[1] A. Forster, Introduction to wireless sensor networks, John Wiley & Sons, 2016.
[2] A. Dahane and N.-E. Berrached, Mobile, Wireless and Sensor Networks: A Clustering Algorithm for Energy Efficiency and Safety, Apple Academic Press, 2019.
[3] E. C. Whitman, "Sosus: The “secret weapon” of undersea surveillance," Undersea Warfare, vol. 7, no. 2, p. 256, 2005.
[4] V. Jindal, "History and architecture of Wireless sensor networks for ubiquitous computing," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 7, no. 2, pp. 214-217, February 2018.
[5] R. Silva, Z. Zinonos, J. S. Silva and V. Vassiliou, "Mobility in WSNs for critical applications," in 2011 IEEE Symposium on Computers and Communications (ISCC), 2011.
[6] D. Stevanovic and N. Vlajic, "Performance of IEEE 802.15. 4 in wireless sensor networks with a mobile sink implementing various mobility strategies," in 2008 33rd IEEE Conference on Local Computer Networks (LCN), 2008.
[7] V. Ramasamy, "Mobile Wireless Sensor Networks: An Overview," in Wireless Sensor Networks - Insights and Innovations, P. Sallis, Ed., IntechOpen, 2017.
[8] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks," IEEE Communications magazine, vol. 40, no. 8, pp. 102-114, 2002.
[9] T. P. Lambrou and C. G. Panayiotou, "A survey on routing techniques supporting mobility in sensor networks," in 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks, 2009.
[10] U. Burgos, U. Amozarrain, C. Gómez-Calzado and A. Lafuente, "Routing in mobile wireless sensor networks: A leader-based approach," Sensors, vol. 17, no. 7, p. 1587, 2017.
[11] M. Fonoage, M. Cardei and A. Ambrose, "A QoS based routing protocol for wireless sensor networks," in International Performance Computing and Communications Conference, 2010.
[12] J. N. Al-Karaki and A. E. Kamal, "Routing techniques in wireless sensor networks: a survey," IEEE wireless communications, vol. 11, no. 6, pp. 6-28, 2004.
[13] J. Sen, "Routing security issues in wireless sensor networks: attacks and defenses," in Sustainable Wireless Sensor Networks, InTech, 2010, pp. 279-309.
[14] M. Radi, B. Dezfouli, K. A. Bakar and M. Lee, "Multipath routing in wireless sensor networks: survey and research challenges," Sensors, vol. 12, no. 1, pp. 650-685, 2012.
[15] S. Varshney and R. Kuma, "Variants of LEACH routing protocol in WSN: A comparative analysis," in 2018 8th International Conference on Cloud Computing, Data Science & Engineering (confluence), 2018.
[16] D.-S. Kim and Y.-J. Chung, "Self-organization routing protocol supporting mobile nodes for wireless sensor network," in First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06), 2006.
[17] G. Renugadevi and M. Sumithra, "An analysis on LEACH-mobile protocol for mobile wireless sensor networks," International Journal of Computer Applications, vol. 65, no. 21, pp. 38-42, 2013.
[18] N. Sabor, S. Sasaki, M. Abo-Zahhad and S. M. Ahmed, "A comprehensive survey on hierarchical-based routing protocols for mobile wireless sensor networks: review, taxonomy, and future directions," Wireless Communications and Mobile Computing, vol. 2017, 2017
[19] G. S. Kumar, M. V. Paul, G. Athithan and K. P. Jacob, "Routing protocol enhancement for handling node mobility in wireless sensor networks," in TENCON 2008-2008 IEEE Region 10 Conference, 2008.
[20] Z. Qi and Y. Min, "A routing protocol for mobile sensor network based on leach," in 10th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2014), 2014.
[21] S. Mottaghi and M. R. Zahabi, "Optimizing LEACH clustering algorithm with mobile sink and rendezvous nodes," AEU-International Journal of Electronics and Communications, vol. 69, no. 2, pp. 507-514, 2015.
[22] B. Nazir and H. Hasbullah, "Mobile sink based routing protocol (MSRP) for prolonging network lifetime in clustered wireless sensor network," in 2010 International Conference on Computer Applications and Industrial Electronics, 2010.
