Impact of Denial of Service Attacks on Ad Hoc Networks, IEEE/ACM Transactions on Networking, vol.16, issue.4, 2008. ,
DOI : 10.1109/TNET.2007.904002
RaWMS - Random Walk Based Lightweight Membership Service for Wireless Ad Hoc Networks, ACM Transactions on Computer Systems, vol.26, issue.2, pp.1-66, 2008. ,
DOI : 10.1145/1365815.1365817
Power-efficient data dissemination in wireless sensor networks, Proceedings of the 3rd ACM international workshop on Data engineering for wireless and mobile access , MobiDe '03, 2003. ,
DOI : 10.1145/940923.940925
Critical Power for Asymptotic Connectivity in Wireless Networks, Stochastic Analysis, Control, Optimization and Applications, 1998. ,
DOI : 10.1007/978-1-4612-1784-8_33
Directed diffusion, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, 2000. ,
DOI : 10.1145/345910.345920
Insens: Intrusion-tolerant routing in wireless sensor networks, IEEE ICDCS, 2003. ,
Malicious node detection in wireless sensor networks, IEEE IPDPS, 2004. ,
Secure routing in wireless sensor networks: Attacks and countermeasures, 1st IEEE Workshop on Sensor Network Protocols and Applications (SNPA), 2003. ,
The impact of data aggregation in wireless sensor networks, Proceedings 22nd International Conference on Distributed Computing Systems Workshops, 2002. ,
DOI : 10.1109/ICDCSW.2002.1030829
Pace-maker: Tracking peer availability in large networks, 2008. ,
A secure alternate path routing in sensor networks, Computer Communications, vol.30, issue.1, p.30, 2006. ,
DOI : 10.1016/j.comcom.2006.08.006
Selecting cryptographic key sizes, PKC, 2000. ,
A dynamic trust model for mobile ad hoc networks, Future Trends of Dist. Computing Systems, 2004. ,
TAG: a Tiny Aggregation Service for Ad-Hoc Sensor Networks, 2002. ,
Implementing public-key infrastructure for sensor networks, ACM Transactions on Sensor Networks, vol.4, issue.4, pp.1-23, 2008. ,
DOI : 10.1145/1387663.1387668
Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, 2000. ,
DOI : 10.1145/345910.345955
The meanings of trust, 1996. ,
Detecting malicious sensor nodes from learned data patterns, Agent Technology for Sensor Networks, 2007. ,
Using Learned Data Patterns to Detect Malicious Nodes in Sensor Networks, ICDCN, 2008. ,
DOI : 10.1007/978-3-540-77444-0_35
Identity-Based Encryption for Sensor Networks, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), 2007. ,
DOI : 10.1109/PERCOMW.2007.56
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2007. ,
DOI : 10.1109/INFOCOM.2006.154
Gradient broadcast: A robust, long-live large sensor network, 2001. ,
A scalable solution to minimum cost forwarding in large sensor networks, Conf. on Computer Communications and Networks, 2001. ,
Detecting selective forwarding attacks in wireless sensor networks, IEEE IPDPS, 2006. ,
Attack-resistant cooperation stimulation in autonomous ad hoc networks, IEEE/ACM Trans. on Networking, 2005. ,
Residual energy scans for monitoring wireless sensor networks, IEEE WCNC, 2002. ,
Key distribution mechanisms for wireless sensor networks: a survey, IEEE/ACM Trans. on Networking, 2005. ,
13 5.3.1 Performance in RESIST-0 Case, 14 5.3.2 Performance in RESIST-1 and vulnerable cases . . . . . . . . 15 ,
The Impact of Collusion on, p.17 ,