References:
[1]
B. Choi, E. Cho, J. Kim, C. Hong, and J. Kim, “A Sinkhole Attack Detection Mechanism for LQI based Mesh Routing in WSN”, Information Networking, ICOIN International Conference on, pp.1-5, Jan 2009.
[2]
V. Katiyar, N. Chand, and S. Soni, “Clustering Algorithms for Heterogeneous Wireless Sensor Network: A Survey”, International Journal of Advanced Networking and Applications, Vol.2, No.4, pp.745–754, 2011.
[3]
J. Kim and T. Cho, “Routing Path Generation for Reliable Transmission in Sensor Networks Using GA with Fuzzy Logic Based Fitness Function”, Lecture Notes in Computer Science, Vol.4707, pp.637-648, 2007.
[4]
B. Choi, E. Cho, J. Kim, C. Hong, and J. Kim, “A Sinkhole Attack Detection Mechanism for LQI based Mesh Routing in WSN”, Information Networking, ICOIN International Conference on, pp.1-5, Jan 2009.
[5]
H. Deng, X. Sun, B.Wang, and Y. Cao, “Selective Forwarding Attack Detection using Watermark in WSNs”, CCCM 2009. ISECS International Colloquium on, pp.109-113, 2009.
[6]
G. Acs, and L. Buttyan, “Dessiging a Secure Label-Switching Routing Protocol for Wireless Sensor Networks”, Telecommunications Budapest University of Technology and Economics, Hungary, Dec.22, 2008.
[7]
A. Modirkhazen, N. Ethnic, and O. Ibrahim, “Empirical Study on Secure Routing Protocols in Wireless Sensor Networks”, International Journal of Advancements in Computing Technology, Vol.2, No.5, Dec 2010.
[8]
Y. Li, S. Chen, C. Song, Z. Wang, and Y. Dun, “Enhancing Teal-Time Delivery in Wireless Sensor Networks with Two-Hop Information”, IEEE Trans. On Industrial Informatics, Vol.5, No.2, 2009.
[9]
I. Dtojmenovic, “Handbook of Sensor Network: Algorithms and Architectures”, New York: Wiley, 2005.
[10]
J. Hill, R. Szewczyk, A. Woo, S .Hollar, D. Culler, and K. Pister, “System architecture directions for networked sensors”, ACM Sigplan Notices, Vol.35, pp.93-104, 2000.
[11]
I. F. Akyldiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless Sensor Networks: A Survey”, Computer Networks, Vol.38, pp.393-422, 2002.
[12]
R. Khanna, H. Liu, and H. Chen, “Self-Organisation of Sensor Networks Using Genetic Algorithms”, Int. J. Senor Network, Vol.1, NOS. ¾, 2006.
[13]
G. Wenliang, S. Huichang, Y. Jun and Z. Yifei, “Application of Genetic Algorithm in Energy Efficient Routing”, China-Japan Joint Microwave Conference, pp.737-740, 2009.
[14]
L. Guo, and Q. Tang, “An Improved Routing Protocol in WSN with Hybrid Genetic Algorithm”, Second International Conference on Network Security Wireless Communications and Trusted Computing (NSWCTC), Vol.2, pp.289-292, 2010.
[15]
C. Sun, and T.Cho, “Path Selection Method for Reliable Data Transmission in Sensor Networks Using GA”, IJCSNS International Journal of Computer Science and Network Security, Vol.11 No.2, Feb., 2011.
[16]
J. M. Kim and T. H. Cho, “Routing Path Generation for Reliable Transmission in Sensor Networks Using GA with Fuzzy Logic Based Fitness Function”, Lecture Notes in Computer Science, Vol.4707, pp.637-648, 2007.
[17]
Al-Ghazal, M. Sayed, and A. Kelash, “Routing Optimization Using Genetic Algorithm in Ad Hoc Networks”, The IEEE Symposium on Signal Processing and Information Technology (ISSPIT) Cairo, 2007.
[18]
L. Guo, and Q. Tang, “An Improved Routing Protocol in WSN with Hybrid Genetic Algorithm”, Second International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC), Vol.2, pp.289-292, 2010