1. Chong, C. Y., & Kumar, S. (2003). Sensor networks: evolution, opportunities and challenges. Proceedings of the IEEE, 91(8), 1247–1256.
2. Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.
3. Perrig, A., Szewczyk, R., Wen, V., Culler, D., & Tygar, J. D. (2001). SPINS: security protocols for sensor networks. In Proceedings of ACM MobiCom’01, Rome, Italy (pp. 189–199).
4. Sastry, N., & Wagner, D. (2004). Security considerations for IEEE 802.15.4 networks. In Proceedings of ACM workshop wireless security, Philadelphia, USA (pp. 32–42).
5. Tobarra, L., Cazorla, D., & Cuartero, F. (2009). Model checking wireless sensor network security protocols: TinySec plus LEAP plus TinyPK. Telecommunications Systems, 40(3–4), 91–99.