M. Momani, J. Agbinya, G. P. Navarrete and M. Akache, “A New Algorithm of Trust Formation in Wireless Sen- sor Networks,” Proceedings of the 1st IEEE International Conference on Wireless Broadband and Ultra Wideband Communications, Sydney, March 2006.
 A. Sorniotti, L. Gomez, K. Wrora and L. Odorieo, “Secure and Trusted In-network Data Processing in Wireless Sensor Networks: A Survey,” Journal of Information As-surance and Security, Vol. 2, No. 3, 2007, pp. 189-199.
 J. Lopez, R. Roman, I. Agudo and C. F. Gago, “Trust Management Systems for Wireless Sensor Networks: Best Practices,” Computer Communications, Vol. 33, No. 9, 2010, pp. 1086-1093. doi:10.1016/j.comcom.2010.02.006
 T. Zahariadis, H. C. Leligou, P. Trakadas and Stamatis Voliotis, “Mobile Networks Trust Management in Wireless Sensor Networks,” European Transactions on Telecommunica-tions, Vol. 21, No. 4, 2010, pp. 386-395.
 G. X. Zhan, W. S. Shi and J. Deng, “TARF: A Trust- Aware Routing Framework for Wireless Sensor Networks,” Proceedings of the European Conference on Wireless Sensor Networks, Coimbra, 17-19 February 2010, pp. 65-80.
 S. Zhu, S. Setia and S. Jajodia, “LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,” Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington DC, 27-30 October 2003.
 A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar, “SPINS: Security Protocols for Sensor Networks,” Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, Rome, 16-21 July 2001.
 C. Karlof, N. Sastry and D. Wagner, “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks,” Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, 3-5 November 2004.
 H.-R. Lee, Y.-J. Choi and H.-W. Kim, “Implementation of TinyHash Based on Hash Algorithm for Sensor Network,” Proceedings of the World Academy of Science, Engineering and Technology, Saint Louis, Vol. 10, August 2005.
 M. Becker, S. Schaust and E. Wittmann, “Performance of Routing Protocols for Real Wireless Sensor Networks,” Proceedings of the 10th International Symposium on Performance Evaluation of Computer and Telecommunication Systems, San Diego, July 2007.
 M. J. Probst and S. K. Kasera, “Statistical Trust Establishment in Wireless Sensor Networks,” Pro-ceedings of the 13th International Conference on Parallel and Distributed Systems, Hsinchu, Vol. 1, 5-7 December 2007.
 T. Zahariadis, H. Leligou, P. Karkazis, P. Trakadas, I. Papaefstathiou, C. Vangelatos and L. Besson, “Design and Implementation of a Trust-Aware Routing Protocol for Large WSNs,” International Journal of Network Security & Its Applications, Vol. 2, No. 3, July 2010, pp. 52-68.
 Y. C. Hu, A. Perrig and D. B. Johnson, “Ariadne: A Secure On-Demand Routing Pro-tocol for Ad Hoc Net- works,” Proceedings of the 8th Annual International Con- ference on Mobile Computing and Networking, Atlanta, 23-28 September 2002, pp. 12-23. doi:10.1145/570645.570648
 A. A. Pirzada and C. McDonald, “Trusted Greedy Perimeter Stateless Routing,” Proceed-ings of the 15th IEEE International Conference on Net-works, Adelaide, 19-21 November 2007, pp. 19-21. doi:10.1109/ICON.2007.4444087
 A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen and D. Culler, “SPINS: Security Protocols for Sensor Networks,” ACM Journal of Wireless Networks, Vol. 8, No. 5, September 2002, pp. 521-534. doi:10.1023/A:1016598314198
 S. Marti, T. Giuli, K. Lai and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks,” Pro- ceedings of the 6th An-nual International Conference on Mobile Computing and Networking, ACM Press, Boston, 6-11 August 2000, pp. 255-265. doi:10.1145/345910.345955
 S. Buchegger and J. Boudec, “ Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes – Fairness in Distributed Ad-Hoc Networks,” Proceedings of the 3rd ACM Inter-national Symposium on Mobile Ad-Hoc Networking and Computing (MobiHoc), ACM Press, Lausanne, 9-11 June 2002, pp. 226-236.
 S. Tanachaiwiwat, P. Dave, R. Bhindwale and A Helmy, “Location-Centric Isolation of Mis-behavior and Trust Routing in Energy-Constrained Sensor Networks,” Proceedings of the IEEE International Conference on Performance, Computing and Communi-cations, Phoenix, April 2004, pp. 463-469.