[1] D.C. Mehetre, S.E. Roslin and S.J. Wagh, "Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust", Cluster Computing, Vol. 22, No. 1, 2019, pp. 1313–1328.
[2] Z. Heidary Ghiri and G.H. Mirjalily, "Energy-Harvesting Aware Multi-Hop Routing in Wireless Sensor Networks for Defense Applications", Journal of Electronical & Cyber Defence, Vol. 8, No. 4, 2021, pp. 63–73.
[3] K. Akkaya and M. Younis, "A survey on routing protocols for wireless sensor networks", Ad hoc networks, Vol. 3, No. 3, 2005, pp. 325–349.
[4] A. A. Abbasi and M. Younis, "A survey on clustering algorithms for wireless sensor networks", Computer communications, Vol. 30, No. 14, 2007, pp. 2826–2841.
[5] X. Fu, Y. Yang and O. Postolache, "Invulnerability of clustering wireless sensor networks against cascading failures", IEEE Systems Journal, Vol. 13, No. 2, 2018, pp. 1431–1442.
[6] T. Khan, K. Singh, M. Abdel-Basset, H.V. Long, S.P. Singh and M. Manjul, "A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks", IEEE Access, Vo. 7, 2019, pp. 58221–58240.
[7] M. Selvi, K. Thangaramya, S. Ganapathy, K. Kulothungan, H.K. Nehemiah and A. Kannan, "An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks", Wireless Personal Communications, Vol. 105, No. 4, 2019, pp. 1475–1490.
[8] O. AlFarraj, A. AlZubi and A. Tolba, "Trust-based neighbor selection using activation function for secure routing in wireless sensor networks", Journal of Ambient Intelligence and Humanized Computing, Vol. 9, 2018, pp. 1–11.
[9] E.P.K. Gilbert, K. Baskaran, E.B. Rajsingh, M. Lydia and A.I. Selvakumar, "Trust aware nature inspired optimised routing in clustered wireless sensor networks", International Journal of Bio-Inspired Computation, Vol. 14, No. 2, 2019, pp. 103–113.
[10] C. Lyu, X. Zhang, Z. Liu and C.H. Chi, "Selective authentication based geographic opportunistic routing in wireless sensor networks for Internet of Things against DoS attacks", IEEE Access, Vol. 7, 2019, pp. 31068–31082.
[11] N. Kumar and Y. Singh, “Trust and packet load balancing based secure opportunistic routing protocol for WSN”, In 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), Solan, India, 2017, pp. 463–467.
[12] R. Logambigai and A. Kannan, “QEER: QoS aware energy efficient routing protocol for wireless sensor networks”, In 2014 Sixth international conference on advanced computing (ICoAC), Chennai, India, 2014, pp. 57–60.
[13] T. Kalidoss, L. Rajasekaran, K. Kanagasabai, G. Sannasi and A. Kannan, "QoS aware trust based routing algorithm for wireless sensor networks", Wireless Personal Communications, Vol. 110, No. 4, 2020, pp. 1637–1658.
[14] H. Wang, G. Zhou, L. Bhatia, Z. Zhu, W. Li and J.A. McCann, "Energy-Neutral and QoS-Aware Protocol in Wireless Sensor Networks for Health Monitoring of Hoisting Systems", IEEE Transactions on Industrial Informatics, Vol. 16, No. 8, 2020, pp. 5543–5553.
[15] K. Thangaraj and T. Selvi, "Efficient and Secure Routing Protocol for Wireless Sensor Networks through SNR Based Dynamic Clustering Mechanisms", Journal on Wireless Communication Networks, Vol. 3, No. 4, 2015, pp. 14–23.
[16] O.O. Ogundile, M.B. Balogun, O.E. Ijiga E.O. Falayi, "Energy-balanced and energy-efficient clustering routing protocol for wireless sensor networks", IET Communications, Vol. 13, No. 10, 2019, pp. 1449–1457.
