1. M. Jamshidi, E. Zangeneh, M. Esnaashari, A. M. Darwesh and M. R. Meybodi, A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it, Wireless Personal Communications, Vol. 105, No. 1, pp. 145–173, 2019.
2. M. R. Alagheband and M. R. Aref, Dynamic and secure key management model for hierarchical heterogeneous sensor networks, IET Information Security, Vol. 6, No. 4, pp. 271–280, 2012.
3. M. Jamshidi, M. Ranjbari, M. Esnaashari, A. M. Darwesh and M. R. Meybodi, A new algorithm to defend against sybil attack in static wireless sensor networks using mobile observer sensor nodes, Adhoc & Sensor Wireless Networks, Vol. 43, pp. 213–238, 2019.
4. C. Karlof and D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, Ad hoc Networks, Vol. 1, pp. 299–302, 2003.
5. B. Parno, A. Perrig, V. D. Gligor, Distributed detection of node replication attacks in sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy, 2005.