1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38, 393–422.
2. Li, G., Liu, X., & Wang, C. (2010). A sequential mesh test based selective forwarding attack detection scheme in wireless sensor networks. In IEEE Transactions (pp. 554–558)
3. Huang, X., Ahmed, M. R., & Sharma, D. (2012). A novel protection for wireless sensor networks from internal attacks. In Proceeding of the International Multi Conference of Engineers and Computer Sciences 2012 (IMECS 2012), Publisher: Newswood Limited, Organization: International Association of Engineers (pp. 374–379), Hong Kong, 14–16 March, 2012.
4. Huang, X., Ahmed, M., & Sharma, D. (2011). A novel algorithm for protecting from internal attacks of wireless sensor networks. In 2011 IFIP 9th international conference on embedded and ubiquitous computing (EUC) (pp. 344–349).
5. Lupu, T.-G. (2009). Main types of attacks in wireless sensor networks. In Proceedings of the 9th WSEAS international conference on signal, speech and image processing, and 9th WSEAS international conference on Multimedia, internet & video technologies, Stevens Point, Wisconsin, USA (pp. 180–185).