[17] K. Haseeb, K.A. Bakar, A.H. Abdullah and T. Darwish, "Adaptive energy aware cluster-based routing protocol for wireless sensor networks", Wireless Networks, Vol. 23, No. 6, 2017, pp. 1953–1966.
[18] A. Zahedi and F. Parma, "An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks", Peer-to-Peer Networking and Applications, Vol. 12, No. 1, 2019, pp. 167–176.
[19] P.A. Patil, R.S. Deshpande and P.B. Mane, "Trust and Opportunity Based Routing Framework in Wireless Sensor Network Using Hybrid Optimization Algorithm", Wireless Personal Communications, Vol. 115, No. 1, 2020, pp.415–437.
[20] نسیبه سیادتی و کریم محمدی، «طراحی و شبیهسازی الگوریتم های مسیریابی تحملپذیر نقص در شبکه بر روی تراشه»، مجلة مدلسازی در مهندسی، دورة 2، شمارة 16، بهار 1387، صفحة 33-43.
[21] M. Shelke, A. Malhotra and P.N. Mahalle, ”Congestion-aware opportunistic routing protocol in wireless sensor networks”, In smart computing and informatics, Singapore, 2018, pp. 63–72.
[22] احمد عاشوری و ابولفضل جلیلوند، «ارزیابی امنیت سیستم حفاظتی شبکة توزیع در حضور تولید پراکنده با استفاده از شبکة پتری»، مجلة مدلسازی در مهندسی، دورة 14، شمارة 44، تابستان 1395، صفحة 129-142.
[23] علی ابراهیمی، احمد حاجیپور و حمیدرضا توکلی، «موقیعتیابی در اینترنت اشیا با استفاده از الگوریتم بهینهسازی ازدحام ذرّات مرتبة کسری آشوبی»، مجلة مدلسازی در مهندسی، دورة 18، شمارة 60، بهار 1399، صفحة 157-168.
[24] H. Hajipour, H. Behzadi Khormuji and H. Rostami, "ODMA: a novel swarm-evolutionary metaheuristic optimizer inspired by open source development model and communities", Soft Computing, Vol. 20, No. 2, 2016, pp. 727–747.
[25] S. Islam, M.N.I. Khan, M.Z. Ferdus, S.J. Islam and M.A. Kashem, “Improving Throughput using Cooperating TDMA Scheduling of Wireless Sensor Networks”, In 2020 International Conference on Computing and Information Technology, Tabuk, Saudi Arabia, 2020, pp. 1–4.
[26] A. Carie, M. Li, B. Marapelli, P. Reddy, H. Dino and M. Gohar, "Cognitive radio assisted WSN with interference aware AODV routing protocol", Journal of Ambient Intelligence and Humanized Computing, Vol. 10, No. 10, 2019, pp. 4033–4042.
[27] A. Rezaeipanah, H. Nazari, and G.R. Ahmadi, "A Hybrid Approach for Prolonging Lifetime of Wireless Sensor Networks Using Genetic Algorithm and Online Clustering", Journal of Computing Science and Engineering, Vol. 13, No. 4, 2019, pp. 163–174.
[28] R. Mhemed, N. Aslam, W. Phillips and F. Comeau, "An energy efficient fuzzy logic cluster formation protocol in wireless sensor networks", Procedia Computer Science, Vol. 10, 2012, pp. 255–262.
[29] Y. Liu, M. Dong, K. Ota and A. Liu, "ActiveTrust: Secure and trustable routing in wireless sensor networks", IEEE Transactions on Information Forensics and Security, Vol. 11, No. 9, 2016, pp. 2013-2027.
[30] Y. Wang, M. Zhang and W. Shu, "An emerging intelligent optimization algorithm based on trust sensing model for wireless sensor networks", EURASIP Journal on Wireless Communications and Networking, Vol. 2018, No. 1, 2018, pp. 1-10.