A. D. Jadhad and P. Goswami, “Evaluating the performance of routing protocols in wireless sensor networks,” International Journal of Computer Technology and Electronics Engineering (IJCTEE), 2012, pp. 88-92.
 Culpepper, B.J. and Seng, H.C. (2004) “Sinkhole intrusion indicators in DSR MANETs,” Proceedings 1stInternational Conference on Broad Band Networks, 2004, pp.681–688.
 Douceur, J.R. (2002) “The Sybil Attack,” 1st International Workshop on Peer-To-Peer Systems (IPTPS’02), March 2002, LNCS 2429, pp.251–260.
 Hu, L. and Evans, D. (2004) “Using Directional Antennas to Prevent Wormhole Attacks,” Proceedings of the IEEE Symposium on Network and Distributed System Security (NDSS), 2004.
 Perring, A., Hu, L. and D.B. Johnson, D.B. (2003) “Packet Leashes: A Defence against wormhole attacks in wireless sensor networks,” Proceedings of 22nd Annual Conference of IEEE Computer and Communication Societies, Vol 3, April 2003, pp.1976–1986.
 Saleh, M. and Khatib, I. A. “Throughput Analysis of WEP Security in AdHoc Sensor Networks,” Proceedings, 2nd International Conference on Innovations in Information Technology (IIT05), Sept.26–28, Dubai, 2005.
 Singh, S.K., Singh, M.P. and Singh, D.K. “A Survey on Network Security and Attack Defence Mechanism for Wireless Sensor Networks,” International Journal of Computer Trends and Technology, May-June Issue, 2001.
 Wood, A. D. and Stankovic, J.A. (2002) “Denial of service in sensor networks,” IEEE ComputerMagazine, vol.5, no.10, Oct. 2002, pp.54–62.
 Zheng, J. and Jamalipour, A. (2009), Wireless Sensor Networks: Networking Perspective, published by John & Sons, Inc and IEEE, 2009.
 Haddad, I. F. & Gordon, D., 2002. Network Simulator 2: A Simulation Tool for Linux, Linux Journal. (Online) Available at: http://www.linuxjournal.com/article/5929 (Accessed 12 january 2016).
 Kavitha, T. &Sridharan, D., 2010. Security vulnerabilities in wireless sensor networks: A survey. Journal of information Assurance and Security, 5(1), pp. 31-44.
 Yu, Y., Li, K., Zhou, W. & Li, P., 2012. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), pp. 867-880.