1. Abdullah M, Alsanee E, Alseheymi N (2014) Energy efficient cluster-based intrusion detection system for wireless sensor networks. Int J Adv Comput Sci Appl 5(9):10–15
2. Akkaya, K., & Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Elsevier Ad Hoc Networks , 325–349.
3. Al-Shurman, M., Yoo, S. M., & Park, S. (2004). Black hole attack in mobile ad hoc networks. 42nd Annual Southeast Regional Conference ACM-SE, (pp. 96–97).
4. Biren G. (2012). Cloud: An enabler for a smarter home. https://www.ibm.com/blogs/cloudcomputing/2012/03/cloud-an-enabler-for-a-smarter-home/
5. Bojkovic ZS, Bakmaz BM, Bakmaz MR (2008) Security issues in wireless sensor networks. International Journal of Communications II(1):106–115.