005).
5. [5] Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F. and Sichitiu, M.: Analyzing and modeling encryption overhead for sensor network nodes, Proc. ACM WSNA, pp.151-159 (2003).