1. Abdullah, M. Y., Hua, G. W., & Alsharabi, N. (2008). Wireless sensor networks misdirection attacker challenges and solutions. In Proceedings of the International Conference on Information and Automation. Zhang Jia Jie City, China: IEEE Press.
2. Aberer, K., Hauswirth, M., & Salehi, A. (2006). Global sensor networks (Technical report LSIR-REPORT-2006-001). Lausanne, Switzerland: School of Computer and Communication Sciences. Retrieved from http://lsirpeople.epfl.ch/salehi/papers/LSIR-REPORT-2006-001.pdf
3. Akyildiz, I. F., Su W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38, 393–422. doi:10.1.1.5.2442
4. Alzaid, H., Abanmi, S., Kanhere, S., & Chou, C. T. (2008). BANAID: A sensor network test-bed for wormhole attacks. In Proceedings of SETMAPE Research and Development Stream of the AUSCERT 2008 Conference. The University of Queensland St. Lucia.
5. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks