1. S. Zhu, S. Setia, S. Jajodia, P. Ning, An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks, IEEE Symposium on Security and Privacy (S&P 2004), pp. 259–271.
2. F. Ye, H. Luo, S. Lu, L. Zhang, Statistical en-route filtering of injected false data in sensor networks, Proceedings of 23th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2004), vol. 4, pp. 2446–2457.
3. H. Yang, F. Ye, Y. Yuan, S. Lu, W. Arbaugh, Toward resilient security in wireless sensor networks, Proceedings of the 6th ACM International Symposium on Mobile ad hoc Networking and Computing (MobiHoc 2005), pp. 34–45.
4. Miao Ma, Resilient against report fabrication attack in clusters of heterogeneous sensor networks, Proceedings of IEEE Wireless Communications and Networking Conference (WCNC 2006), Las Vegas, NV USA, April 3–6, 2006.
5. W. Zhang, H. Song, S. Zhu, G. Cao, Least privilege and privilage deprivation: towards tolerating mobile sink compromises in wireless networks, Proceedings of the 11th Annual International Conference on Mobile Computing and Networking (MobiCom 2005), pp. 378–389.