1 |
M. Hawa, K. A. Darabkh, R. Al-Zubi, and G. Al-Sukkar, "A Self-Learning MAC Protocol for Energy Harvesting and Spectrum Access in Cognitive Radio Sensor Networks," J. Sensors, vol. 2016, pp. 1-18, 2016.
|
2 |
K. A. Darabkh, W. Y. Albtoush, and I. F. Jafar, "Improved clustering algorithms for target tracking in wireless sensor networks," J. Supercomput., vol. 73, no. 5, pp. 1952-1977, May 2017.
DOI
|
3 |
G. P. Gupta, M. Misra, and K. Garg, "Energy and trust aware mobile agent migration protocol for data aggregation in wireless sensor networks," J. Netw. Comput. Appl., vol. 41, pp. 300-311, May 2014.
DOI
|
4 |
W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks," in Proc. of the 33rd Annual Hawaii International Conference on System Sciences, vol. vol.1, p. 10, 2000.
|
5 |
M. Ahmadi, M. Shojafar, A. Khademzadeh, K. Badie, and R. Tavoli, "A Hybrid Algorithm for Preserving Energy and Delay Routing in Mobile Ad-Hoc Networks," Wirel. Pers. Commun., vol. 85, no. 4, pp. 2485-2505, Dec. 2015.
DOI
|
6 |
L. Sheng, J. Shao, and J. Ding, "A Novel Energy-Efficient Approach to DSR Based Routing Protocol for Ad Hoc Network," in Proc. of 2010 International Conference on Electrical and Control Engineering, pp. 2618-2620, Jun. 2010.
|
7 |
Y. Shi and R. Eberhart, "Parameter selection in particle swarm optimization," in Proc. of Proc. 7th Int. Conf. Evolutionary Programming, pp. 591-601, 1998.
|
8 |
Sugandh and R. Panday, "Energy Efficient-Long Life LEACH Variant Protocol for MANET Environment," Int. J. Comput. Sci. Inf. Technol., vol. 7, no. 5, pp. 2320-2325, 2016.
|
9 |
F. T. Zuhra, K. A. Bakar, A. Ahmed, and M. A. Tunio, "Routing protocols in wireless body sensor networks: A comprehensive survey," J. Netw. Comput. Appl., vol. 99, pp. 73-97, Dec. 2017.
DOI
|
10 |
M. Sheikhan and E. Hemmati, "PSO-Optimized Hopfield Neural Network-Based Multipath Routing for Mobile Ad-hoc Networks," Int. J. Comput. Intell. Syst., vol. 5, no. 3, pp. 568-581, 2012.
DOI
|
11 |
R. PushpaLakshmi, P. Lavanya, and S. Bhuvaneshwari, "Survey of ACO and PSO based Secure Routing protocols for Wireless networks," Int. J. Adv. Res. Sci. Eng., vol. 6, no. 12, pp. 820-832, 2017.
|
12 |
A. Behera and A. Panigrahi, "Determining the Network Throughput and Flow Rate Using GSR and AAL2R," Int. J. UbiComp, vol. 6, no. 3, pp. 9-18, Jul. 2015.
DOI
|
13 |
S. Sharma and P. S. Patheja, "Improving AODV Routing Protocol with Priority and Power Efficiency in Mobile Ad hoc WiMAX Network," Int. J. Comput. Technol. Electron. Eng., vol. 2, no. 1, pp. 87-93, 2002.
|
14 |
V. Sivaprasatham and J. Venkateswaran, "A Secure Key Management Technique for Wireless Body Area Networks," J. Comput. Sci., vol. 8, no. 11, pp. 1780-1787, Nov. 2012.
DOI
|
15 |
N. Bradai, L. Chaari, and L. Kamoun, "A Comprehensive Overview of Wireless Body Area Networks (WBAN)," Int. J. E-Health Med. Commun., vol. 2, no. 3, pp. 1-30, Jul. 2011.
|
16 |
M. Masdari and S. Ahmadzadeh, "Comprehensive analysis of the authentication methods in wireless body area networks," Secur. Commun. Networks, vol. 9, no. 17, pp. 4777-4803, Nov. 2016.
