1. Wireless Sensor Networks: a Survey”;Akyildiz;Computer Networks,2002
2. Jian Yin Madria, S.K., “A Hierarchical Secure Routing Protocol against Black Hole Attacks in Sensor Networks” in the Proceedings of IEEE Conference on SensorNnetworks, Ubiquitous and Trustworthy Computing (2006), vol 1, pp. 1-8.
3. Rajasegarar,S., Leckie, C., Palaniswami,M. and Bezdek,J.C. (2006) “Distributed Anomaly DetectioninWireless Sensor Networks”, Proceedings of IEEEICCS. .
4. Chitra Devi.N et al, “Efficient Distributed Clustering Based Anomaly Detection Algorithm for Sensor Stream in Clustered Wireless Sensor Networks”, European Journal of Scientific Research , June 2011, Vol. 54(4), pp. 484-498,.