The following publications are possibly variants of this publication:
- Locating Compromised Sensor Nodes Through Incremental Hashing AuthenticationYoutao Zhang, Jun Yang, Lingling Jin, Weijia Li. dcoss 2006: 321-337 [doi]
- An efficient scheme for removing compromised sensor nodes from wireless sensor networksYong Wang, Byrav Ramamurthy, Xukai Zou, Yuyan Xue. scn, 3(4):320-333, 2010. [doi]
- An Adaptive Early Node Compromise Detection Scheme for Hierarchical WSNsAhmed Al-Riyami, Ning Zhang, John Keane. access, 4:4183-4206, 2016. [doi]
- A Framework for Identifying Compromised Nodes in Wireless Sensor NetworksQing Zhang, Ting Yu, Peng Ning. tissec, 11(3), 2008. [doi]