1. [1] L. Buttyan, L. Dora, and I. Vajda, “Statistical wormhole detection in sensor networks,” Lect. Notes Comput. Sci., vol.3813, pp.128-141, July 2005.
2. Statistical en-route filtering of injected false data in sensor networks
3. [3] A. Wood, V. Srinivasan, and J. Stankovic, “Autonomous defenses for security attacks in pervasive CPS infrastructure,” Proc. DHS: S&T Workshop on Future Directions in Cyber-physical Systems Security, July 2009.
4. [4] H. Yang and S. Lu, “Commutative cipher based en-route filtering in wireless sensor networks,” Proc. Vehicular Technology Conference, pp.1223-1227, Oct. 2003.
5. [5] S. Zhu, S. Setia, S. Jajodia, and P. Ning, “Interleaved hop-by-hop authentication against false data injection attacks in sensor networks,” ACM Trans. Sensor Networks, vol.3, no.3, Aug. 2007.