“…Accordingly, a detection scheme has to meet the criterion ''trust-no-node'' at any time. Based on a security foundation (Zhang et al, 2008;Curiac et al, 2007;Su et al, 2005;Ngai et al, 2006Ngai et al, , 2007Yu and Xiao, 2006;Ho et al, 2009), adding a process of data filtering (Liu et al, 2007), and employing a vote (or similar) mechanism (Liu et al, 2007;Li et al, 2008a,b;Tiwari et al, 2009;Pires et al, 2004;Ioannis et al, 2007) might be effective for directly ensuring the legitimate identity of a sensor node or diluting the bad effects caused by the unattended malicious nodes.…”