1.
R. Yarinezhad et al., “An energy efficient cluster head selection approach for performance improvement in network-coding-based wireless sensor networks with multiple sinks,” Ad Hoc Networks, vol. 64, pp. 514–526, Apr. 2021, doi: https://doi.org/10.1016/j.future.2018.12.024.
2.
H. Han, S. Shakkottai, C. V Hollot, R. Srikant, and D. Towsley, “Multi-Path TCP: A Joint Congestion Control and Routing Scheme to Exploit Path Diversity in the Internet,” IEEE/ACM Trans. Netw., vol. 14, no. 6, pp. 1260–1271, 2006, doi: 10.1109/TNET.2006.886738.
3.
O. Samuel, N. Javaid, T. A. Alghamdi, and N. Kumar, “Towards sustainable smart cities: A secure and scalable trading system for residential homes using blockchain and artificial intelligence,” Sustain. Cities Soc., vol. 76, p. 103371, 2022, doi: https://doi.org/10.1016/j.scs.2021.103371.
4.
M. Ganesan and N. Sivakumar, “IoT based heart disease prediction and diagnosis model for healthcare using machine learning models,” in 2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN), 2019, pp. 1–5, doi: 10.1109/ICSCAN.2019.8878850.
5.
S. Luo, G. Zhang, C. Wu, S. U. Khan, and K. Li, “Boafft: Distributed Deduplication for Big Data Storage in the Cloud,” IEEE Trans. Cloud Comput., vol. 8, no. 4, pp. 1199–1211, 2020, doi: 10.1109/TCC.2015.2511752.
6.
I. Bolodurina and D. Parfenov, “Comprehensive approach for optimization traffic routing and using network resources in a virtual data center,” Procedia Comput. Sci., vol. 136, pp. 62–71, 2018, doi: https://doi.org/10.1016/j.procs.2018.08.238.
7.
B. Farahani, F. Firouzi, V. Chang, M. Badaroglu, N. Constant, and K. Mankodiya, “Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare,” Futur. Gener. Comput. Syst., vol. 78, pp. 659–676, 2018, doi: https://doi.org/10.1016/j.future.2017.04.036.
8.
A. S. Alqahtani, “Security threats and countermeasures in software defined network using efficient and secure trusted routing mechanism,” Comput. Commun., vol. 153, pp. 336–341, 2020, doi: https://doi.org/10.1016/j.comcom.2020.02.020.
9.
J. Ben Othman and L. Mokdad, “Enhancing data security in ad hoc networks based on multipath routing,” J. Parallel Distrib. Comput., vol. 70, no. 3, pp. 309–316, 2010, doi: https://doi.org/10.1016/j.jpdc.2009.02.010.
10.
V. Mythili, A. Suresh, M. M. Devasagayam, and R. Dhanasekaran, “SEAT-DSR: Spatial and energy aware trusted dynamic distance source routing algorithm for secure data communications in wireless sensor networks,” Cogn. Syst. Res., vol. 58, pp. 143–155, 2019, doi: https://doi.org/10.1016/j.cogsys.2019.02.005.
11.
G. C. Hadjichristofi, L. A. DaSilva, S. F. Midkiff, U. Lee, and W. De Sousa, “Routing, security, resource management, and monitoring in ad hoc networks: Implementation and integration,” Comput. Networks, vol. 55, no. 1, pp. 282–299, 2011, doi: https://doi.org/10.1016/j.comnet.2010.09.001.
12.
R. Prasad P and Shivashankar, “ENHANCED ENERGY EFFICIENT SECURE ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORK,” Glob. Transitions Proc., 2021, doi: https://doi.org/10.1016/j.gltp.2021.10.001.
13.
K. Haseeb, I. Ud Din, A. Almogren, I. Ahmed, and M. Guizani, “Intelligent and secure edge-enabled computing model for sustainable cities using green internet of things,” Sustain. Cities Soc., vol. 68, p. 102779, 2021, doi: https://doi.org/10.1016/j.scs.2021.102779.
14.
G. Thahniyath and M. Jayaprasad, “Secure and load balanced routing model for wireless sensor networks,” J. King Saud Univ. - Comput. Inf. Sci., 2020, doi: https://doi.org/10.1016/j.jksuci.2020.10.012.
15.
A. Seyfollahi, M. Moodi, and A. Ghaffari, “MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications,” Comput. Stand. Interfaces, vol. 82, p. 103622, 2022, doi: https://doi.org/10.1016/j.csi.2022.103622.
16.
C. C. Sobin, C. Labeeba, and K. Deepika Chandran, “An Efficient method for Secure Routing in Delay Tolerant Networks,” Procedia Comput. Sci., vol. 143, pp. 820–826, 2018, doi: https://doi.org/10.1016/j.procs.2018.10.384.
17.
A. Vinitha, M. S. S. Rukmini, and Dhirajsunehra, “Secure and energy aware multi-hop routing protocol in WSN using Taylor-based hybrid optimization algorithm,” J. King Saud Univ. - Comput. Inf. Sci., 2019, doi: https://doi.org/10.1016/j.jksuci.2019.11.009.
18.
