1. Murthy, C.S.R., Manoj, B.S.: Ad Hoc Wireless Sensor Networks Architectures and Protocols. Prentice Hall PTR, Upper Saddle River (2004)
2. Guimarães, G., Souto, E., Sadok, D.F.H., Kelner, J.: Evaluation of Security Mechanisms in Wireless Sensor Networks. In: Proceedings of the International Conference on Wireless Technologies/High Speed Networks/Multimedia Communications Systems/Sensor Networks, ICW/ICHSN/ICMCS/SENET, Montreal, Canada, pp. 428–433 (2005)
3. Hartung, C., Balasalle, J., Han, R.: Node Compromise in Sensor Networks: The Need for Secure Systems. Technical Report, CU-CS-990-05. University of Colorado at Boulder - Department of Computer Science (2005)
4. Yan, Z., Zhang, P., Virtanen, T.: Trust Evaluation Based Security Solution in Ad hoc Networks (2003),
http://research.nokia.com/publications/trust_evaluation_based_security_solution_ad_hoc_networks
5. Dasgupta, P.: Trust as a Commodity. In: Gambetta, D. (ed.) Trust Making and Breaking Cooperative Relations, 3rd edn., pp. 49–72. Basil Blackwell Publishing Ltd., Oxford (2000)