1. Bao F, Chen R, Chang M, Cho JH (2011) Trust-based intrusion detection in wireless sensor networks. IEEE Int Conf Commun (ICC) 2011:1–6
2. Bhavana N, Mouriya K, Mano jKumar DS (2017) Detection and avoidance of malicious nodes in MANET. Int J Pure Appl Math 116(21):401–407
3. Chatla AB, Maji B, Habibulla K (2017) A survey of energy aware and identity based encryption protocols in wireless ad-hoc network. J Adv Res Dyn Control Syst 9(12):1464–1473
4. Chen RC, Hsieh CF, Chang WL (2016) Using ambient intelligence to extend network lifetime in wireless sensor networks. J Ambient Intell Humaniz Comput 7(6):777–788
5. Debroy BK, Sadi MS, Al-Imran Md (2011) An efficient approach to select cluster head in wireless sensor network. Int J Commun 6(7):529–539