DOI
|
17 |
S. Sankaran, M. Husain, and R. Sridhar, "IDKEYMAN: An Identity-Based Key Management Scheme for Wireless Ad Hoc Body Area Networks," in Proc. of 5th Annu. Symp. Inf. Assur., 2009.
|
18 |
D. M. Barakah and M. Ammad-uddin, "A Survey of Challenges and Applications of Wireless Body Area Network (WBAN) and Role of a Virtual Doctor Server in Existing Architecture," in Proc. of 2012 Third International Conference on Intelligent Systems Modelling and Simulation, pp. 214-219, Feb. 2012.
|
19 |
S. Saleem, S. Ullah, and H. Seon Yoo, "On the Security Issues in Wireless Body Area Networks," vol. 3, 2009.
|
20 |
K. K. Khaing and K. M. M. Aung, "Secured Key Distribution Scheme for Cryptographic Key Management System," in Proc. of 2010 International Conference on Availability, Reliability and Security, pp. 481-486, Feb. 2010.
|
21 |
D. Satish kumar, N. Nagarajan, and A. Taher Azar, "An Improved Key Management Scheme with High Security in Wireless Sensor Networks," Mobile Ad-Hoc and Sensor Networks. MSN 2007. Lecture Notes in Computer Science, pp. 249-264, 2014.
|
22 |
N. Bradai, S. Belhaj, L. Chaari, and L. Kamoun, "Study of medium access mechanisms under IEEE 802.15.6 standard," in Proc. of 2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011), pp. 1-6, Oct. 2011.
|
23 |
J. Govindasamy and S. Punniakody, "A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack," J. Electr. Syst. Inf. Technol., vol. 5, no. 3, pp. 735-744, Dec. 2018.
DOI
|
24 |
M. Khabbazian, H. Mercier, and V. K. Bhargava, "Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks," IEEE Trans. Wirel. Commun., vol. 8, no. 2, pp. 736-745, Feb. 2009.
DOI
|
25 |
N. Sharma, B. M. Singh, and K. Singh, "QoS-based energy-efficient protocols for wireless sensor network," Sustain. Comput. Informatics Syst., vol. 30, p. 100425, Jun. 2021.
DOI
|
26 |
H. Lin, J. Ma, J. Hu, and K. Yang, "PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks," EURASIP J. Wirel. Commun. Netw., vol. 2012, no. 1, p. 69, Dec. 2012.
DOI
|
27 |
M. Sbeiti, N. Goddemeier, D. Behnke, and C. Wietfeld, "PASER: Secure and Efficient Routing Approach for Airborne Mesh Networks," IEEE Trans. Wirel. Commun., vol. 15, no. 3, pp. 1950-1964, Mar. 2016.
DOI
|
28 |
H. Lin, J. Hu, L. Xu, Y. Tian, L. Liu, and S. Blakeway, "A trustworthy and energy-aware routing protocol in software-defined wireless mesh networks," Comput. Electr. Eng., vol. 64, pp. 407-419, Nov. 2017.
DOI
|
29 |
M. A. Adnan, M. A. Razzaque, M. A. Abedin, S. M. Salim Reza, and M. R. Hussein, "A Novel Cuckoo Search Based Clustering Algorithm for Wireless Sensor Networks," pp. 621-634, 2016.
|
30 |
B. Baisakh, "A Review of Energy Efficient Dynamic Source Routing Protocol for Mobile Ad Hoc Networks," Int. J. Comput. Appl., vol. 68, no. 20, pp. 6-15, Apr. 2013.
DOI
|
31 |
S. Nikoletseas and P. Spirakis, "Probabilistic Distributed Algorithms for Energy Efficient Routing and Tracking in Wireless Sensor Networks," Algorithms, vol. 2, no. 1, pp. 121-157, Feb. 2009.
DOI
|
32 |
A. Alemdar and M. Ibnkahla, "Wireless sensor networks: Applications and challenges," in Proc. of 2007 9th International Symposium on Signal Processing and Its Applications, pp. 1-6, Feb. 2007.
|
33 |
D. Mehta and S. Saxena, "MCH-EOR: Multi-objective Cluster Head Based Energy-aware Optimized Routing algorithm in Wireless Sensor Networks," Sustain. Comput. Informatics Syst., vol. 28, p. 100406, Dec. 2020.
DOI
|
34 |
S. N. Ramli and R. Ahmad, "Surveying the Wireless Body Area Network in the realm of wireless communication," in Proc. of 2011 7th International Conference on Information Assurance and Security (IAS), pp. 58-61, Dec. 2011.
|
35 |
S. Dhanalakshmi and M. Sathiya, "An Improved Ant Based Routing Technique in WSN with High Security," no. September, pp. 1771-1778, 2015.
|
36 |
D. Srinath, V. Subedha, and S. Venkatraman, "ACO based mobile agent for secured key management in manet," ARPN J. Eng. Appl. Sci., vol. 10, no. 11, pp. 4877-4881, 2015.
|
37 |
S. Ganesh, "Efficient and Secure Routing Protocol for WSN-A Thesis," 2017.
|
38 |
T. Rahayu, S.-G. Lee, and H.-J. Lee, "A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation," Sensors, vol. 15, no. 7, pp. 15127-15158, Jun. 2015.
