1. [1] J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey", Computer Netw., vol. 52, no. 12, pp. 2292-2330, 2008 (DOI: 10.1016/j.comnet.2008.04.002).
2. [2] R. Sachdeva and A. Singla, “Review on security issues and attacks in wireless sensor networks", Int. J. of Adv. Res. in Comp. Sci. and Softw. Engin., vol. 3, no. 4, 2013 [Online]. Available: http://ijarcsse.com/Before August 2017/docs/papers/Volume 3/ 4 April2013/V3I3-0297.pdf
3. [3] P. Y. Dattatraya and J. Agarkhed, “A review on various issues and applications in wireless sensor networks", Int. J. of Sci. and Res., vol. 4, no. 11, pp. 2518-2522, 2015 (DOI:10.21275/v4i11.nov151773).
4. [4] K. Akkaya and M. Younis, “A survey on routing protocols for wireless sensor networks", Ad Hoc Netw., vol. 3, no. 3, pp. 325-349, 2005 (DOI: 10.1016/j.adhoc.2003.09.010).
5. [5] P. Sharma, “A review of attacks on wireless sensor networks", J. of Inform. Syst. and Commun., vol. 3, no. 1, pp. 251-255, 2012 [Online]. Available: http://www.bioinfopublication.org/files/ articles/3 1 53 JISC.pdf