1. Kun Zhang and Cong Wang , “A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management ,” IEEE Xplore,vol.37, pp. 178-185, jan.-2008.
2. Bolian Yin, Hongchi Shi, and Yi Shang ,”Analysis of Energy Consumption in Clustered Wireless Sensor Networks” IEEE Transactions on Mobile Computing, vol. 3, pp. 272–285, July 2007
3. Zhao Yulan and Jiang Chunfeng,”Research about Improvement of LEACH Protocol”, An Energy Efficient Protocol for Wireless Sensor Network”. Application Research of Computers, No.2 pp: 209-211, Jan. 2005.
4. Stephan Olariu and Qingwen Xu, I”nformation Assurance In Wireless Sensor Networks”, IEEE Transactions on Mobile Computing, 3(4), pp. 317-331 , Dec.2004.
5. ZenonChaczko, RyszardKlempous and Jan Nikodem,” Methods of Sensors Localization in Wireless Sensor Network”, IEEE Transactions On Mobile Computing, VOL. 3, pp. 3, Jul-Sep 2004.
6. Adrian Perrig , John Stankovic and David Wagner,” Security in wireless sensor network”,. Vol. 47, pp.6-9 ,June 2004.
7. Jan Steffan ,LudgerFiege, Mariano Cilia and Alejandro Buchmann, “Scoping in Wireless Sensor Networks”, IEEE Network, 18(1), pp.15–21, May 2004.
8. Zhiwei Zhao, Xinming Zhang, Peng Sun and Pengxi Liu,” A Transmission Power Control MAC Protocol for Wireless Sensor Networks”, IEEE/ACM Tran. on Networking, , 12(3), pp.493-506,April 2004.
9. Shao-Long and Xing Tao, “Cluster-based power efficient time synchronization in wireless sensor networks”, IEEE INFOCOM Conf, Mar. 2004.
10. John Buckley, Kevin Aherne and CianO'Mathuna, “Antenna Performance Measurements Using Wireless Sensor Networks”, Proceedings of the IEEE, VOL. 91, pp. 1247-1256, August 2003.
11. Peng-Jun Wan, Member and Chih-Wei Yi, “Coverage by Randomly Deployed Wireless Sensor Networks”, IEEE Wireless Communications and Networking Conference, pp.16–20,Mar. 2003.