1. Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422
2. Vaid R, Katiyar V (2013) Security issues and remedies in wireless sensor networks—a survey. Int J Comput Appl 79(4):31–39
3. Bansal S, Juneja D, Mukherjee S (2011) An analysis of real time routing protocols for wireless sensor networks. Int J Eng Sci Technol (IJEST) 3(3):1797–1801
4. Newsome J, Shi E, Song D, Perrig A (2004) The sybil attack in sensor networks: analysis & defenses. In: Third international symposium on information processing in sensor networks. IPSN 2004. IEEE, pp 259–268
5. Pal O, Alam B (2017) Diffie-Hellman key exchange protocol with entities authentication. Int J Eng Comput Sci 6(4):20831–20839