References
- Narwaria, A., Mazumdar, A. P. (2023). Software-defined wireless sensor network: A comprehensive survey. Journal of Network and Computer Applications, 215, 103755.
https://doi.org/10.1016/j.jnca.2023.103636 - Muthu, T., Kalimuthu, V. K. (2023). Seagull optimization-based feature selection with optimal extreme learning machine for intrusion detection in fog assisted WSN. Technical Gazette, 30 (5), 1547–1553.
https://doi.org/10.17559/TV-20230130000295 - Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17 (4), 2347–2376.
https://doi.org/10.1109/COMST.2015.2444095 - Ammar, M., Russello, G., Crispo, B. (2018). Internet of things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38, 8–27.
https://doi.org/10.1016/j.jisa.2017.11.002 - Seyyedabbasi, A., Kiani, F., Allahviranloo, T., Fernandez-Gamiz, U., Noeiaghdam, S. (2023). Optimal data transmission and pathfinding for WSN and decentralized IoT systems using I-GWO and Ex-GWO algorithms. Alexandria Engineering Journal, 63, 339–357.
https://doi.org/10.1016/j.aej.2022.08.009 - Oladipupo, E. T., Abikoye, O. C., Imoize, A. L., Awotunde, J. B., Chang, T.-Y., Lee, C.-C., Do, D.-T. (2023). An efficient authenticated elliptic curve cryptography scheme for multicore wireless sensor networks. IEEE Access, 11, 1306–1323.
https://doi.org/10.1109/ACCESS.2022.3233632 - Ramachandran, S., Prabakaran, D. (2024). A novel deep reinforcement learning (DRL) method for detecting evasion attack in IoT environment. In 2024 International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE.
https://doi.org/10.1109/ICICACS60521.2024.10498632 - Singh, J., Deepika, J., Zaheeruddin, Bhat, J. S., Kumararaja, V., Vikram, R., Amalraj, J. J., Saravanan, V., Sakthivel, S. (2022). Energy-efficient clustering and routing algorithm using hybrid fuzzy with grey wolf optimization in wireless sensor networks. Security and Communication Networks.
https://doi.org/10.1155/2022/9846601 - Haseeb, K., Almustafa, K. M., Jan, Z., Saba, T., Tariq, U. (2020). Secure and energy-aware heuristic routing protocol for WSN. IEEE Access, 8, 163962–163974.
https://doi.org/10.1109/ACCESS.2020.3022285 - Haseeb, K., Islam, N., Almogren, A., Ud Din, I., Almajed, H. N., Guizani, N. (2019). Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs. IEEE Access, 7, 79980–79988.
https://doi.org/10.1109/ACCESS.2019.2922971 - Navaneethan, S., Arun, A. (2025). A comprehensive integrated security model with advanced access control for enhancing WSN computing in IoT frameworks. Technical Gazette, 32 (3), 1040–1046.
https://doi.org/10.17559/TV-20240822001935 - Alotibi, M. (2021). Improved blowfish algorithm-based secure routing technique in IoT-based WSN. IEEE Access, 9, 159187–159197.
https://doi.org/10.1109/ACCESS.2021.3130005 - Conti, M., Kaliyar, P., Rabbani, M. M., Ranise, S. (2020). Attestation-enabled secure and scalable routing protocol for IoT networks. Ad Hoc Networks, 98, 102054.
https://doi.org/10.1016/j.adhoc.2019.102054 - Mishra, M., Sen Gupta, G., Gui, X. (2021). Network lifetime improvement through energy-efficient hybrid routing protocol for IoT applications. Sensors, 21 (22), 7439.
https://doi.org/10.3390/s21227439 - Maheshwari, P., Sharma, A. K., Verma, K. (2021). Energy efficient cluster based routing protocol for WSN using butterfly optimization algorithm and ant colony optimization. Ad Hoc Networks, 110, 102317.
https://doi.org/10.1016/j.adhoc.2020.102317 - Ramteke, R., Singh, S., Malik, A. (2022). Optimized routing technique for IoT enabled software-defined heterogeneous WSNs using genetic mutation based PSO. Computer Standards & Interfaces, 79, 103548.
https://doi.org/10.1016/j.csi.2021.103548 - Balakrishnan, S., Vinoth Kumar, K. (2023). Hybrid sine-cosine Black Widow Spider optimization based route selection protocol for multihop communication in IoT assisted WSN. Technical Gazette, 30 (4), 1159–1165.
https://doi.org/10.17559/TV-20230201000306 - Sharmin, S., Ahmedy, I., Noor, R. M. (2023). An energy-efficient data aggregation clustering algorithm for wireless sensor networks using hybrid PSO. Energies, 16 (5), 2487.
https://doi.org/10.3390/en16052487 - Pandian, I., Thirugnasambantham, S., Balasubramaniam, K., Ravichandran, K. (2025). Improving IoT network longevity with attack repellent energy (SARE) algorithm for energy-efficient and secure routing. Technical Gazette, 32 (3), 876–882.
https://doi.org/10.17559/TV-20240823001937 - Liu, Y., Wu, Q., Zhao, T., Tie, Y., Bai, F., Jin, M. (2019). An improved energy-efficient routing protocol for wireless sensor networks. Sensors, 19 (20), 4579.
https://doi.org/10.3390/s19204579 - Al-Shareeda, M. A., Gaber, T., Alqarni, M. A., Alkinani, M. H., Almazroey, A. A., Almazroi, A. A. (2025). Chebyshev polynomial-based emergency conditions with authentication scheme for 5G-assisted vehicular fog computing. IEEE Transactions on Dependable and Secure Computing, 22 (5), 4795–4812.
https://doi.org/10.1109/TDSC.2025.3553868 - Al-Shareeda, M. A., Anbar, M., Manickam, S., Khalil, A., Hasbullah, I. H. (2021). Security and privacy schemes in vehicular ad-hoc network with identity-based cryptography approach: A survey. IEEE Access, 9, 121522–121531.
https://doi.org/10.1109/ACCESS.2021.3109264 - Shareeda, M. A., Anbar, M., Alazzawi, M. A., Manickam, S., Hasbullah, I. H. (2021). Security schemes based on conditional privacy-preserving vehicular ad hoc networks. Indonesian Journal of Electrical Engineering and Computer Science, 21 (1), 479–488.
https://doi.org/10.11591/ijeecs.v21.i1.pp479-488 - Almazroi, A. A., Aldhahri, E. A., Al-Shareeda, M. A., Manickam, S. (2023). ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing. PLOS One, 18 (6), e0287291.
https://doi.org/10.1371/journal.pone.0287291 - Al-Shareeda, M. A., Manickam, S., Mohammed, B. A., Al-Mekhlafi, Z. G., Qtaish, A., Alzahrani, A. J., Alshammari, G., Sallam, A. A., Almekhlafi, K. (2022). CM-CPPA: Chaotic map-based conditional privacy-preserving authentication scheme in 5G-enabled vehicular networks. Sensors, 22 (13), 5026.
https://doi.org/10.3390/s22135026 - Abbood, A. A., Al-Shammri, F. K., Alzamili, Z. M., Al-Shareeda, M. A., Almaiah, M. A., AlAli, R. (2025). Investigating quantum-resilient security mechanisms for flying ad-hoc networks (FANETs). Journal of Robotics and Control, 6 (1), 456–469.
https://doi.org/10.18196/jrc.v6i1.20559