1. Chan H, Perrig A, Song D: Random key predistribution schemes for sensor networks. Proceedings of the IEEE Symposium on Security and Privacy (S&P '03), September 2003
2. Newsome J, Shi E, Song D, Perrig A: The sybil attack in sensor networks: analysis & defenses. Proceedings of the 3rd International Conference on Information Processing in Sensor Networks (IPSN '04), April 2004
3. Demirbas M, Song Y: An RSSI-based scheme for sybil attack detection in wireless sensor networks. Proceedings of the International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM '06), June 2006, New York, NY, USA 564-568.
4. Di Pietro R, Mancini LV, Mei A: Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wireless Networks 2006, 12(6):709-721. 10.1007/s11276-006-6530-5
5. Conti M, Di Pietro R, Mancini LV, Mei A: A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '07), 2007 80-89.