@incollection{, 0FC023C04AC210D1E81DAD11BC30CBA2 , author={{Dr. KoffkaKhan} and {WayneGoodridge} and {The University of the West Indies}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}12164349 } @incollection{b0, , title={{Wireless Sensor Networks}} , author={{ FLLewis }} , booktitle={{Smart Environments: Technologies, Protocols, and Applications}} , editor={ DJCook SKDas } New York , publisher={John Wiley} , year={2004. 2004} } @book{b1, , title={{Chapter in Handbook of Real-Time and Embedded Systems}} , author={{ JStankovic }} , year={2008} , publisher={CRC Press} 19 , note={Wireless Sensor Networks} } @incollection{b2, , title={{The Design Space of Wireless Sensor Networks}} , author={{ KRömer } and { FMattern }} , journal={{IEEE Wireless Communications}} 11 6 , year={December 2004} } @incollection{b3, , title={{Security in Wireless Sensor Networks: Issues and Challenges}} , author={{ AKhan Pathan } and { HLee } and { CS&hong }} , booktitle={{Proceedings of the 8th International Conference on Advanced Communication Technology}} the 8th International Conference on Advanced Communication TechnologyPhoenix Park, Korea , year={20-22 February. 2006} II } @incollection{b4, , title={{Security in Wireless Sensor Networks}} , author={{ APerrig } and { JStankovic } and { DWagner }} , journal={{In Communications of the ACM (CACM)}} 47 6 , year={June 2004} } @incollection{b5, , title={{Security solutions for wireless sensor networks}} , author={{ DWesthoff } and { JGirao } and { ASarma }} , journal={{NEC Journal of Advanced Technology}} 59 2 , year={June 2006} , note={Invited paper. Available} } @book{b6, , title={{Security Models for Wireless Sensor Networks. Supervisors Dr}} , author={{ S; NKaplantzis } and { Mani } and { .MProf } and { Palaniswami } and { GProf } and { Egan }} CiteSeerX: 10.1.1.87.4605 , year={2006} } @book{b7, , title={{Wireless sensor networks security: a survey}} , author={{ JPWalters } and { ZLiang } and { WShi } and { VChaudhary }} MIST-TR-2005-007 , year={July 2005} , note={Technical Report} } @incollection{b8, , title={{Wireless Sensor Network Security Analysis}} , author={{ HKalita } and { KKar } and { A }} , journal={{International Journal of Next-Generation Networks (IJNGN)}} 1 1 , year={December 2009} } @incollection{b9, , title={{Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications}} , author={{ MAmeen } and { AJingwei } and { LKyungsup } and { K }} 10.1007/s10916-010-9449-4 , journal={{Journal of Medical Systems}} 36 1 , year={2012} } @incollection{b10, , title={{Security Issues in Wireless Sensor Networks}} , author={{ DSora }} , journal={{International Journal of Online Engineering (iJOE)}} 1861- 21216 6 4 , year={2010. 2010} } @incollection{b11, , title={{Security For Wireless Sensor Network}} , author={{ SSingh } and { HVerma } and { K }} , journal={{International Journal on Computer Science and Engineering (IJCSE)}} 3 6 , year={2011} } @incollection{b12, , title={{Secure routing in wireless sensor networks: Attacks and countermeasures}} , author={{ CKarlof } and { DWagner }} , booktitle={{First IEEE Int'l Workshop on Sensor Network Protocols and Applications}} , year={May 2003} }