References
- Y. Xue, X. M. Chang, S. M. Zhong and Y. Zhuang,"An efficient energy hole alleviating algorithm for wireless sensor networks," IEEE Transactions on Consumer Electronics, vol. 60, no. 3, pp. 347-355, Aug. 2014. https://doi.org/10.1109/TCE.2014.6937317
- J. Ren, Y. X. Zhang, K. Zhang and X. M. Shen,"Lifetime and energy-hole evolution analysis in data-gathering wireless sensor networks," IEEE Transactions on industrial informatics, vol. 12, no. 2, pp. 788-800, Jan. 2015. https://doi.org/10.1109/TII.2015.2411231
- S. Misra and P. D. Thomasinous, "A simple least-time and energy-efficient routing protocol with one-level data aggregation for wireless sensor networks," The Journal of Systems and Software, vol. 83, no. 5, pp. 852-860, May. 2010. https://doi.org/10.1016/j.jss.2009.12.021
- J. H. Ho, H. C. Shih, B. Y. Liao and S. C. Chu, "A ladder diffusion algorithm using ant colony optimization for wireless sensor networks," Information Sciences, vol. 192, no. 6, pp. 204-212, Jun. 2012. https://doi.org/10.1016/j.ins.2011.03.013
- A. Proano, L. Lazos and M. Krunz, "Traffic decorrelation techniques for countering a global eavesdropper in WSNs," IEEE Transactions on Mobile Computing, vol. 38, no. 7, pp. 1-14, Jan. 2016.
- J. Wu, K. Ota and M. Dong, "A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities," IEEE Access, vol. 4, no. 4, pp. 416-424, Jan. 2016. https://doi.org/10.1109/ACCESS.2016.2517321
- L. Cheng, C. D. Wu and Y. Z. Zhang, "Indoor robot localization based on wireless sensor networks," IEEE Transactions on Consumer Electronics, vol. 57, no. 3, pp. 1099-1104, Aug. 2011. https://doi.org/10.1109/TCE.2011.6018861
- O. M. Vazquez, Y. Shmaliy and M. O. Ibarra, "Distributed unbiased FIR filtering with average consensus on measurements for WSNs," IEEE Transactions on Industrial Informatics, vol. 15, no. 6, pp. 1-8, Jan. 2017.
- M. K. Watfa, H. Al-Hassanieh and S. Salmen, "A novel solution to the energy hole problem in sensor networks," Journal of Network and Computer Applications, vol. 36, no. 2, pp. 949-958, Mar. 2013. https://doi.org/10.1016/j.jnca.2012.07.011
- I. Butun, S. D. Morgera and R. Sankar, "A survey of intrusion detection systems in wireless sensor networks," IEEE Communications Surveys and Tutorials, vol. 16, no. 1, pp. 266-282, Jan. 2014. https://doi.org/10.1109/SURV.2013.050113.00191
- K. Lin, T. Xu and J. Song, "Node scheduling for all-directional intrusion detection in SDR-based 3D WSNs," IEEE Sensors Journal, vol. 16, no. 20, pp. 7332-7341, Jan. 2016. https://doi.org/10.1109/JSEN.2016.2558043
- Z. M. Cheng, "A differential game between intrusion detection system and attackers for wireless sensor networks," Wireless Personal Communications, vol. 90, no. 3, pp. 1211-1219, Jun. 2016. https://doi.org/10.1007/s11277-016-3386-6
- E. Y. Vasserman and N. Hopper, "Vampire attacks: Draining life from wireless Ad Hoc sensor networks," IEEE Transactions on Mobile Computing, vol. 12, no. 2, pp. 318-332, Feb. 2013. https://doi.org/10.1109/TMC.2011.274
- L. Guo, J. Wu, Z. Xia and J. Li, "Proposed security mechanism for XMPP-based communications of ISO/IEC/IEEE 21451 sensor networks," IEEE Sensors Journal, vol. 15, no. 5, pp. 2577-2586, Mar. 2015. https://doi.org/10.1109/JSEN.2014.2373388
- S. Han, M. Xie and H. H. Chen, "Intrusion detection in cyber-physical systems: Techniques and challenges," IEEE Systems Journal, vol. 8, no. 4, pp. 1052-1062, Nov. 2014. https://doi.org/10.1109/JSYST.2013.2257594
- C. Kolias, V. Kolias and G. Kambourakis, "TermID: A distributed swarm intelligence-based approach for wireless intrusion detection," International Journal of Information Security, no. 6, pp. 1-16, Jun. 2016.
- Q. Yu, J. Lyu and L. Jiang, "Traffic anomaly detection algorithm for wireless sensor networks based on improved exploitation of the GM (1, 1) model," International Journal of Distributed Sensor Networks, vol. 12, no. 7, pp. 218-227, Jul. 2016.
- A. Patel, H. Alhussian and J. M. Pedersen, "A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems," Computers & Security, vol. 64, no. 1, pp. 92-109, Jan. 2017. https://doi.org/10.1016/j.cose.2016.07.002
- G. Kalnoor, J. Agarkhed and S. R. Patil, "Agent-based QoS routing for intrusion detection of sinkhole attack in clustered wireless sensor networks," in Proc. of 6th Int. Conf. on Computational Intelligence and Informatics, pp. 571-583, May 28-30, 2017.
- K. Manandhar, X. Cao and F. Hu, "Detection of faults and attacks including false data injection attack in smart grid using kalman filter," IEEE transactions on control of network systems, vol. 1, no. 4, pp. 370-379, Apr. 2014. https://doi.org/10.1109/TCNS.2014.2357531
- A. Forootaninia and M. B. Ghaznavi, "An improved watchdog technique based on power-aware hierarchical design for Ids in wireless sensor networks," International Journal of Network Security, vol. 4, no. 4, pp. 161-178, Jul. 2012.
- Y. Wang, D. Wang and F. Chen, "Efficient event detection using self-learning threshold for wireless sensor networks," Wireless Networks, vol. 21, no. 6, pp. 1783-1799, Jun. 2015. https://doi.org/10.1007/s11276-014-0885-9
- Z. H. Xiao, Z. G. Chen and X. H. Deng, "Anomaly detection based on a multi-class CUSUM Algorithm for WSN," Journal of Computers, vol. 5, no. 2, pp. 306-313, Feb. 2010.
- P. Jokarand and V. Leung, "Intrusion detection and prevention for ZigBee-based home area networks in smart grids," IEEE Transaction on Smart Grid, vol. 15, no. 3, pp. 1-12, Apr. 2016.
- H. Moosavi and F. M. Bui, "A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks," IEEE Transactions on Information Forensics and Security, vol. 9, no. 9, pp. 1367-1379, Sep. 2014. https://doi.org/10.1109/TIFS.2014.2332816
- W. Haider, J. Hu, Y. Xie, X. Yu and Q. Wu, "Detecting anomalous behavior in cloud servers by nested arc hidden SEMI-Markov model with state summarization," IEEE Transactions on Big Data, vol. PP, no. 99, pp. 1-1, August. 2017.