1.
S. De and B. Chakraborty, “An energy-efficient wireless sensor network construction algorithm for air quality condition detection system,” Comput. Electr. Eng., vol. 91, p. 107064, 2021, doi: https://doi.org/10.1016/j.compeleceng.2021.107064.
2.
A. I. Saleh, K. M. Abo-Al-Ez, and A. A. Abdullah, “A Multi-Aware Query Driven (MAQD) routing protocol for mobile wireless sensor networks based on neuro-fuzzy inference,” J. Netw. Comput. Appl., vol. 88, pp. 72–98, 2017, doi: https://doi.org/10.1016/j.jnca.2017.02.016.
3.
M. Farsi, M. Badawy, M. Moustafa, H. A. Ali, and Y. Abdulazeem, “A Congestion-Aware Clustering and Routing (CCR) Protocol for Mitigating Congestion in WSN,” IEEE Access, vol. 7, pp. 105402–105419, 2019, doi: 10.1109/ACCESS.2019.2932951.
4.
Z. Zhou, B. Yao, R. Xing, L. Shu, and S. Bu, “E-CARP: An Energy Efficient Routing Protocol for UWSNs in the Internet of Underwater Things,” IEEE Sens. J., vol. 16, no. 11, pp. 4072–4082, 2016, doi: 10.1109/JSEN.2015.2437904.
5.
K. Kalaivanan and V. Bhanumathi, “Reliable location aware and Cluster-Tap Root based data collection protocol for large scale wireless sensor networks,” J. Netw. Comput. Appl., vol. 118, pp. 83–101, 2018, doi: https://doi.org/10.1016/j.jnca.2018.06.005.
6.
J. Ramkumar and R. Vadivel, “CSIP—cuckoo search inspired protocol for routing in cognitive radio ad hoc networks,” in Advances in Intelligent Systems and Computing, 2017, vol. 556, pp. 145–153, doi: 10.1007/978-981-10-3874-7_14.
7.
J. Ramkumar and R. Vadivel, “Improved frog leap inspired protocol (IFLIP) – for routing in cognitive radio ad hoc networks (CRAHN),” World J. Eng., vol. 15, no. 2, pp. 306–311, 2018, doi: 10.1108/WJE-08-2017-0260.
8.
J. Ramkumar and R. Vadivel, “Performance Modeling of Bio-Inspired Routing Protocols in Cognitive Radio Ad Hoc Network to Reduce End-to-End Delay,” Int. J. Intell. Eng. Syst., vol. 12, no. 1, pp. 221–231, 2019, doi: 10.22266/ijies2019.0228.22.
9.
J. Ramkumar and R. Vadivel, “Multi-Adaptive Routing Protocol for Internet of Things based Ad-hoc Networks,” Wirel. Pers. Commun., pp. 1–23, Apr. 2021, doi: 10.1007/s11277-021-08495-z.
10.
J. Ramkumar and R. Vadivel, “Bee inspired secured protocol for routing in cognitive radio ad hoc networks,” INDIAN J. Sci. Technol., vol. 13, no. 30, pp. 3059–3069, 2020, doi: 10.17485/IJST/v13i30.1152.
11.
J. Ramkumar and R. Vadivel, “Intelligent Fish Swarm Inspired Protocol (IFSIP) For Dynamic Ideal Routing in Cognitive Radio Ad-Hoc Networks,” Int. J. Comput. Digit. Syst., vol. 10, no. 1, pp. 1063–1074, 2020, doi: http://dx.doi.org/10.12785/ijcds/100196.
12.
R. Vadivel and J. Ramkumar, “QoS-Enabled Improved Cuckoo Search-Inspired Protocol (ICSIP) for IoT-Based Healthcare Applications,” pp. 109–121, 2019, doi: 10.4018/978-1-7998-1090-2.ch006.
13.
D. Sharma and A. P. Bhondekar, “Traffic and Energy Aware Routing for Heterogeneous Wireless Sensor Networks,” IEEE Commun. Lett., vol. 22, no. 8, pp. 1608–1611, Aug. 2018, doi: 10.1109/LCOMM.2018.2841911.
14.
S. Al-Sodairi and R. Ouni, “Reliable and energy-efficient multi-hop LEACH-based clustering protocol for wireless sensor networks,” Sustain. Comput. Informatics Syst., vol. 20, pp. 1–13, Dec. 2018, doi: 10.1016/j.suscom.2018.08.007.
15.
A. Benzerbadj, B. Kechar, A. Bounceur, and M. Hammoudeh, “Surveillance of sensitive fenced areas using duty-cycled wireless sensor networks with asymmetrical links,” J. Netw. Comput. Appl., vol. 112, pp. 41–52, 2018, doi: https://doi.org/10.1016/j.jnca.2018.03.027.
16.
R. Yarinezhad and S. N. Hashemi, “Solving the load balanced clustering and routing problems in WSNs with an fpt-approximation algorithm and a grid structure,” Pervasive Mob. Comput., vol. 58, p. 101033, 2019, doi: https://doi.org/10.1016/j.pmcj.2019.101033.
17.
S. Chinnaswamy and A. K, “Trust aggregation authentication protocol using machine learning for IoT wireless sensor networks,” Comput. Electr. Eng., vol. 91, p. 107130, 2021, doi: https://doi.org/10.1016/j.compeleceng.2021.107130.
18.
