[1] S. V. Vajdi, A. R. Hilal, S. A. Abeer, and O. A. Basir, "Multi-hop Interference-Aware Routing Protocol for Wireless Sensor Networks," Procedia Computer Science, vol. 10, pp. 933-938, 2012.
[2] J. Lopez, R. Roman, I. Agudo, and C. Fernandez-Gago, "Trust management systems for wireless sensor networks: Best practices," Computer Communications, vol. 33, pp. 1086-1093, 2010.
[3] M. Azharuddin, P. Kuila, and P. K. Jana, "Energy efficient fault tolerant clustering and routing algorithms for wireless sensor networks," Computers & Electrical Engineering.
[4] I. Banerjee, P. Chanak, H. Rahaman, and T. Samanta, "Effective fault detection and routing scheme for wireless sensor networks," Computers & Electrical Engineering, vol. 40, pp. 291-306, 2014.
[5] J. Lee, K. Kapitanova, and S. H. Son, "The price of security in wireless sensor networks," Computer Networks, vol. 54, pp. 2967-2978, 2010.
[6] L. B. Oliveira, A. Ferreira, M. A. Vilaça, H. C. Wong, M. Bern, R. Dahab, et al., "SecLEACH—On the security of clustered sensor networks," Signal Processing, vol. 87, pp. 2882-2895, 2007.
[7] J. Yick, B. Mukherjee, and D. Ghosal, "Wireless sensor network survey," Computer Networks, vol. 52, pp. 2292-2330, 2008.
[8] A. A. Cardenas, T. Roosta, and S. Sastry, "Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems," Ad Hoc Networks, vol. 7, pp. 1434-1447, 2009.
[9] Y. Yu, K. Li, W. Zhou, and P. Li, "Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures," Journal of Network and Computer Applications, vol. 35, pp. 867-880, 2012.
[10] Z. Yao, D. Kim, and Y. Doh, "PLUS: Parameterized and localized trust management scheme for sensor networks security," in Mobile Adhoc and Sensor Systems (MASS), 2006 IEEE International Conference on, 2006, pp. 437-446.
[11] J. Duan, D. Gao, C. H. Foh, and H. Zhang, "TC-BAC: A trust and centrality degree based access control model in wireless sensor networks," Ad Hoc Networks, vol. 11, pp. 2675-2692, 2013.
[12] G. Sharma, S. Bala, and A. K. Verma, "Security Frameworks for Wireless Sensor Networks-Review," Procedia Technology, vol. 6, pp. 978-987, 2012.
[13] A. Boukerch, L. Xu, and K. El-Khatib, "Trust-based security for wireless ad hoc and sensor networks," Computer Communications, vol. 30, pp. 2413-2427, 2007.
[14] H. Xia, Z. Jia, X. Li, L. Ju, and E. H.-M. Sha, "Trust prediction and trust-based source routing in mobile ad hoc networks," Ad Hoc Networks, vol. 11, pp. 2096-2114, 2013.
[15] G. Han, J. Jiang, L. Shu, J. Niu, and H.-C. Chao, "Management and applications of trust in Wireless Sensor Networks: A survey," Journal of Computer and System Sciences, vol. 80, pp. 602-617, 2014.
[16] S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," ACM Transactions on Sensor Networks (TOSN), vol. 4, p. 15, 2008.
[17] R. Mitchell and I.-R. Chen, "A survey of intrusion detection in wireless network applications," Computer Communications, vol. 42, pp. 1-23, 2014.
[18] T. K. Kim and H. S. Seo, "A trust model using fuzzy logic in wireless sensor network," World academy of science, engineering and technology, vol. 42, pp. 63-66, 2008.
[19] R. A. Shaikh, H. Jameel, B. J. d'Auriol, H. Lee, S. Lee, and Y.-J. Song, "Group-based trust management scheme for clustered wireless sensor networks," Parallel and Distributed Systems, IEEE Transactions on, vol. 20, pp. 1698-1712, 2009.
[20] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks," in System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on, 2000, p. 10 pp. vol. 2.
[21] X. Anita, M. Bhagyaveni, and J. M. L. Manickam, "Collaborative Lightweight Trust Management Scheme for Wireless Sensor Networks," Wireless Personal Communications, pp. 1-24, 2014.
[22] Y.-C. Hu, A. Perrig, and D. B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, 2003, pp. 1976-1986.
[23] Y.-C. Hu, A. Perrig, and D. B. Johnson, "Wormhole attacks in wireless networks," Selected Areas in Communications, IEEE Journal on, vol. 24, pp. 370-380, 2006.
[24] E.-H. Ngai, J. Liu, and M. R. Lyu, "On the intruder detection for sinkhole attack in wireless sensor networks," in Communications, 2006. ICC'06. IEEE International Conference on, 2006, pp. 3383-3389.
[25] K. Fall and K. Varadhan, "The ns Manual (formerly ns Notes and Documentation)," The VINT project, vol. 47, 2005.
[26] M. U. s. Guide, "The mathworks," Inc., Natick, MA, vol. 5, 1998.
[27] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, pp. 393-422, 2002.
[28] A. Wood and J. A. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, pp. 54-62, 2002.
[29] J. Zhao and R. Govindan, "Understanding packet delivery performance in dense wireless sensor networks," in Proceedings of the 1st international conference on Embedded networked sensor systems, 2003, pp. 1-13.
[30] Ghaffari, Ali. "Congestion control mechanisms in wireless sensor networks: A survey." Journal of network and computer applications 52 (2015): 101-115.
[31] Ghaffari, Ali. "Real-time routing algorithm for mobile ad hoc networks using reinforcement learning and heuristic algorithms." Wireless Networks 23, no. 3 (2017): 703-714.
[32] Masoudi, Rahim, and Ali Ghaffari. "Software defined networks: A survey." Journal of Network and Computer Applications 67 (2016): 1-25.
[33] Nikokheslat, Hossein Dabbagh, and Ali Ghaffari. "Protocol for Controlling Congestion in Wireless Sensor Networks." Wireless Personal Communications: 1-19.
[34] Ghebleh, Reza, and Ali Ghaffari. "A Multi-criteria Method for Resource Discovery in Distributed Systems Using Deductive Fuzzy System." International Journal of Fuzzy Systems: 1-11.
[35] KeyKhosravi, Davood, Ali Ghaffari, Ali Hosseinalipour, and Batool Abadi Khasragi. "New Clustering Protocol to Decrease Probability Failure Nodes and Increasing the Lifetime in WSNs." Int. J. Adv. Comp. Techn. 2, no. 2 (2010): 117-121.
[36] Azari, Leila, and Ali Ghaffari. "Proposing a novel method based on network-coding for optimizing error recovery in wireless sensor networks." Indian Journal of Science and Technology 8, no. 9 (2015): 859-867.