1. Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52(12), 2292–2330.
2. Mandal, P. S., & Ghosh, A. K. (2011). Secure position verification for wireless sensor networks in noisy channels. In International conference on Ad-Hoc networks and wireless (pp. 150–163). Berlin: Springer.
3. Strikos, A. A. (2007). A full approach for intrusion detection in wireless sensor networks. School of Information and Communication Technology, KTH.
4. Bhattasali, T., & Chaki, R. (2011). A survey of recent intrusion detection systems for wireless sensor network. In International conference on network security and applications (pp. 268–280). Berlin: Springer.
5. Albers, P., Camp, O., Percher, J. M., Jouga, B., Me, L., & Puttini, R. S. (2002). Security in Ad Hoc networks: A general intrusion detection architecture enhancing trust based approaches. In Proceedings of the first international workshop on wireless information systems (WIS-2002) (pp. 1–12).