[23] C. E. Perkins, Ad hoc networking, vol. 1, Addison-wesley Reading, 2001. [24] techopedia.com, "Definition - What does Ad Hoc On-Demand Distance Vector (AODV) mean?," 2019. [Online]. Available:
https://www.techopedia.com/definition/2922/ad-hoc-on-demand-distance-vector-aodv. [Accessed November 2019].
[25] H. I. Sigiuk and A. A. Ihbeel, "Performance evaluation of dynamic source routing protocol (DSR) on WSN," International Journal of Computing and Digital Systems, vol. 1, no. 1, pp. 19-24, 2012.
[26] D. Karaboga and B. Basturk, "A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm," Journal of global optimization, vol. 39, no. 3, pp. 459-471, 2007.
[27] Y. Yue, J. Li, H. Fan and Q. Qin, "Optimization-based artificial bee colony algorithm for data collection in large-scale mobile wireless sensor networks," Journal of Sensors, vol. 2016, 2016.
[28] S. Cakici, I. Erturk, S. Atmaca and A. Karahan, "A novel cross-layer routing protocol for increasing packet transfer reliability in mobile sensor networks," Wireless personal communications, vol. 77, no. 3, pp. 2235-2254, 2014.
[29] S. A. Awwad, C. K. Ng, N. K. Noordin and M. F. A. Rasid, "Cluster based routing protocol for mobile nodes in wireless sensor network," in 2009 International Symposium on Collaborative Technologies and Systems, 2009.
[30] J. Shi, X. Wei and W. Zhu, "An efficient algorithm for energy management in wireless sensor networks via employing multiple mobile sinks," International Journal of Distributed Sensor Networks, vol. 12, no. 1, 2016.
[31] S. Deng, J. Li and L. Shen, "Mobility-based clustering protocol for wireless sensor networks with mobile nodes," IET Wireless Sensor Systems, vol. 1, no. 1, pp. 39-47, 2011.
[32] S. Lindsey and C. S. Raghavendra, "PEGASIS: Power-efficient gathering in sensor information systems," in Proceedings, IEEE Aerospace Conference, 2002.
[33] M. R. Jafri, N. Javaid, A. Javaid and Z. A. Khan, "Maximizing the lifetime of multi-chain pegasis using sink mobility," arXiv preprint arXiv:1303.4347, 2013.
[34] R. Velmani and B. Kaarthick, "An efficient cluster-tree based data collection scheme for large mobile wireless sensor networks," IEEE Sensors Journal, vol. 15, no. 4, pp. 2377-2390, 2014.
[35] R. Velmani and B. Kaarthick, "An energy efficient data gathering in dense mobile wireless sensor networks," ISRN Sensor Networks, vol. 2014, 2014.
[36] R. Anitha and P. Kamalakkannan, "Enhanced cluster based routing protocol for mobile nodes in wireless sensor network," in 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, 2013.
[37] T. Hayes and F. H. Ali, "Proactive Highly Ambulatory Sensor Routing (PHASeR) protocol for mobile wireless sensor networks," Pervasive and Mobile Computing, vol. 21, pp. 47-61, 2015.
[38] C. Tunca, S. Isik, M. Y. Donmez and C. Ersoy, "Ring routing: An energy-efficient routing protocol for wireless sensor networks with a mobile sink," IEEE Transactions on Mobile Computing, vol. 14, no. 9, pp. 1947-1960, 2014.
[39] A. E. Kostin, Y. Fanaeian and H. Al-Wattar, "Anycast tree-based routing in mobile wireless sensor networks with multiple sinks," Wireless Networks, vol. 22, no. 2, pp. 579-598, 2016.
[40] S. Sarangi and S. Kar, "Genetic algorithm based mobility aware clustering for energy efficient routing in wireless sensor networks," in 2011 17th IEEE International Conference on Networks, 2011.
[41] J. Wang, Y.-Q. Cao, B. Li, S.-Y. Lee and J.-U. Kim, "A glowworm swarm optimization based clustering algorithm with mobile sink support for wireless sensor networks," Journal of Internet Technology , vol. 16, no. 5, pp. 825-832, 2015.
[42] D. W. Carman, P. S. Kruus and B. J. Matt, "Constraints and approaches for distributed sensor network security," 2000. [43] I. Kamel and H. Juma, "A lightweight data integrity scheme for sensor networks," Sensors, vol. 11, no. 4, pp. 4118-4136, 2011.
