1. Deployment strategies in the wireless sensor network: A comprehensive review;Abdollahzadeh;Comput. Commun.,2016
2. Centralized routing protocol for detecting wormhole attacks in wireless sensor networks;Ahutu;IEEE Access,2020
3. In-network data aggregation in wireless sensor networks;Akkaya,2007
4. Reliable and secure end-to-end data aggregation using secret sharing in wsns;Alghamdi,2017
5. Novel sybil attack detection using RSSI and neighbour information to ensure secure communication in WSN;Angappan;J. Ambient Intell. Humaniz. Comput.,2020