1. Tsetsos V, Alyfantis G, Hasiotis T, Sekkas O, Hadjiefthymiades S. Towards commercial wireless sensor networks: business and technology architecture. Ad Hoc & Sensor Wireless Networks, 2006, 2(1): 59–80
2. Padmavathi G, Shanmugapriya D. A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security (IJCSIS), 2009, 4(1): 1–9
3. Jain A, Kant K, Tripathy M. Security solutions for wireless sensor networks. In: Proceedings of the 2nd IEEE International Conference on Advanced Computing & Communication Technologies (ACCT). 2012, 430–433
4. Zhou Z, Yow K C. Geographic ad hoc routing security: attacks and countermeasures. Ad Hoc & Sensor Wireless Networks, 2005, 1(3): 235–253
5. Becher A, Benenson Z, Dornseif M. Tampering with motes: realworld physical attacks on wireless sensor networks. Technical Report. Springer Berlin Heidelberg, 2006