References
[1]. Y Yao, Q Cao & AV Vasilakos, (2013). “EDAL: An Energy-
Efficient, Delay-Aware, and Lifetime-Balancing Data
th Collection Protocol for Wireless Sensor Networks”. IEEE 10
International Conference on Mobile Ad-Hoc and Sensor
Systems (MASS), pp.182-190.
[2]. L Xiang, J Luo, & A Vasilakos, (2011). “Compressed
data aggregation for energy efficient wireless sensor
networks”. IEEE International Conference on Sensor, Mesh
and Ad Hoc Communications and Networks (SECON),
pp.46-54.
[3]. N. Chilamkurti, S. Zeadally & A Vasilakos, (2009).
“Cross-layer support for energy efficient routing in wireless
sensor networks”. Journal on Sensor Networks, pp.1-9.
[4]. X-Y Liu, Y Zhu, L Kong, C Liu, & Y Gu, AV Vasilakos, et al.,
(2014). “CDC: Compressive Data Collection For Wireless
Sensor Networks”. IEEE Transactions on Parallel and Distributed Systems, Vol.26, No.8, pp.2188-2197.
[5]. Y-h Zhu, W. W-d, J. Pan & T. Y-p, (2010). “An energyefficient
data gathering algorithm to prolong lifetime of
wireless sensor networks”. Journal on Computational
Communication, Vol.33, pp.639-647.
[6]. X. Min, S. Wei-Ren, J. Chang-Jiang, & Z. Ying, (2010).
“Energy efficient clustering algorithm for maximizing
lifetime of wireless sensor networks”. International journal
on Electronic Communications, Vol.64, pp.289-298.
[7]. D. Karaboga, S. Okdem & C. Ozturk, (2012). “Cluster
based wireless sensor network routing using artificial bee
colony algorithm”. Journal on Wireless Networks, Vol.18,
pp.847-860.
[8]. J. Yuea, W. Zhang, W. Xiao, & D. Tang, (2012). “Energy
efficient and balanced cluster-based data aggregation
algorithm for wireless sensor networks”. Proceedings of
Engineering, Vol.29, pp.2009-2015.
[9]. M. Guechari, L. Mokdad & S. Tan, (2012). “Dynamic
solution for detecting denial of service attacks in wireless
sensor networks”. IEEE ICC Ad-hoc and Sensor Networking
Symposium, Ottawa, ON, Canada, pp.173-177.
[10]. Bai Li & L. Batten, (2007). “Using Mobile Agents to
Detect Node Compromise in Path-Based DoS Attacks on Wireless Sensor Networks”. Wireless Communications,
Networking and Mobile Computing, International
Conference, Shanghai, China, pp.2507-2510.
[11]. L. Gheorghe, R. Rughinis, R. Deaconescu,& N.
Tapus, (2010). “Authentication and Anti-replay Security
Protocol for Wireless Sensor Networks”. 2010 Fifth
International Conference on Systems and Networks
Communications (ICSNC), pp.7-13.
[12]. Mohamed Ben Haj Frej, & Khaled M. Elleithy, (2015).
“Secure Data Aggregation Model (SDAM) in Wireless
Sensor Networks”. International Conference Paper on
Network Security.
[13]. L. B. Oliveira, H. C. Wong, M. Bern, R. Dahab, &A. A.
Loureiro, (2006). “SecLEACH-A random key distribution
solution for securing clustered sensor networks”. Fifth IEEE
International Symposium on Network Computing and
Applications, NCA 2006, pp.145-154.
[14]. W. R. Heinzelman, A. Chandrakasan, and H.
Balakrishnan, (2000). “Energy efficient communication
protocol for wireless and microsensor networks”.
International Conference on System Sciences, Maui,
Hawaii, pp.1-10.