David Marchany, Randy Brownfield, M. Raymond and S. Midkiff, "Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols," in Information Assurance Workshop, 2006 IEEE, West Point, NY, 2006, pp. 297 - 304.
A. Anuba Merlyn and A. Anuja Merlyn, “Energy Efficient Routing (EER) For Reducing Congestion and Time Delay in Wireless Sensor Network”, International Journal of Computer Networks and Applications, Volume 1, Issue 1, PP: 1 – 10, November – December (2014).
SARIKA KHATARKAR and RACHANA KAMBLE-Wireless Sensor Network MAC Protocol:SMAC & TMAC(IJCSE:Aug-Sep:2013).
John A.Stankovic Anthony D.Wood, "Denial of Service in Sensor Networks," IEEE, pp. 54-62, October 2002.
Sharon Goldberg, David Xiao, Eran Tromer,Boaz Barak, and Jennifer Rexford,Princeton University (Path-Quality Monitoring in the Presence of Adversaries, June 21-2009.
Richard Han, and Shivakant Mishra Jing Deng, "Defending against Pathbased DoS Attacks in Wireless Sensor Networks," in SASN, 2005, pp. 89-96.
Perrig, A. Yih-Chun Hu and D.B Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, 2003, pp. 1976 - 1986.
Jae-Hwan Chang and Leandros Tassiulas (Energy Conserving Routing in Wireless Ad-hoc Networks).
J.Vijay Daniel, G.Murugaboopathi K.Venkatraman, "Various Attacks in Wireless Sensor Network:Survey," International Journal of Soft Computing and Engineering (IJSCE), vol. 3, no. 1, pp. 208-211, March 2013.
Hong-Ning Dai, Qiu Wang, Dong Li, and Raymond Chi-Wing Wong On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas (International Journal of Distributed Sensor Networks Volume 2013).
Dr. Shahriar Mohammadi and Hossein Jadidoleslamy-A OMPARISONNETWORKS (International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.3, No.1, March 2011).
TEODOR-GRIGORE LUPU-Main Types of Attacks in Wireless Sensor Networks (Recent Advances in Signals and Systems).
James Newsome, Elaine Shi, Dawn Song and Adrian Perrig -The Sybil Attack in Sensor Networks: Analysis & Defenses(2004 ACM).
Lina r.deshmukh, amol d.potgantwar-prevention of vampire attacks in wsn using routing loop Proceedings of IRF International Conference, 5th & 6th February 2014).
P.Rajipriyadharshini, V.Venkatakrishnan,S.Suganya,A.Masanam-Vampire Attacks Deploying Resources in Wireless Sensor etworks(IJCSIT-2014).
David Xia, Eran Tromery, Boaz Barak, and Jennifer Rexford Sharon Goldberg, "Path-Quality Monitoring in the Presence of Adversaries," in METRICS Measurement and Modeling of Computer Systems, New York, NY, June 2009, pp. 193-204.
D. J. Bernstein. (1996, September) TCP/IP SYN cookies. [Online]. HYPERLINK"http://cr.yp.to/syncookies.html" ,http://cr.yp.to/syncookies.html .
Leo Selavo, and John A. Stankovic Anthony D. Wood, Springer, pp. 531-543, 2008.
Kai Xing , Shyaam Sundhar Rajamadam Srinivasan , Manny Rivera ,Jiang Li , Xiuzhen Cheng (Attacks and Countermeasures in Sensor Networks: A Survey-2005 Springer).
Farzana T, Mrs.Aswathy Babu-A light weight PLGP based method for mitigating vampire attacks in Wireless Sensor Networks (International Journal Of Engineering And Computer Science:Volume 03 Issue 07 July, 2014).