S. Yoo, S.-h. Kang, and J. Kim, “SERA: a secure energy reliability aware data gathering for sensor networks,”Multimedia Tools and Applications, pp. 1-30, 2011/01/29 2011.
Y. M. Zhou and L. Y. Li, “A Trust-Aware and Location-Based Secure Routing Protocol for WSN,”Applied Mechanics and Materials, vol. 373, pp. 1931-1934, 2013.
E. Ahvar, A. Pourmoslemi, and M. J. Piran, “Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks,”arXiv preprint arXiv:1108.2777,2011.
J. Bahi, C. Guyeux, and A. Makhoul, “Secure Data Aggregation in Wireless Sensor Networks: Homomorphism versus Watermarking Approach,” in Ad Hoc Networks. vol. 49, J. Zheng, D. Simplot-Ryl, and V. M. Leung, Eds., ed: Springer Berlin Heidelberg, 2010, pp. 344-358.
A. T. Boloorchi and M. H. Samadzadeh, “Energy-efficient and secure in-network storage and retrieval for WSNs: an adaptive approach,”The Journal of Supercomputing, vol. 65, pp. 961-977, 2013/08/01 2013.10.1007/s11227-013-0874-2
W. Jin, C. Jinsung, L. Sungyoung, C. Kwang-Cheng, and L. Young-Koo, “Hop-based energy aware routing algorithm for wireless sensor networks,”IEICE transactions on communications, vol. 93, pp. 305-316, 2010.10.1587/transcom.E93.B.305
V. Kumar and S. Madria, “Secure Data Aggregation in Wireless Sensor Networks,” in Wireless Sensor Network Technologies for the Information Explosion Era. vol. 278, T. Hara, V. Zadorozhny, and E. Buchmann, Eds., ed: Springer Berlin Heidelberg, 2010, pp. 77-107.10.1007/978-3-642-13965-9_3
C. Ranhotigamage and S. C. Mukhopadhyay, “Field Trials and Performance Monitoring of Distributed Solar Panels Using a Low Cost Wireless Sensors Network for Domestic Applications”, IEEE Sensors Journal, Vol. 11, No. 10, October 2011, pp. 2583-2590.10.1109/JSEN.2011.2150214
B. Kumari, N. Vikram, and M. M. Reddy, “Secure Data Collection in Wireless Sensor
Networks Using Random Routing Algorithms,”International Journal of Computer Science and Telecommunications, vol. 2, pp. 50-55, 2011.
H. Li, K. Li, W. Qu, and I. Stojmenovic, “Secure and Energy-Efficient Data Aggregation with Malicious Aggregator Identification in Wireless Sensor Networks,” in Algorithms and Architectures for Parallel Processing. vol. 7016, Y. Xiang, A. Cuzzocrea, M. Hobbs, and W. Zhou, Eds., ed: Springer Berlin Heidelberg, 2011, pp. 2-13.
W. Lu, Y. Liu, and D. Wang, “A Distributed Secure Data Collection Scheme via Chaotic Compressed Sensing in Wireless Sensor Networks,”Circuits, Systems, and Signal Processing, vol. 32, pp. 1363-1387, 2013/06/01 2013.
P. Samundiswary, M. P. Kumar, and P. Dananjayan, “Trust Based Energy Aware Greedy Perimeter Stateless Routing for Wireless Sensor Networks,”Journal of Communication and Computer, vol. 8, pp. 848-854, 2011.
T. Zahariadis, P. Trakadas, H. C. Leligou, S. Maniatis, and P. Karkazis, “A novel trust-aware geographical routing scheme for wireless sensor networks,”Wireless personal communications, vol. 69, pp. 805-826, 2013.10.1007/s11277-012-0613-7
H.-C. Leligou, P. Trakadas, S. Maniatis, P. Karkazis, and T. Zahariadis, “Combining trust with location information for routing in wireless sensor networks,”Wireless Communications and Mobile Computing, vol. 12, pp. 1091-1103, 2012.
G. Zhan, W. Shi, and J. Deng, “Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs,”Dependable and Secure Computing, IEEE Transactions on, vol. 9, pp. 184-197, 2012.10.1109/TDSC.2011.58
G. V. Crosby, L. Hester, and N. Pissinou, “Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks,”IJ Network Security,vol. 12, pp. 107-117, 2011.
R. Feng, X. Xu, X. Zhou, and J. Wan, “A trust evaluation algorithm for wireless sensor networks based on node behaviors and ds evidence theory,”Sensors, vol. 11, pp. 1345-1360, 2011.
H. Zhao, Y. Li, M. Zhang, R. Zheng, and Q. Wu, “A New Secure Geographical Routing Protocol Based on Location Pairwise Keys in Wireless Sensor Networks,”International Journal of Computer Science Issues (IJCSI), vol. 10, 2013.
J. Duan, D. Yang, H. Zhu, S. Zhang, and J. Zhao, “TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks,”International Journal of Distributed Sensor Networks, vol. 2014, 2014.10.1155/2014/209436
S.-I. Huang, S. Shieh, and J. Tygar, “Secure encrypted-data aggregation for wireless sensor networks,”Wireless Networks, vol. 16, pp. 915-927, 2010.10.1007/s11276-009-0177-y
L. A. Villas, A. Boukerche, H. A. De Oliveira, R. B. De Araujo, and A. A. Loureiro, “A spatial correlation aware algorithm to perform efficient data collection in wireless sensor networks,”Ad Hoc Networks, vol. 12, pp. 69-85, 2014.10.1016/j.adhoc.2011.08.005
S. Xiao, B. Li, and X. Yuan, “Maximizing precision for energy-efficient data aggregation in wireless sensor networks with lossy links,”Ad Hoc Networks, vol. 26, pp. 103-113, 2015.10.1016/j.adhoc.2014.11.014
K. Yi, J. Wan, L. Yao, and T. Bao, “Partial Matrix Completion Algorithm for Efficient Data Gathering in Wireless Sensor Networks,”IEEE Communications Letters,, vol. 19, pp. 54-57, 2015.10.1109/LCOMM.2014.2371998
M. Naznin and A. S. Chowdhury, “ZDG: Energy efficient zone based data gathering in a wireless sensor network,” in International Conference on Networking Systems and Security (NSysS), 2015, pp. 1-7.10.1109/NSysS.2015.7043514
B. Wu, Y. Feng, and H. Zheng, “POSTERIOR BELIEF CLUSTERING ALGORITHM FOR ENERGY-EFFICIENT TRACKING IN WIRELESS SENSOR NETWORKS,”International Journal on Smart Sensing and Intelligent Systems, vol. 7, pp. 925-941, 2014.10.21307/ijssis-2017-688
X. Zhao, J. Minz, and S. K. Lim, “Low-power and reliable clock network design for through-silicon via (TSV) based 3D ICs,”IEEE Transactions on Components, Packaging and Manufacturing Technology, vol. 1, pp. 247-259, 2011.10.1109/TCPMT.2010.2099590
H. Wenbo, L. Xue, N. Hoang, K. Nahrstedt, and T. Abdelzaher, “PDA: PrivacyPreserving Data Aggregation in Wireless Sensor Networks,” in INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, 2007, pp. 20452053.