1.
Pathak and M. G. Bhatt, “Synergetic manufacturing systems anchored by cloud computing: A classified review of trends and perspective,” Mater. Today Proc., 2020, doi: https://doi.org/10.1016/j.matpr.2020.07.435.
2.
T. A. Alghamdi, “Enhanced QoS routing protocol using maximum flow technique,” Comput. Electr. Eng., vol. 89, p. 106950, 2021, doi: https://doi.org/10.1016/j.compeleceng.2020.106950.
3.
T. M. Behera, S. K. Mohapatra, P. Mukjerjee, and H. K. Sahoo, “Work-In-Progress: DEEC-VD: A Hybrid Energy Utilization Cluster-Based Routing Protocol for WSN for Application in IoT,” in 2017 International Conference on Information Technology (ICIT), 2017, pp. 97–100, doi: 10.1109/ICIT.2017.42.
4.
B. Chakraborty and P. Mukherjee, “WAL: An Energy Efficient Hybrid Routing Protocol in Co-operative Communication,” in 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), 2018, pp. 1317–1322, doi: 10.1109/ICECA.2018.8474708.
5.
A. Mathur, T. Newe, W. Elgenaidi, M. Rao, G. Dooly, and D. Toal, “A secure end-to-end IoT solution,” Sensors Actuators A Phys., vol. 263, pp. 291–299, 2017, doi: https://doi.org/10.1016/j.sna.2017.06.019.
6.
M. Elappila, S. Chinara, and D. R. Parhi, “Survivable Path Routing in WSN for IoT applications,” Pervasive Mob. Comput., vol. 43, pp. 49–63, Jan. 2018, doi: 10.1016/j.pmcj.2017.11.004.
7.
J. John, G. S. Kasbekar, and M. S. Baghini, “Maximum lifetime convergecast tree in wireless sensor networks,” Ad Hoc Networks, vol. 120, p. 102564, 2021, doi: https://doi.org/10.1016/j.adhoc.2021.102564.
8.
M. C. Domingo and R. Prior, “Energy analysis of routing protocols for underwater wireless sensor networks,” Comput. Commun., vol. 31, no. 6, pp. 1227–1238, 2008, doi: https://doi.org/10.1016/j.comcom.2007.11.005.
9.
T. N. Sugumar and N. R. Ramasamy, “mDesk: a scalable and reliable hypervisor framework for effective provisioning of resource and downtime reduction,” J. Supercomput., vol. 76, no. 2, pp. 1277–1292, Feb. 2020, doi: 10.1007/s11227-018-2662-5.
10.
G. D. O’Mahony, K. G. McCarthy, P. J. Harris, and C. C. Murphy, “Developing novel low complexity models using received in-phase and quadrature-phase samples for interference detection and classification in Wireless Sensor Network and GPS edge devices,” Ad Hoc Networks, vol. 120, p. 102562, 2021, doi: https://doi.org/10.1016/j.adhoc.2021.102562.
11.
A. Arena, P. Perazzo, C. Vallati, G. Dini, and G. Anastasi, “Evaluating and improving the scalability of RPL security in the Internet of Things,” Comput. Commun., vol. 151, pp. 119–132, 2020, doi: https://doi.org/10.1016/j.comcom.2019.12.062.
12.
D. Gopika and R. Panjanathan, “Energy efficient routing protocols for WSN based IoT applications: A review,” Mater. Today Proc., 2020, doi: https://doi.org/10.1016/j.matpr.2020.10.137.
13.
J. Ramkumar and R. Vadivel, “Performance Modeling of Bio-Inspired Routing Protocols in Cognitive Radio Ad Hoc Network to Reduce End-to-End Delay,” Int. J. Intell. Eng. Syst., vol. 12, no. 1, pp. 221–231, 2019, doi: 10.22266/ijies2019.0228.22.
14.
J. Ramkumar and R. Vadivel, “Meticulous elephant herding optimization based protocol for detecting intrusions in cognitive radio ad hoc networks,” Int. J. Emerg. Trends Eng. Res., vol. 8, no. 8, pp. 4549–4554, 2020, doi: 10.30534/ijeter/2020/82882020.
15.
J. Ramkumar and R. Vadivel, “CSIP—cuckoo search inspired protocol for routing in cognitive radio ad hoc networks,” in Advances in Intelligent Systems and Computing, 2017, vol. 556, pp. 145–153, doi: 10.1007/978-981-10-3874-7_14.
16.
J. Ramkumar and R. Vadivel, “Multi-Adaptive Routing Protocol for Internet of Things based Ad-hoc Networks,” Wirel. Pers. Commun., pp. 1–23, Apr. 2021, doi: 10.1007/s11277-021-08495-z.
17.
J. Ramkumar and R. Vadivel, “Bee inspired secured protocol for routing in cognitive radio ad hoc networks,” INDIAN J. Sci. Technol., vol. 13, no. 30, pp. 3059–3069, 2020, doi: 10.17485/IJST/v13i30.1152.
18.
J. Ramkumar and R. Vadivel, “FLIP: Frog Leap Inspired Protocol for Routing in Cognitive Radio Ad Hoc Networks,” in International Conference on Recent Trends in Engineering and Material Sciences (ICEMS - 2016), 2016, p. 248.
19.
