1. Deng, Han, R., Mishra, S.: INSENS: Intrusion-tolerant routing in wireless sensor networks, Technical Report CU-CS-939-02, Department of Computer Science, University of Colorado at Boulder (November 2002)
2. Karp, B., Kung, H.T.: GPSR: Greedy perimeter stateless routing for wireless networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 243–254. ACM Press (2000)
3. Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. In: Proceedings of the SCS Communication Networks and Distributed System Modeling and Simulation Conference, CNDS 2002 (2002)
4. Tanachaiwiwat, S., Dave, P., Bhindwale, R., Helmy, A.: Routing on trust and isolating compromised sensors in location-aware sensor networks. In: Poster paper Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, pp. 324–325. ACM Press (2003)
5. Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Proceedings of the Symposium on Applications and the Internet Workshops, p. 384. IEEE Computer Society (2003)