[44] C.-M. Chen, Y.-H. Lin, Y.-H. Chen and H.-M. Sun, "Sashimi: secure aggregation via successively hierarchical inspecting of message integrity on wsn," Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 1, pp. 57-72, 2013.
[45] I. Silva, L. A. Guedes, P. Portugal and F. Vasques, "Reliability and availability evaluation of wireless sensor networks for industrial applications," Sensors, vol. 12, no. 1, pp. 806-838, 2012.
[46] R. Riaz, T.-S. Chung, S. S. Rizvi and N. Yaqub, "BAS: The Biphase Authentication Scheme for Wireless Sensor Networks," Security and Communication Networks, vol. 2017, 2017.
[47] S. A. Ch, Z. Mehmood, D. Rashid Amin, M. Alghobiri and T. A. Malik, "Ensuring Reliability & Freshness in Wireless Sensor Networks," in 2010 International Conference on Intelligent Network and Computing (ICINC 2010) , 2010.
[48] L. Lazos and R. Poovendran, "SeRLoc: Robust localization for wireless sensor networks," ACM Transactions on Sensor Networks (TOSN), vol. 1, no. 1, pp. 73-100, 2005.
[49] A. Srinivasan and J. Wu, "A survey on secure localization in wireless sensor networks," Encyclopedia of Wireless and Mobile communications, pp. 1-26, 2007.
[50] J. Hwang and Y. Kim, "Revisiting random key pre-distribution schemes for wireless sensor networks," in Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004.
[51] A.-S. K. Pathan, Security of self-organizing networks: MANET, WSN, WMN, VANET, CRC press, 2016.
[52] J. He, J. Chen, P. Cheng and X. Cao, "Secure Time Synchronization in WirelessSensor Networks: A MaximumConsensus-Based Approach," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 4, pp. 1055-1065, 2014.
[53] S. Ganeriwal, S. Čapkun, C.-C. Han and M. B. Srivastava, "Secure time synchronization service for sensor networks," in Proceedings of the 4th ACM workshop on Wireless security, 2005.
[54] G. Yang, L. Dai and Z. Wei, "Challenges, threats, security issues and new trends of underwater wireless sensor networks," Sensors, vol. 18, no. 11, p. 3907, 2018.
[55] M. Riaz, A. Buriro and A. Mahboob, "Classification of Attacks on Wireless Sensor Networks : A Survey," International Journal of Wireless and Microwave Technologies, vol. 8, pp. 15-39, 11 2018.
[56] S. Sudheendran, O. Bouachir, S. Moussa and A. O. Dahmane, "Review — Challenges of mobility aware MAC protocols in WSN," in 2018 Advances in Science and Engineering Technology International Conferences (ASET), 2018.
[57] H. Gong, X. Zhang, L. Yu, X. Wang and F. Yi, "A study on MAC protocols for wireless sensor networks," in 2009 Fourth International Conference on Frontier of Computer Science and Technology, 2009.
[58] K. Chelli, "Security issues in wireless sensor networks: Attacks and countermeasures," in Proceedings of the World Congress on Engineering, 2015.
[59] P. M. Jawandhiya, M. M. Ghonge, M. Ali and J. Deshpande, "A survey of mobile ad hoc network attacks," International Journal of Engineering Science and Technology, vol. 2, no. 9, pp. 4063-4071, 2010.
[60] D. R. Raymond and S. F. Midkiff, "Denial-of-service in wireless sensor networks: Attacks and defenses," IEEE Pervasive Computing, pp. 74-81, 2008.
[61] A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," computer, vol. 35, no. 10, pp. 54-62, 2002.
[62] R. W. Anwar, M. Bakhtiari, A. Zainal, A. H. Abdullah and K. N. Qureshi, "Security Issues and Attacks in Wireless Sensor Network," World Applied Sciences Journal, vol. 30, no. 10, pp. 1224-1227, 2014.
[63] T. H. Hadi, "MANET and WSN: WHAT MAKES THEM DIFFERENT?," IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), vol. 7, no. 6, pp. 23-28, Nov-Dec 2017.
[64] M. L. Messai, "Classification of attacks in wireless sensor networks," in International Congress on Telecommunication and Application 2014 arXiv preprint arXiv:1406.4516, 2014.