DOI
|
39 |
Z. Sun, M. Wei, Z. Zhang, and G. Qu, "Secure Routing Protocol based on Multi-objective Antcolony-optimization for wireless sensor networks," Appl. Soft Comput., vol. 77, pp. 366-375, Apr. 2019.
DOI
|
40 |
P. C. S. Rao, P. K. Jana, and H. Banka, "A particle swarm optimization based energy efficient cluster head selection algorithm for wireless sensor networks," Wirel. Networks, vol. 23, no. 7, pp. 2005-2020, Oct. 2017.
DOI
|
41 |
R. S. Y. Elhabyan and M. C. E. Yagoub, "Two-tier particle swarm optimization protocol for clustering and routing in wireless sensor network," J. Netw. Comput. Appl., vol. 52, pp. 116-128, Jun. 2015.
DOI
|
42 |
H.-H. Liu, J.-J. Su, and C.-F. Chou, "On Energy-Efficient Straight-Line Routing Protocol for Wireless Sensor Networks," IEEE Syst. J., vol. 11, no. 4, pp. 2374-2382, Dec. 2017.
DOI
|
43 |
T. Amgoth and P. K. Jana, "Energy-aware routing algorithm for wireless sensor networks," Comput. Electr. Eng., vol. 41, pp. 357-367, Jan. 2015.
DOI
|
44 |
W. Zhang, G. Han, Y. Feng, and J. Lloret, "IRPL: An energy efficient routing protocol for wireless sensor networks," J. Syst. Archit., vol. 75, pp. 35-49, Apr. 2017.
DOI
|
45 |
S. B. Lande and S. Z. Kawale, "Energy Efficient Routing Protocol for Wireless Sensor Networks," in Proc. of 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN), pp. 77-81, Dec. 2016.
|
46 |
K. A. Darabkh, N. J. Al-Maaitah, I. F. Jafar, and A. F. Khalifeh, "EA-CRP: A Novel Energy-aware Clustering and Routing Protocol in Wireless Sensor Networks," Comput. Electr. Eng., vol. 72, pp. 702-718, Nov. 2018.
DOI
|
47 |
S. Nikolidakis, D. Kandris, D. Vergados, and C. Douligeris, "Energy Efficient Routing in Wireless Sensor Networks Through Balanced Clustering," Algorithms, vol. 6, no. 1, pp. 29-42, Jan. 2013.
DOI
|
48 |
P. Khatri, "Using identity and trust with key management for achieving security in Ad hoc Networks," in Proc. of 2014 IEEE International Advance Computing Conference (IACC), pp. 271-275, Feb. 2014.
|
49 |
S. Sridhar, R. Baskaran, R. Anitha, R. Sankar, "Proficient and secured routing in MANET based on trust and energy supported AODV," Appl. Math. Inf. Sci., vol. 11, no. 3, pp. 807-817, 2017.
DOI
|
50 |
G. P. Gupta and S. Jha, "Integrated clustering and routing protocol for wireless sensor networks using Cuckoo and Harmony Search based metaheuristic techniques," Eng. Appl. Artif. Intell., vol. 68, pp. 101-109, Feb. 2018.
DOI
|
51 |
Z. Jin, Y. Jian-Ping, Z. Si-Wang, L. Ya-Ping, and L. Guang, "A Survey on Position-Based Routing Algorithms in Wireless Sensor Networks," Algorithms, vol. 2, no. 1, pp. 158-182, Feb. 2009.
DOI
|
52 |
F. Bao, I.-R. Chen, M. Chang, and J.-H. Cho, "Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection," IEEE Trans. Netw. Serv. Manag., vol. 9, no. 2, pp. 169-183, Jun. 2012.
DOI
|
53 |
R. Sujee and K. E. Kannammal, "Energy efficient adaptive clustering protocol based on genetic algorithm and genetic algorithm inter cluster communication for wireless sensor networks," in Proc. of 2017 International Conference on Computer Communication and Informatics (ICCCI), pp. 1-6, Jan. 2017,
|
54 |
K. Muthukumaran, K. Chitra, and C.Selvakumar, "An energy efficient clustering scheme using multilevel routing for wireless sensor network," Comput. Electr. Eng., vol. 69, pp. 642-652, Jul. 2018.
DOI
|