1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.
2. Anderson, R., & Kuhn, M. (1996). Tamper resistance—A cautionary note. In The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland, California.
3. Anderson, R., & Kuhn, M. (1997). Low cost attacks on tamper resistant devices. In IWSP: International Workshop on Security Protocols, LNCS.
4. Kaur, V., & Singh, A. (2013, December). Review of various algorithms used in hybrid cryptography. International Journal of Computer Science and Network, 2(6).
5. So-In, C., Permpol, S., & Rujirakul, K. (2016). Soft computing-based localizations in wireless sensor networks. Pervasive and Mobile Computing, 29, 17–37.