C. Karlof and D. Wanger, “Secure Routing in Wireless Sensor Networks: Attacks and Counter-Measures,” First IEEE International Workshop on Sensor Network Protocols and Applications, IEEE Computer Society, Anchorage, May 2003, pp. 113-127.
 D. Liu and P. Ning, “Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks,” Technical Report: North Carolina State University at Raleigh, September 2002.
 N. H. Li, J. C. Mitchell, W. H. Winsborough, “Design of a Role-Based Trust Management Framework,” In Header, H. Ed., Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Washington, 2002, pp. 114-130.
 P. Resnick and R. Zeckhauser, “Trust among Strangers in Internet Transactions: Empirical Analysis of eBya’s Reputation System,” National Bureau of Economic Research Workshop on Empirical Studies of Electronic Commerce, 2000.
 J. Deng, R. Han and S. Mishra, “INSENS: Intrusion- Tolerant Routing in Wireless Sensor Networks,” Department of Computer Science Technical Report CU-CS- 939-02, University of Colorado, Boulder, 2006.