W. Znaidi, M. Minier and J. P. Babau, “An Ontology for At-tacks in Wireless Sensor Networks,” Institute National de Re-cherche en Informatique et en Automatique, October 2008.
 M. Saxena, “Security in Wireless Sensor Networks: A Layer-Based Classification,” 2011.
 K. Sharma and M. K. Ghose, “Wireless Sensor Networks: An Overview on Its Security Threats,” In-ternational Journal of Computers and Their Applications, Spe-cial Issue on “Mobile Ad-hoc Networks”, Vol. 1, 2010, pp. 42-45.
 K. Xing, S. S. R. Srinivasan, M. Rivera, J. Li and X. Z. Cheng, “Attacks and Countermeasures in Sensor Net-works: A Survey,” Network Security, Springer, Berlin, 2010, pp. 251-272. doi:10.1007/978-0-387-73821-5_11
 T. A. Zia, “A Security Framework for Wireless Sensor Networks,” PhD Thesis, University of Sydney, Sydney, February 2008.
 G. Padmavathi and D. Shanmugapriya, “A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Net-works,” International Journal of Computer Science and Infor-mation Security, Vol. 4, No. 1-2, 2009, pp. 115-119.
 T. Kavitha and D. Sridharan, “Security Vulnerabilities in Wireless Sensor Networks: A Survey,” Journal of Information Assur-ance and Security, Vol. 5, 2010, pp. 31-44.
 Z. Li and G. Gong, “A Survey on Security in Wireless Sensor Networks,” 2011.
 A. Dimitrievski, V. Pejovska and D. Davcev, “Security Issues and Approaches in WSN,” 2011
http://ict-act.org/ICT Innovations.../ictinnovations 2009_submission_21.pdf
 J. Yick, B. Mukherjee and D. Ghosal, “Wireless Sensor Network Survey,” Computer Net-works, Vol. 52, No. 12, 2008, pp. 2292-2330. doi:10.1016/j.comnet.2008.04.002
 C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Proceedings of the 1st IEEE In-ternational Workshop on Sensor Network Protocols and Ap-plications, Alaska, 11 May 2003, pp. 113-127.
 Y. Wang, G. Attebury and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Communication Surveys, 2006.
 C. Tumrongwittayapak and R. Varakulsiripunth, “Detecting Sinkhole Attacks in Wireless Sensor Networks,” I CROS-SICE International Joint Conference, Fukuoka, 18-21 August 2009.
 R. H. Khokhar, M. A. Ngadi and S. Man-dala, “A Review of Current Routing Attacks in Mobile Ad Hoc Networks,” International Journal of Computer Science and Security, Vol. 2, No. 3, 2008, pp. 18-29.
 Y. Zhou, Y. Fang and Y. Zhang, “Security Wireless Sensor Networks: A Survey,” IEEE Communication Surveys, 2008.
 A. Perrig, R. Szewczyk, V. Wen, D. Culler and D. Tygar, “SPINS: Secu-rity Protocols for Sensor Networks,” Proceedings of 7th Annual International Conference on Mobile Computing and Networks, Rome, July 2001.
 I. Krontiris, T. Giannetsos and T. Di-mitriou, “Launching a Sinkhole Attack in Wireless Sensor Networks, the Intruder Side,” IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, Dalian, 12-14 October 2008, pp. 526-531.
 A. Perrig, J. Stankovic and D. Wagner, “Security in Wireless Sensor Networks,” Communications of the ACM, Vol. 47, No. 6, 2004, pp. .
 A. Saini and H. Kumar, “Comparison between Var-ious Black Hole Detection Techniques in MANET,” National Conference on Computational Instrumentation, Chandigarh, 19-20 March 2010, pp. 157-161.
 I. Ullah and S. U. Reh-man, “Analysis of Black Hole attack On MANETs Using Dif-ferent MANET Routing Protocols,” Master Thesis, Blekinge Institute of Technology, Sweden, 2010.
 R. Maheshwari, J. Gao and S. R. Das, “Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information,” IEEE INFOCOM, Alaska, 2007.
 Y-C. Hu, A. Perrig and D. B. Johnson, “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols,” Proceedings of the 2nd ACM Workshop on Wireless Security ACM, New York, 2003.
 J. R. Douceur, “The Sybil Attack,” Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), Cambridge, 7-8 March 2002.
 J. Newsome, E. Shi, D. Song and A. Perrig, “The Sybil Attack in Sensor Networks: Analysis & Defenses,” 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, 26-27 April 2004.
 L. Hu and D. Evans, “Using Directional Antennas to Prevent Wormhole Attacks,” 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, 26-27 April 2004.
 B. Parno, A. Perrig and V. Gligor, “Distributed Detection of Node Replication Attacks in Sensor Networks,” Proceedings of the 2005 IEEE Symposium on Security and Privacy, 8-11 May, 2005, Oakland, pp. 49-63.
 A. Wood and J. Stankovic, “Denial of Service in Sensor Networks,” IEEE Computer Magazine; Vol. 35, No. 10, 2002, pp. 54-62.
 Y. Hu, A. Perrig and D. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks,” Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, Vol. 3, 30 March-3 April 2003, pp. 1976-1986.