H. Alzaid, E. Foo and J. G. Nieto, “Secure Data Aggregation in Wireless Sensor Network: a survey, “ In 6th Australasian Information Security Conference, ACSC2008, Wollongong, Australia, January 2008.
B. Parno, E. Gaustad, M. Luk and A. Perrig, “Secure Sensor Network Routing: A Clean-Slate Approach,” CoNEXT 2006, Lisboa, Portugal.
A. P. R. Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz and H. C. Wong, “Decentralized Intrusion Detection in Wireless Sensor Networks,“ In Q2Swinet’05. Montreal, Quebec, Canada, 2005.
R. Shorey, A. Ananda, M. C. Chan, and W. T. Ooi, Mobile, Wireless and Sensor Networks: technology, applications, and future directions
. John Wiley & Sons. Hoboken, New Jersey. 2006Google Scholar
I. Balepin, S. Maltsev, J. Rowe, and K. Levitt, “Using specification-based intrusion detection for automated response,” In Proceeding of 6
th International Symposium, Pittsburgh, PA, September 2003. RAID 2003, Recent Advances in Intrusion Detection.
S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” In 6th ACM/IEEE Internacional Conference on Mobile Computing and Networking MobiCom’ 00, Agosto 2000.
R. Roman, J. Zhou and J. Lopez, “Applying Intrusion Detection Systems to Wireless Sensor Networks,” in Consumer Communications and Networking Conference, 2006. CCNC 2006. 3rd IEEE
W. R. Pires Jr., T. H. P. Figueiredo, H. C. Wong and A. A. F. Loureiro. “Malicious node detection in wireless sensor networks,” In Proceedings of the 8th International Parallel & Distributed Processing Symposium (IPDPS’04), Santa Fe, NM, USA. ISBN 0-7695-2132-0.
Guorui Li, Jingsha He, Yingfang Fu, “A Distributed Intrusion Detection Scheme for Wireless Sensor Networks,” Distributed Computing Systems Workshops, International Conference on, vol. 0, no.0, pp. 309–314, 2008 The 28th International Conference on Distributed Computing Systems Workshops, 2008.
C. V. Z. Zhou, S. Karunasekera and C. Leckie, “A peer-to-peer Collaborative Intrusion Detection System”, Networks, 2005. Jointly held with the 2005, IEEE 7th Malaysia International Conference on Communication.
A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar, “SPINS: Security Protocols for Sensor Networks,” In Mobile Computing and Networking 2001, Rome, Italy.
K. Holger and W. Andreas, Protocols and Architectures for Wireless Sensor Networks
. Jonh Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex. England. 2008.Google Scholar
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek and H. Balakrishnan, “Chord: A scalable peer-to-peer lookup service for internet applications”, Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications. San Diego, California, United States. pp. 149 – 160. 2001.
D. Karger, E. Lehman, T. Leighton, M. Levine, D. Lewin, R. Panigrahy, “Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web,” Proc. 29th Annu. ACM Symp.,May 1997, pp. 654–663.