1. Menezes, A., van Oorschot, P., Vanstone, A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
2. Benenson, Z., Cholewinski, P., Felix, C.: Wireless sensor network security. In: Vulnerabilities and Attacks in Wireless Sensor Networks, pp. 22–43. IOS Press, Amsterdam (2008)
3. Kim, J., Caytiles, R., Kim, K.: A review of the vulnerabilities and attacks for wireless sensor networks. J. Secur. Eng. 9(3), 241–250 (2012)
4. Becher, A., Benenson, Z., Dornseif, M.: Tampering with motes: real-world attacks on wireless sensor networks. In: Proceedings of 3rd International Conference on Security in Pervasive Computing, pp. 104–118 (2006)
5. Groups, T.C.: Trusted Platform Module (TPM) Summary (2009). http://www.trustedcomputinggroup.org/resources/trusted_platform_module_tpm_summary . Accessed 07 May 2015