A. Yazdinejad, R. M. Parizi, A. Dehghantanha, G. Srivastava, S. Mohan, and A. M. Rababah, “Cost optimization of secure routing with untrusted devices in software defined networking,” J. Parallel Distrib. Comput., vol. 143, pp. 36–46, 2020, doi: https://doi.org/10.1016/j.jpdc.2020.03.021.
19.
R. Prasad and S. shankar, “Secure Intrusion Detection System Routing Protocol for Mobile Ad-Hoc Network,” Glob. Transitions Proc., 2021, doi: https://doi.org/10.1016/j.gltp.2021.10.003.
20.
D. Kothandaraman, S. Naik Korra, A. Balasundaram, and S. Magesh Kumar, “Sequence number based secure routing algorithm for IoT networks,” Mater. Today Proc., 2021, doi: https://doi.org/10.1016/j.matpr.2020.11.703.
21.
H. Helly, E. Efrat, and J. Yosef, “Spatial routinization and a ‘secure base’ in displacement processes: Understanding place attachment through the security-exploratory cycle and urban ontological security frameworks,” J. Environ. Psychol., vol. 75, p. 101612, 2021, doi: https://doi.org/10.1016/j.jenvp.2021.101612.
22.
Z. Liu, L. Wang, X. Wang, X. Shen, and L. Li, “Secure Remote Sensing Image Registration Based on Compressed Sensing in Cloud Setting,” IEEE Access, vol. 7, pp. 36516–36526, 2019, doi: 10.1109/ACCESS.2019.2903826.
23.
R. Kumar and R. Goyal, “Modeling continuous security: A conceptual model for automated DevSecOps using open-source software over cloud (ADOC),” Comput. Secur., vol. 97, p. 101967, 2020, doi: https://doi.org/10.1016/j.cose.2020.101967.
24.
F. Thabit, P. S. Alhomdy, and P. S. Jagtap, “Security Analysis and Performance Evaluation of a New Lightweight Cryptographic Algorithm for Cloud Computing Environment,” Glob. Transitions Proc., 2021, doi: https://doi.org/10.1016/j.gltp.2021.01.014.
25.
J. Ramkumar and R. Vadivel, “Meticulous elephant herding optimization based protocol for detecting intrusions in cognitive radio ad hoc networks,” Int. J. Emerg. Trends Eng. Res., vol. 8, no. 8, pp. 4549–4554, 2020, doi: 10.30534/ijeter/2020/82882020.
26.
J. Ramkumar and R. Vadivel, “Bee inspired secured protocol for routing in cognitive radio ad hoc networks,” INDIAN J. Sci. Technol., vol. 13, no. 30, pp. 3059–3069, 2020, doi: 10.17485/IJST/v13i30.1152.
27.
R. Vadivel and J. Ramkumar, “QoS-Enabled Improved Cuckoo Search-Inspired Protocol (ICSIP) for IoT-Based Healthcare Applications,” pp. 109–121, 2019, doi: 10.4018/978-1-7998-1090-2.ch006.
28.
J. Ramkumar and R. Vadivel, “Intelligent Fish Swarm Inspired Protocol (IFSIP) For Dynamic Ideal Routing in Cognitive Radio Ad-Hoc Networks,” Int. J. Comput. Digit. Syst., vol. 10, no. 1, pp. 1063–1074, 2020, doi: http://dx.doi.org/10.12785/ijcds/100196.
29.
J. Ramkumar, R. Vadivel, and B. Narasimhan, “Constrained Cuckoo Search Optimization Based Protocol for Routing in Cloud Network,” Int. J. Comput. Networks Appl., doi: 10.22247/ijcna/2021/210727.
30.
J. Ramkumar and R. Vadivel, “Performance Modeling of Bio-Inspired Routing Protocols in Cognitive Radio Ad Hoc Network to Reduce End-to-End Delay,” Int. J. Intell. Eng. Syst., vol. 12, no. 1, pp. 221–231, 2019, doi: 10.22266/ijies2019.0228.22.
31.
J. Ramkumar and R. Vadivel, “Whale Optimization Routing Protocol for Minimizing Energy Consumption in Cognitive Radio Wireless Sensor Network,” Int. J. Comput. Networks Appl., vol. 8, no. 4, doi: 10.22247/ijcna/2021/209711.
32.
J. Ramkumar and R. Vadivel, “Multi-Adaptive Routing Protocol for Internet of Things based Ad-hoc Networks,” Wirel. Pers. Commun., pp. 1–23, Apr. 2021, doi: 10.1007/s11277-021-08495-z.
33.
S. Namasudra, D. Devi, S. Kadry, R. Sundarasekar, and A. Shanthini, “Towards DNA based data security in the cloud computing environment,” Comput. Commun., vol. 151, pp. 539–547, 2020, doi: https://doi.org/10.1016/j.comcom.2019.12.041.
34.
S. R. Jena, R. Shanmugam, K. Saini, and S. Kumar, “Cloud Computing Tools: Inside Views and Analysis,” Procedia Comput. Sci., vol. 173, pp. 382–391, 2020, doi: https://doi.org/10.1016/j.procs.2020.06.045.