1. I Akyildiz, W. Su, Y Sankarasubramaniam, and E. Cayirci. 2002. Wireless sensor networks: a survey. Computer Networks 38, 4 (2002), 393--422.
2. A.M. Badescu and L. Cotofana. 2015. A wireless sensor network to monitor and protect tigers in the wild. Ecological Indicators 57 (2015), 447--451.
3. Honglong Chen and Wei Lou. 2010. From Nowhere to Somewhere: Protecting End-to-End Location Privacy in Wireless Sensor Networks. 1--8. https://doi.org/ 10.1109/PCCC.2010.5682341
4. M. Conti, J. Willemsen, and B. Crispo. 2013. Providing source location privacy in wireless sensor networks: A survey. IEEE Communications Surveys and Tutorials 15, 3 (January 2013), 1238--1280.
5. Arshad Jhumka, Matthew Bradbury, and Matthew Leeke. 2012. Towards Understanding Source Location Privacy in Wireless Sensor Networks Through Fake Sources. In Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM '12). IEEE Computer Society, Washington, DC, USA, 760--768.