J. Ramkumar and R. Vadivel, “Intelligent Fish Swarm Inspired Protocol (IFSIP) For Dynamic Ideal Routing in Cognitive Radio Ad-Hoc Networks,” Int. J. Comput. Digit. Syst., vol. 10, no. 1, pp. 1063–1074, 2020, doi: http://dx.doi.org/10.12785/ijcds/100196.
20.
J. Ramkumar and R. Vadivel, “Improved frog leap inspired protocol (IFLIP) – for routing in cognitive radio ad hoc networks (CRAHN),” World J. Eng., vol. 15, no. 2, pp. 306–311, 2018, doi: 10.1108/WJE-08-2017-0260.
21.
J. Ramkumar, C. Kumuthini, B. Narasimhan, and S. Boopalan, “Energy Consumption Minimization in Cognitive Radio Mobile Ad-Hoc Networks using Enriched Ad-hoc On-demand Distance Vector Protocol,” 2022 Int. Conf. Adv. Comput. Technol. Appl., pp. 1–6, Mar. 2022, doi: 10.1109/ICACTA54488.2022.9752899.
22.
P. Menakadevi and J. Ramkumar, “Robust Optimization Based Extreme Learning Machine for Sentiment Analysis in Big Data,” 2022 Int. Conf. Adv. Comput. Technol. Appl., pp. 1–5, Mar. 2022, doi: 10.1109/ICACTA54488.2022.9753203.
23.
O. C. Ghica, C. Nita-Rotaru, G. Trajcevski, and P. Scheuermann, “Security of electrostatic field persistent routing: Attacks and defense mechanisms,” Ad Hoc Networks, vol. 36, pp. 270–295, 2016, doi: https://doi.org/10.1016/j.adhoc.2015.07.016.
24.
S. Gopinath, K. Vinoth Kumar, P. Elayaraja, A. Parameswari, S. Balakrishnan, and M. Thiruppathi, “SCEER: Secure cluster based efficient energy routing scheme for wireless sensor networks,” Mater. Today Proc., vol. 45, pp. 3579–3584, 2021, doi: https://doi.org/10.1016/j.matpr.2020.12.1096.
25.
Y. Yang, X. Shi, Q. Ma, Y. Li, X. Yin, and Z. Wang, “Path stability in partially deployed secure BGP routing,” Comput. Networks, vol. 206, p. 108762, 2022, doi: https://doi.org/10.1016/j.comnet.2022.108762.
26.
Y. Lin, Y. Mao, Y. Zhang, and S. Zhong, “Secure deduplication schemes for content delivery in mobile edge computing,” Comput. Secur., vol. 114, p. 102602, 2022, doi: https://doi.org/10.1016/j.cose.2022.102602.
27.
R. Fotohi, E. Nazemi, and F. Shams Aliee, “An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks,” Veh. Commun., vol. 26, p. 100267, 2020, doi: https://doi.org/10.1016/j.vehcom.2020.100267.
28.
T. Yang, X. Xiangyang, L. Peng, L. Tonghui, and P. Leina, “A secure routing of wireless sensor networks based on trust evaluation model,” Procedia Comput. Sci., vol. 131, pp. 1156–1163, Jan. 2018, doi: 10.1016/J.PROCS.2018.04.289.
29.
G. A. E. Satish Kumar and P. Rama Devi, “A novel proactive routing strategy to defend node isolation attack in MANETS,” Mater. Today Proc., 2021, doi: https://doi.org/10.1016/j.matpr.2020.11.361.
30.
M. A. Cheema et al., “Blockchain-based secure delivery of medical supplies using drones,” Comput. Networks, vol. 204, p. 108706, 2022, doi: https://doi.org/10.1016/j.comnet.2021.108706.
31.
M. P. Lokhande and D. D. Patil, “Secured energy efficient machine -to-machine communication for telerobotic system,” Informatics Med. Unlocked, vol. 26, p. 100731, 2021, doi: https://doi.org/10.1016/j.imu.2021.100731.
32.
N. Nasser and Y. Chen, “SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks,” Comput. Commun., vol. 30, no. 11, pp. 2401–2412, 2007, doi: https://doi.org/10.1016/j.comcom.2007.04.014.
33.
G. Rathee, A. Sharma, R. Kumar, F. Ahmad, and R. Iqbal, “A trust management scheme to secure mobile information centric networks,” Comput. Commun., vol. 151, pp. 66–75, 2020, doi: https://doi.org/10.1016/j.comcom.2019.12.024.
34.
M. Kuchaki Rafsanjani and H. Fatemidokht, “FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs,” AEU - Int. J. Electron. Commun., vol. 69, no. 11, pp. 1613–1621, 2015, doi: https://doi.org/10.1016/j.aeue.2015.07.013.
35.
A. Chowdhury and D. De, “FIS-RGSO: Dynamic Fuzzy Inference System Based Reverse Glowworm Swarm Optimization of energy and coverage in green mobile wireless sensor networks,” Comput. Commun., vol. 163, pp. 12–34, 2020, doi: https://doi.org/10.1016/j.comcom.2020.09.002.
36.
X. Zhang, X. Lu, and X. Zhang, “Mobile wireless sensor network lifetime maximization by using evolutionary computing methods,” Ad Hoc Networks, vol. 101, p. 102094, 2020, doi: https://doi.org/10.1016/j.adhoc.2020.102094.