1. Gaurish M. Edake, Ganesh R. Pathak and Suhas H. Patil. Secure Localization and Location Verification in Wireless Sensor Networks. In Proceeding of IEEE 2014 Fourth International Conference on Communication Systems and Network Technologies, DOI: 10.1109/CSNT. 2014.141, pp. 673-676.
2. Kyusuk Han, Kwangjo Kim and Taeshik Shon. Untraceable Mobile Node Authentication in WSN. in Sensors 2010 10, 4410-4429; doi:10.3390/S100504410 in April, 2010.
3. Pathak, G.R.; Patil, S.H.; Rana, A.D.; Suralkar, Y.N. Mathematical model for routing protocol performance in NS2: Comparing DSR, AODV and DSDV as example. in Wireless Computing and Networking (GCWCN), 2014 IEEE Global Conference on, vol., no., pp.184-188, 22-24 Dec. 2014doi: 10.1109/GCWCN. 2014.7030875.
4. Alagheband, M.R.; Aref, M.R. Dynamic and secure key management model for hierarchical heterogeneous sensor networks. in Information Security, IET, vol.6, no.4, pp.271-280, Dec. 2012, doi: 10.1049/iet-ifs.2012.0144.
5. Rantos, K.; Papanikolaou, A.; Fysarakis, K.; Manifavas, C. Secure policy-based management solutions in heterogeneous embedded systems networks. in Telecommunications and Multimedia (TEMU), 2012 International Conference on, vol., no., pp.227-232, July 30 2012-Aug. 1 2012, doi: 10.1109/TEMU. 2012.6294723.