1. Lokhande, M.P. and Patil, D.D.Secured Energy Efficient Machine-To-Machine Communication for Telerobotic System. Informatics in Medicine Unlocked, vol. 26, pp.100731, 2021. 2. Avancha S., Baxi A., andKotz D.Privacy in Mobile Technology for Personal Healthcare. ACM Computing Surveys (CSUR), vol. 45, no. 1, pp.1-54, 2012. 3. Agarwal S., Peylo C., Borgaonkar R., andSeifert J.P.Operator-Based Over-The-Air M2M Wireless Sensor Network Security. In2010 14th International Conference on Intelligence in Next Generation Networks, IEEE, pp. 1-5, 2010. 4. Wu G., Talwar S., Johnsson K., Himayat N., andJohnson K.D.M2M: From Mobile to Embedded Internet. IEEE Communications Magazine, vol. 49, no. 4, pp. 36-43, 2011. 5. Wang, F. and Liu, J.Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches. IEEE Communications Surveys & Tutorials, vol. 13, no. 4, pp. 673-687, 2010. 6. Santi P.Topology Control in Wireless Ad Hoc and Sensor Networks. ACM computing surveys (CSUR), vol. 37, no. 2, pp. 164-194, 2005. 7. Darabkh K.A.,Al-Maaitah, N.J., Jafar, I.F., and Ala'F, K. EA-CRP: A Novel Energy-Aware Clustering and Routing Protocol in Wireless Sensor Networks. Computers & Electrical Engineering, vol. 72, pp. 702-718, 2018. 8. Shah, R.C. and Rabaey, J.M. Energy Aware Routing for Low Energy Ad Hoc Sensor Networks. In2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No. 02TH8609), IEEE, vol. 1, pp. 350-355, 2002. 9. Chang, J.H. and Tassiulas, L.Maximum Lifetime Routing in Wireless Sensor Networks. IEEE/ACM Transactions on networking, vol. 12, no. 4, pp. 609-619, 2004. 10. Bouabdallah F., Bouabdallah N., andBoutaba R.Toward Reliable and Efficient Reporting in Wireless Sensor Networks. IEEE Transactions on Mobile Computing, vol. 7, no. 8, pp. 978-994, 2008. 11. Abbasi, A.A. and Younis, M.A Survey on Clustering Algorithms for Wireless Sensor Networks. Computer communications, vol.30, no. 14-15, pp. 2826-2841, 2007. 12. Karim L., Anpalagan A., Nasser N., Almhana J., andWoungang I.Fault Tolerant, Energy Efficient and Secure Clustering Scheme for Mobile Machine‐to‐machine Communications. Transactions on emerging telecommunications technologies, vol. 25, no. 10, pp. 1028-1044, 2014. 13. Chang J.Y.A Distributed Cluster Computing Energy-Efficient Routing Scheme for Internet of Things Systems. Wireless personal communications, vol. 82, no. 2, pp. 757-776, 2015. 14. Park S.H., Cho S., andLee J.R.Energy-efficient Probabilistic Routing Algorithm for Internet of Things.Journal of Applied Mathematics, 2014. 15. Machado K., Rosário D., Cerqueira E., Loureiro A.A., Neto A., andDe Souza, J.N. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications. sensors, vol. 13, no. 2, pp. 1942-1964, 2013. 16. Su H., Wang Z., andAn S. MAEB: Routing Protocol for IoT Healthcare, 2013. 17. Kumar, V.D. and Navaneethan, C.Protection Against Denial of Service (DOS) Attacks in Wireless Sensor Networks. International Journal of Advanced Research in Computer Science & Technology, vol. 2, no. 1, pp. 439-443, 2014. 18. Chen L.C., Longstaff T.A., andCarley K.M.Characterization of Defense Mechanisms Against Distributed Denial of Service Attacks. Computers & Security, vol. 23, no. 8, pp. 665-678, 2004. 19. Eian, M. and Mjølsnes, S.F.The Modeling and Comparison of Wireless Network Denial of Service Attacks. InProceedings of the 3rd ACM SOSP workshop on networking, systems, and applications on mobile handhelds, pp. 1-6, 2011. 20. Pasqualetti F., Bicchi A., andBullo F. On the Security of Linear Consensus Networks. In Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with2009 28th Chinese Control Conference, IEEE, pp. 4894-4901, 2009. 21. Dini, G. and Tiloca, M.ASF: An Attack Simulation Framework for Wireless Sensor Networks. In2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE, pp. 203-210, 2012. 22. Chabukswar R., Mo Y., andSinopoli B.Detecting Integrity Attacks on SCADA Systems. IFAC Proceedings Volumes, vol. 44, no. 1, pp. 11239-11244, 2011. 23. Lokhande, M.P. and Patil, D.D.Security Threats in M2M Framework of IoT. International Journal of Advanced Science and Technology, vol. 29, no. 8, pp. 1809-1823, 2020. 24. Dhurandher S.K., Misra S., Obaidat M.S., andGupta N.An Ant Colony Optimization Approach for Reputation and Quality‐of‐service‐based Security in Wireless Sensor Networks. Security and Communication Networks, vol. 2, no. 2, pp. 215-224, 2009. 25. Vinitha, A. and Rukmini, M.S.S. Secure and Energy Aware Multi-Hop Routing Protocol in WSN Using Taylor-Based Hybrid Optimization Algorithm.Journal of King Saud University-Computer and Information Sciences, 2019. 26. Dongarsane C.R., Aravind H.S., andSankpal S.V.Design of Energy Efficient and Secured Routing Protocol for Wsn in IoT.Design Engineering, pp. 3936-3953, 2021. 27. Jin X., Liang J., Tong W., Lu L., andLi Z.Multi-agent Trust-based Intrusion Detection Scheme for Wireless Sensor Networks. Computers & Electrical Engineering, vol. 59, pp. 262-273, 2017. 28. Ma D., Er M.J., andWang B.Analysis of Hop-count-based Source-to-destination Distance Estimation in Wireless Sensor Networks with Applications in Localization. IEEE Transactions on Vehicular Technology, vol. 59, no. 6, pp. 2998-3011, 2010. 29. Poovizhi, A. and Mahalakshmi, B.Survey on the Open Shortest Path First (OSPF) Routing Protocols. International Journal of Advanced Research in Computer and Communication Engineering, vol.6. Issue 10, 2017. |