1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine 40(8), 102–114 (2002)
2. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: security protocols for sensor networks. Wireless Networking 8(5), 521–534 (2002)
3. Sardar, A.R., Singh, M., Sarkar, S.K.: Intrusion detection in wireless sensor networks using fuzzy logic. Published in the Proc. of IEMCON 2012 held at Science City Auditoriam, Kolkata, January 17-18 (2012)
4. Singh, M., Das, R.: A Survey of Different Techniques for Detection of Wormhole Attack in Wireless Sensor Network. International Journal of Scientific and Engineering Research 3(10) (October 2012)
5. Sultana, N., Huh, E.-N.: Application driven cluster based group key management with identifier in wireless sensor network. Transaction on Internet and Information System I(1), 5–18 (2007)