1. P2P networking and applications;Buford,2008
2. Guide to wireless ad hoc networks,2009
3. Ksiezopolski B., Kotulski Z.. On scalable security model for sensor networks protocols. In: Scherer RJ, Katranuschkov P, Schapke S.-E., editors. CIB-W78 2005, 22nd conference information technology in construction. 2005. p. 463–9.
4. CMAC, CCM and GCM/GMAC: advanced modes of operation of symmetric block ciphers in the Wireless Sensor Networks;Szalachowski;Information Processing Letters,2010
5. Encyclopedia of structural health monitoring,2009