1.
Bharathidasan, Archana, and Vijay Anand Sai Ponduru. "Sensor networks: An overview." In IEEE INFOCOM, vol. 4. 2002.
2.
Baykara, M., DaÅŸ, R., "A Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems", International Journal of Computer Networks and Applications (IJCNA), 2(5), 203-211, 2015
3.
Parno, Bryan, Adrian Perrig, and Virgil Gligor. "Distributed detection of node replication attacks in sensor networks." In 2005 IEEE Symposium on Security and Privacy (S&P'05), pp. 49-63. IEEE, 2005.
4.
Conti, Mauro, Roberto Di Pietro, Luigi Vincenzo Mancini, and Alessandro Mei. "A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks." In Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, pp. 80-89. ACM, 2007.
5.
Li, Zhijun, and Guang Gong. "Randomly directed exploration: An efficient node clone detection protocol in wireless sensor networks." In 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, pp. 1030-1035. IEEE, 2009.
6.
Zeng, Yingpei, Jiannong Cao, Shigeng Zhang, Shanqing Guo, and Li Xie. "Random-walk based approach to detect clone attacks in wireless sensor networks." IEEE Journal on selected areas in communications 28, no. 5: 677-691, (2010).
7.
Melchor, Carlos Aguilar, Boussad Ait-salem, and Karim Tamine. "Active detection of node replication attacks." In International Journal of Computer Science and Network Security (IJCSNS), 9: 13–21. 2009.
8.
Meenatchi, S., C. Navaneethan, N. Sivakumar, P. Thanapal, And J. Prabhu. "Swbc-Security In Wireless Sensor Networks By Broadcasting Location Claims." Journal of Theoretical and Applied Information Technology 64, no. 1, 2014.
9.
Manjula, V., and C. Chellappan. "Trust based node replication attack detection protocol for wireless sensor networks." Journal of Computer Science 8, no. 11 : 1880, 2012.
10.
Choi, Heesook, Sencun Zhu, and Thomas F. La Porta. "SET: Detecting node clones in sensor networks." In Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on, pp. 341-350. IEEE, 2007.
11.
Ozdemir, Suat, and Hasan Çam. "Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks."IEEE/ACM Transactions on Networking (TON) 18, no. 3: 736-749, 2010.
12.
Li, Zhijun, and Guang Gong. "On the node clone detection in wireless sensor networks." IEEE/ACM transactions on networking 21, no. 6 : 1799-1811, 2013.
13.
Manjula, V., and Dr C. Chellappan. "Replication attack mitigations for static and mobile WSN." arXiv preprinarXiv:1103.3378, 2011.
14.
Vançin, Sercan, and Ebubekir Erdem. "Design and Simulation of Wireless Sensor Network Topologies Using the ZigBee Standard." International Journal of Computer Networks and Applications (IJCNA) 2, no. 3: 135-143, 2015.
15.
Merlyn, A. Anuba, and A. Anuja Merlyn. "Energy Efficient Routing (EER) For Reducing Congestion and Time Delay in Wireless Sensor Network."International Journal of Computer Networks and Applications 1, no. 1 : 1-10, 2014.