1. Xu, K., Hong, X., & Gerla, M. (2002). An ad hoc network with mobile backbones. In Proceedings of IEEE international conference on communications (Vol. 5, pp. 3138–3143). New York, NY.
2. Du, X., & Lin, F. (2005) Improving routing in sensor networks with heterogeneous sensor nodes. In Proceedings of IEEE 61st vehicular technology conference (Vol. 4, pp. 2528–2532), May–Jun. 2005. Stockholm, Sweden.
3. Wong, K. H. M., Zheng, Y., Cao, J., & Wang, S. (2006) A dynamic user authentication scheme for wireless sensor networks. In Proceedings of IEEE international conference on sensor networks, ubiquitous, and trustworthy computing (Vol. 1, pp. 244–251), Jul. 2006. Taichung, Taiwan.
4. Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.
5. Chen, T.-H., & Shih, W.-K. (2010). A robust mutual authentication protocol for wireless sensor networks. ETRI Journal, 32(5), 704–712.