1. Liu, D., Ning, P.: Security for wireless sensor networks. Advances in Information Security, p. 28. Springer Science and Business Media, Berlin (2007)
2. Zhu, H., Bao, F., Deng, R.H., Kim, K.: Computing of trust in wireless networks. In: Proceedings of 60th IEEE Vehicular Technology Conference, vol. 4, pp. 2621–2624 (2004)
3. Estrin, D., Govindan, R., Heidemann, J.S., Kumar, S.: Next century challenges: Scalable coordination in sensor networks. In: Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 263–270 (1999)
4. Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Proceedings of the 2003 Symposium on Applications and the Internet Workshops, pp. 384–391 (2003)
5. Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: Tag: A tiny aggregation service for ad-hoc sensor networks. ACM SIGOPS Oper. Syst. Rev. 36(SI), 131–146