B. Shah et al., “Guaranteed lifetime protocol for IoT based wireless sensor networks with multiple constraints,” Ad Hoc Networks, vol. 104, p. 102158, 2020, doi: https://doi.org/10.1016/j.adhoc.2020.102158.
19.
A. Chowdhury and D. De, “FIS-RGSO: Dynamic Fuzzy Inference System Based Reverse Glowworm Swarm Optimization of energy and coverage in green mobile wireless sensor networks,” Comput. Commun., vol. 163, pp. 12–34, 2020, doi: https://doi.org/10.1016/j.comcom.2020.09.002.
20.
G. D. O’Mahony, K. G. McCarthy, P. J. Harris, and C. C. Murphy, “Developing novel low complexity models using received in-phase and quadrature-phase samples for interference detection and classification in Wireless Sensor Network and GPS edge devices,” Ad Hoc Networks, vol. 120, p. 102562, 2021, doi: https://doi.org/10.1016/j.adhoc.2021.102562.
21.
M. Faheem, M. A. Ngadi, and V. C. Gungor, “Energy efficient multi-objective evolutionary routing scheme for reliable data gathering in Internet of underwater acoustic sensor networks,” Ad Hoc Networks, vol. 93, p. 101912, 2019, doi: https://doi.org/10.1016/j.adhoc.2019.101912.
22.
J. Lu, L. Feng, J. Yang, M. M. Hassan, A. Alelaiwi, and I. Humar, “Artificial agent: The fusion of artificial intelligence and a mobile agent for energy-efficient traffic control in wireless sensor networks,” Futur. Gener. Comput. Syst., vol. 95, pp. 45–51, 2019, doi: https://doi.org/10.1016/j.future.2018.12.024.
23.
S. Chouikhi, I. El Korbi, Y. Ghamri-Doudane, and L. Azouz Saidane, “Distributed connectivity restoration in multichannel wireless sensor networks,” Comput. Networks, vol. 127, pp. 282–295, 2017, doi: https://doi.org/10.1016/j.comnet.2017.08.016.
24.
S. Priyadarshani, A. Tomar, and P. K. Jana, “An efficient partial charging scheme using multiple mobile chargers in wireless rechargeable sensor networks,” Ad Hoc Networks, vol. 113, p. 102407, 2021, doi: https://doi.org/10.1016/j.adhoc.2020.102407.
25.
P. S. Uma Priyadarsini and P. Sriramya, “Disaster management using evidence-based interactive trust management system for wireless sensor networks by Internet of Things,” Comput. Electr. Eng., vol. 75, pp. 164–174, 2019, doi: https://doi.org/10.1016/j.compeleceng.2019.02.020.
26.
O. A. Khashan, R. Ahmad, and N. M. Khafajah, “An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks,” Ad Hoc Networks, vol. 115, p. 102448, 2021, doi: https://doi.org/10.1016/j.adhoc.2021.102448.
27.
C. Luo, J. Yu, D. Li, H. Chen, Y. Hong, and L. Ni, “A Novel Distributed algorithm for constructing virtual backbones in wireless sensor networks,” Comput. Networks, vol. 146, pp. 104–114, 2018, doi: https://doi.org/10.1016/j.comnet.2018.09.016.
28.
N. Kaur and S. Singh, “Optimized cost effective and energy efficient routing protocol for wireless body area networks,” Ad Hoc Networks, vol. 61, pp. 65–84, 2017, doi: https://doi.org/10.1016/j.adhoc.2017.03.008.
29.
G. J., S. J., S. Y., and M. V., “Data consistency matrix based data processing model for efficient data storage in wireless sensor networks,” Comput. Commun., vol. 151, pp. 172–182, 2020, doi: https://doi.org/10.1016/j.comcom.2019.12.060.
30.
M. M. Ahmed, E. H. Houssein, A. E. Hassanien, A. Taha, and E. Hassanien, “Maximizing lifetime of wireless sensor networks based on whale optimization algorithm,” Adv. Intell. Syst. Comput., vol. 639, pp. 724–733, 2018, doi: 10.1007/978-3-319-64861-3_68.
31.
J. Sengupta, S. Ruj, and S. Das Bit, “End to end secure anonymous communication for secure directed diffusion in IoT,” PervasiveHealth Pervasive Comput. Technol. Healthc., pp. 445–450, Jan. 2019, doi: 10.1145/3288599.3295577.
32.
X. Yu, F. Li, T. Li, N. Wu, H. Wang, and H. Zhou, “Trust-based secure directed diffusion routing protocol in WSN,” J. Ambient Intell. Humaniz. Comput. 2020, pp. 1–13, Nov. 2020, doi: 10.1007/S12652-020-02638-Z.
33.
S. M. Pournaghi, M. Bayat, and Y. Farjami, “MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption,” J. Ambient Intell. Humaniz. Comput. 2020 1111, vol. 11, no. 11, pp. 4613–4641, Jan. 2020, doi: 10.1007/S12652-020-01710-Y.
34.
M. Hema Kumar, V. Mohanraj, Y. Suresh, J. Senthilkumar, and G. Nagalalli, “Trust aware localized routing and class based dynamic block chain encryption scheme for improved security in WSN,” J. Ambient Intell. Humaniz. Comput. 2020 125, vol. 12, no. 5, pp. 5287–5295, Apr. 2020, doi: 10.1007/S12652-020-02007-W.