1.
Tomi? I., Mccann J.A. A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols. IEEE Int. Things J. 2017;4:1910–1923.
2.
Rawat P., Singh K.D., Chaouchi H., Bonnin J.M. Wireless sensor networks: a survey on recent developments and potential synergies. J. Supercomput. 2014;68:1–48.
3.
Zhang Z., Mehmood A., Shu L., Huo Z., Zhang Y., Mukherjee M. A survey on Fault Diagnosis in Wireless Sensor Networks. IEEE 2016;6:11349–11364.
4.
Qiu T., Qiao R., Wu D.O. EABS: An Event-Aware Backpressure Scheduling Scheme for Emergency Internet of Things. IEEE Trans. Mob. Comput. 2018;17:72–84.
5.
Qiu T., Chen N., Li K., Atiquzzaman M., Zhao W. How can heterogeneous Internet of Things build our future: A survey. IEEE Commun. Surv. Tutorials. 2018;20:2011–2027.
6.
Qiu T., Zheng K., Song H., Han M., Kantarci B. A local-optimization emergency scheduling scheme with self-recovery for smart grid. IEEE Trans. Ind. Inf. 2017;13:3195–3205.
7.
Dhurgadevi M., Devi P.M. An Analysis of Energy Efficiency Improvement through Wireless Energy Transfer in Wireless Sensor Network. Wirel. Pers. Commun. 2018;98:3377–3391.
8.
Chandola V., Banerjee A., Kumar V. Anomaly detection: A survey. ACM Comput. Surv. 2009;41:1–58. doi: 10.1145/1541880.1541882.
9.
Butun, I., Morgera, S. D., &Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEEcommunications surveys & tutorials, 16(1), 266-282.
10.
Chow, P., Rhee, W., Tehrani, A. M., &Goldburg, M. (2016). U.S. Patent No. 9,369,370. Washington, DC: U.S. Patent and Trademark Office.
11.
Kenkre, P. S., Pai, A., &Colaco, L. (2015). Real-time intrusion detection and prevention system. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 405-411). Springer, Cham.
12.
Krishnan, D. (2015). A distributed self-adaptive Intrusion Detection System for Mobile Ad-hoc Networks using tamper evident mobile agents. Procedia Computer Science, 46, 1203-1208.
13.
Ahmadifard, N., Nabizadeh, H., &Abbaspour, M. (2014). ISEFF: An ID-based scalable and efficient distributed file sharing technique in vehicular ad hoc networks. Wireless personal communications, 75(2), 821-841.
14.
Hadded, M., Muhlethaler, P., Laouiti, A., Zagrouba, R., &Saidane, L. A. (2015). TDMA-based MAC protocols for vehicular ad hoc networks: a survey, qualitative analysis, and open research issues. IEEE Communications Surveys & Tutorials, 17(4), 2461-2492.
15.
Sharma, S. K., Kumar, R., Gangwar, A., &Pakhre, K. (2014). Routing protocols and security issues in MANET: A survey. International Journal of Emerging Technology and Advanced Engineering,(IJETAE), 4(4), 918-924.
16.
Shaikh, F., & Parekh, C. (2017). A Review Paper on Intrusion Detection System in MANETs.
17.
Lin, W. C., Ke, S. W., & Tsai, C. F. (2015). CANN: An intrusion detection system based on combining cluster centers and nearest neighbors. Knowledge-based systems, 78, 13-21.
18.
Athavale, N., Deshpande, S., Chaudhary, V., Chavan, J., &Barde, S. S. (2017). Framework for Threat Analysis and Attack Modelling of Network Security Protocols. International Journal of Synthetic Emotions (IJSE), 8(2), 62-75.
19.
Gai, K., Qiu, M., Tao, L., & Zhu, Y. (2016). Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Security and Communication Networks, 9(16), 3049-3058.
20.
Mehrotra, A., Saxena, A., &Tolani, M. (2014). Performance comparison of different routing protocols for traffic monitoring application. International Journal of Computer Applications, 92(4).
21.
Srivastava, V., Tripathi, S., & Singh, K. (2020). Energy efficient optimized rate based congestion control routing in wireless sensor network. Journal of Ambient Intelligence and Humanized Computing, 11(3), 1325-1338.
22.
Kalnoor, G., &Agarkhed, J. (2016, March). QoS based multipath routing for intrusion detection of sinkhole attack in wireless sensor networks. In 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) (pp. 1-6). IEEE.
23.
Thangaramya, K., Kulothungan, K., Gandhi, S. I., Selvi, M., Kumar, S. S., &Arputharaj, K. (2020). Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Computing, 24(21), 16483-16497.
24.
Jan, M. A. (2016). Energy-efficient routing and secure communication in wireless sensor networks (Doctoral dissertation).
25.
Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., & Kannan, A. (2020). QoS aware trust based routing algorithm for wireless sensor networks. Wireless Personal Communications, 110(4), 1637-1658.
26.
Ahmed, A., Bakar, K. A., Channa, M. I., Haseeb, K., & Khan, A. W. (2016). A trust aware routing protocol for energy constrained wireless sensor network. Telecommunication Systems, 61(1), 123-140.
27.
Latha, A., Prasanna, S., Hemalatha, S., &Sivakumar, B. (2019). A harmonized trust assisted energy efficient data aggregation scheme for distributed sensor networks. Cognitive Systems Research, 56, 14-22.
28.
Beheshtiasl, A., &Ghaffari, A. (2019). Secure and trust-aware routing scheme in wireless sensor networks. Wireless Personal Communications, 107(4), 1799-1814.
29.
Dhand, G., &Tyagi, S. S. (2019). SMEER: secure multi-tier energy efficient routing protocol for hierarchical wireless sensor networks. Wireless Personal Communications, 105(1), 17-35.
30.
AlFarraj, O., AlZubi, A., &Tolba, A. (2018). Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 1-11.
31.
V. Nagaraju, N. J. Kumar, A. M. Ali, T. B. R. Bapu and N. Partheeban, "Efficient Data Transmission Scheme using Modified Wireless Communication Protocol Design," 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), 2022, pp. 1-7, doi: 10.1109/ACCAI53970.2022.9752622.
32.
Khot, P. S., &Naik, U. L. (2022). Cellular automata-based optimised routing for secure data transmission in wireless sensor networks. Journal of Experimental & Theoretical Artificial Intelligence, 34(3), 431-449.