1.
Vasanthi, G., and N. Prabakaran. "An Implementation of Low Energy Consumed Long Life Network (LECLLN) with Reliable Routing Protocol (RRP)." 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N). IEEE, 2021.
2.
Raymond, David R., and Scott F. Midkiff. "Denial-of-service in wireless sensor networks: Attacks and defenses." IEEE Pervasive Computing 7.1 (2008): 74-81.
3.
C. John and C. Wahi, “Security analysis of routing protocols for wireless sensor networks,” International Journal of Applied Engineering Research, vol. 11, no. 6, pp. 4235-4242, 2016.
4.
S. Madria and J. Yin, “SeRWA: a secure routing protocol against wormhole attacks in sensor networks,” Ad Hoc Networks, vol. 7, no. 6, pp. 1051-1063, 2009.
5.
R. E. Mohamed, A. I. Saleh, M. Abdelrazzak, and A. S. Samra, “Survey on wireless sensor network applications and energy efficient routing protocols,” Wireless Personal Communications, vol. 101, no. 2, pp. 1019–1055, 2018.
6.
Salehi, S. Ahmad, et al. "Detection of sinkhole attack in wireless sensor networks." 2013 IEEE international conference on space science and communication (IconSpace). IEEE, 2013.
7.
Goyal, Priyanka, Sahil Batra, and Ajit Singh. "A literature review of security attack in mobile ad-hoc networks." International Journal of Computer Applications 9.12 (2010): 11-15
8.
D. Kumar, S. Chand, and B. Kumar, “Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines,” Journal of Ambient Intelligence and Humanized Computing, vol. 10, no. 2, pp. 641–660, 2019.
9.
Ben-Othman, Jalel, and Bashir Yahya. "Energy efficient and QoS based routing protocol for wireless sensor networks." Journal of Parallel and Distributed Computing 70.8 (2010): 849-857.
10.
Ye, Wei, John Heidemann, and Deborah Estrin. "An energy-efficient MAC protocol for wireless sensor networks." Proceedings. Twenty-first annual joint conference of the IEEE computer and communications societies. Vol. 3. IEEE, 2002.
11.
Salehi, S. Ahmad, et al. "Detection of sinkhole attack in wireless sensor networks." 2013 IEEE international conference on space science and communication (IconSpace). IEEE, 2013.
12.
Chhabra, Gurpreet Singh, and Shahista Navaz. "Enhancing Network Lifetime in Wireless Sensor Networks using Cluster-Tree based Data Gathering." International Journal of Engineering Innovations and Research 3.4 (2014): 548.
13.
Younis, Ossama, Marwan Krunz, and Srinivasan Ramasubramanian. "Node clustering in wireless sensor networks: Recent developments and deployment challenges." IEEE network 20.3 (2006): 20-25.
14.
M. Y. Su, “Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems,” Computer Communications, vol. 34, no. 1, pp. 107-117, 2011.
15.
Ghugar, U., and J. Pradhan. "ML-IDS: MAC layer trust-based intrusion detection system for wireless sensor networks." Computational Intelligence in Data Mining. Springer, Singapore, 2020. 427-434.
16.
Sohraby, Kazem, Daniel Minoli, and Taieb Znati. Wireless sensor networks: technology, protocols, and applications. John wiley & sons, 2007.
17.
John, Jacob, and Paul Rodrigues. "A survey of energy-aware cluster head selection techniques in wireless sensor network." Evolutionary Intelligence (2019): 1-13.
18.
H. Shafiei, A. Khonsari, H. Derakhshi, and P. Mousavi, “Detection and mitigation of sinkhole attacks in wireless sensor networks,” Journal of Computer and System Sciences, vol. 80, no. 3, pp. 644-653, 2014.
19.
Tyagi, Sudhanshu, and Neeraj Kumar. "A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks." Journal of Network and Computer Applications 36.2 (2013): 623-645.
20.
Sánchez-Casado, Leovigildo, et al. "Identification of contamination zones for sinkhole detection in MANETs." Journal of Network and Computer Applications 54 (2015): 62-77.
21.
K. Balakrishnan, J. Deng, and V. K. Varshney, “TWOACK: preventing selfishness in mobile ad hoc networks,” in Proceedings of 2005 IEEE Wireless Communications and Networking Conference, New Orleans, LA, 2005, pp. 2137-2142.
22.
K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehavior in MANETs,” IEEE Transactions on Mobile Computing, vol. 6, no. 5, pp. 536-550, 2007.
23.
V. Heydari and S. M. Yoo, “Lightweight acknowledgement-based method to detect misbehavior in MANETs,” KSII Transactions on Internet And Information Systems, vol. 9, no. 12, pp. 5150-5169, 2015.
24.
R. K. Sundararajan and U. Arumugam, “Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor network,” Journal of Sensors, vol. 2015, Article ID. 203814, 2015.
25.
Madria, Sanjay, and Jian Yin. "SeRWA: A secure routing protocol against wormhole attacks in sensor networks." Ad Hoc Networks 7.6 (2009): 1051-1063.
26.
Q. Liu, J. Yin, V. C. Leung, and Z. Cai, “FADE: forwarding assessment based detection of collaborative grey hole attacks in WMNs,” IEEE Transactions on Wireless Communications, vol. 12, no. 10, pp. 5124-5137, 2013.
27.
M. Sathish, K. Arumugam, S. N. Pari, and V. S. Harikrishnan, “Detection of single and collaborative black hole attack in MANET,” in Proceedings of International Conference on Wireless Communications, Signal Processing and Networking, Chennai, India, 2016, pp. 2040-2044.
28.
Siddiqua, Ayesha, Kotari Sridevi, and Arshad Ahmad Khan Mohammed. "Preventing black hole attacks in MANETs using secure knowledge algorithm." 2015 International Conference on Signal Processing and Communication Engineering Systems. IEEE, 2015.
29.
D. Qin, S. Yang, S. Jia, Y. Zhang, J. Ma, and Q. Ding, “Research on trust sensing based secure routing mechanism for wireless sensor network,” IEEE Access, vol. 5, pp. 9599–9609, 2017.
30.
V. Kumar and R. Kumar, “An adaptive approach for detection of blackhole attack in mobile Ad hoc network,” Procedia Computer Science, vol. 48, pp. 472-479, 2015.
31.
N. K. Sreelaja and G. A. Vijayalakshmi Pai, “Swarm intelligence-based approach for sinkhole attack detection in wireless sensor networks,” Applied Soft Computing, vol. 19, pp. 68-79, 2014.