1. Akyildiz, I.F., Su, W., Sankarasubramaniam Y., and Cayirci, E., “A survey on sensor networks”, IEEE communication magazine, Vol. 40, No. 8, August, pp. 102–114.
2. Karlof, C. and Wagner, D., “Secure routing in wireless sensor networks: attacks and countermeasures”, Adhoc networks journal, Vol. 1, No. 2, pp. 293315, 2004.
3. Zhi, S., Jian-Xin, L., Zhi-Yong, F., Zheu-Fu, C. and Guang-Quan, X., “On the security and improvement of a two-factor user authentication scheme in wireless sensor network”, Vol. 17, No. 5, pp. 895–905.
4. Cheng, Y., Alan, D., and Wang, H., “Secure access control method for wireless sensor networks”, International Journal of distributed sensor networks, Vol. 2015, No. 1, pp. 1–6.
5. Zhu, S., Setia, S. and Jajodia, A., “LEAP: Efficient security mechanisms for large-scale distributed sensor networks”, Proceedings of the ACM conference on computer and communications security (CCS ’03), October, pp. 89–97, 2003.