@incollection{, 1BB4661605CA8CCF8C1E153C752F71C1 , author={{SrinivasarajuDantuluri} and {PPoturaju} and {Grandhi Varalakshmi Venkatrao Institute of Technology, affiliated to JNTUK}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1371520 } @book{b0, , title={{A Survey on Sensor Networks}} , author={{ IFAkyildiz } and { WSu } and { YSankarasubramaniam } and { ECayirci }} , year={Aug. 2002} , publisher={IEEE Communication Magazine} 40 } @incollection{b1, , title={{Impact of Heterogeneous Deployment on Lifetime Sensing Coverage in Sensor Networks}} , author={{ JJLee } and { BKrishnamachari } and { CC JKuo }} , journal={{IEEE SECON}} , year={2004} } @book{b2, , title={{Deploying Long-Lived and Cost-effective Hybrid Sensor Networks}} , author={{ WHu } and { CTChou } and { SJha } and { NBulusu }} , year={2006} , publisher={Elsevier Ad-Hoc Networks} 4 } @incollection{b3, , title={{Decentralized intrusion detection in wireless sensor networks}} , author={{ PSilva } and { MMartins } and { BRocha } and { ALoureiro } and { LRuiz } and { HCWong }} , booktitle={{Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks}} the 1st ACM international workshop on Quality of service & security in wireless and mobile networks } @incollection{b4, , title={{An intrusion detection system for wireless sensor networks}} , author={{ AOnat } and { Miri }} , booktitle={{Proceeding of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications}} eeding of the IEEE International Conference on Wireless and Mobile Computing, Networking and CommunicationsMontreal, Canada , year={August 2005} 3 } @incollection{b5, , title={{SPINS: Security Protocols for Sensor Networks}} , author={{ APerrig }} , booktitle={{Wireless Networks}} , year={Sep. 2002} 8 } @incollection{b6, , title={{LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks}} , author={{ SZhu } and { SSetia } and { SJajodia }} , booktitle={{Proc. of the 10th ACM Conference on Computer and Communications Security (CCS '03)}} of the 10th ACM Conference on Computer and Communications Security (CCS '03) , year={Oct. 2003} } @incollection{b7, , title={{A Performance Evaluation of Intrusion-tolerant Routing in Wireless Sensor Networks}} , author={{ JDeng } and { RHan } and { SMishra }} , booktitle={{Proc. of the 2nd Int. IEEE Workshop on Information Processing in Sensor Networks (IPSN'03)}} of the 2nd Int. IEEE Workshop on Information essing in Sensor Networks (IPSN'03) , year={Apr. 2003} } @incollection{b8, , title={{Intrusion detection in homogeneous and heterogeneous wireless sensor networks}} , author={{ YWang } and { XWang } and { BXie } and { DWang } and { DP }} , journal={{IEEE Transactions on Mobile Computing}} 7 6 , year={2008} } @incollection{b9, , title={{Delay of intrusion detection in wireless sensor networks}} , author={{ ODousse } and { CTavoularis } and { PThiran }} , booktitle={{Proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)}} the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) , year={2006} } @incollection{b10, , title={{Efficient location tracking using sensor networks}} , author={{ HKung } and { DVlah }} , booktitle={{IEEE Wireless Communications and Networking Conference, ser. 3}} , year={March 2003} 3 } @incollection{b11, , title={{Efficient innetwork moving object tracking in wireless sensor networks}} , author={{ C.-YLin } and { W.-CPang } and { Y.-CTseng }} , journal={{IEEE Transactions on Mobile Computing}} 5 8 , year={2006} } @incollection{b12, , title={{Intrusion Detection in Wireless Ad-Hoc Networks}} , author={{ YZhang } and { WLee }} , booktitle={{Proc. ACM MobiCom}} ACM MobiCom , year={2000} } @incollection{b13, , title={{Mobility improves coverage of sensor networks}} , author={{ BLiu } and { PBrass } and { ODousse } and { PNain } and { DTowsley }} , booktitle={{Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)}} the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) , year={2005} } @incollection{b14, , title={{Intrusion detection in homogeneous and heterogeneous wireless sensor networks}} , author={{ YWang } and { XWang } and { BXie } and { DWang } and { DP }} , journal={{IEEE Transactions on Mobile Computing}} 7 6 , year={2008} } @incollection{b15, , title={{Is Straight-line Path Always the Best for Intrusion Detection in Wireless Sensor Networks}} , author={{ YunWang } and { Yoon KahLeow } and { JunYin }} , booktitle={{15th International Conference on Parallel and Distributed Systems}} , year={2009} } @incollection{b16, , title={{Study on Security Management Architecture for Sensor Network based on Intrusion Detection}} , author={{ XiPeng } and { ZhengWu } and { DebaoXiao } and { YangYu }} , booktitle={{2009 International Conference on Networks Security}} , year={2009} }