N. Science and Applications (IJACSA), vol. 6, no. 9,

N. Marriwala and P. Rathee,
“An approach to increase the wireless sensor network lifetime,”
in Proceedings of the World Congress on Information and Communication
Technologies (WICT ’12), pp. 495–499, IEEE, Trivandrum, India, October-November


M. A.
Rassam, M. A. Maarof, and A. Zainal, “A survey of intrusion detection schemes
in wireless sensor networks,” American Journal of Applied Sciences, vol.
9, no. 10, pp. 1636–1652, 2012.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now


S. D. Morgera, and R. Sankar, “A survey of intrusion detection systems in
wireless sensor networks,” IEEE Communications Surveys & Tutorials,
vol. 16, no. 1, pp. 266–282, 2014.


Farooq, I. Zahoor, S. Mandal, and T. Gulzar, “Systematic analysis of DoS
attacks in wireless sensor networks with wormhole injection,” International
Journal of Information and Computation Technology, vol. 4, no. 2, pp. 173–182,


and G. R. Umapathi, “A comparative study on advances in LEACH Routing protocol
for wireless sensor networks: a survey,” International Journal of Advanced
Research in Computer and Communication Engineering, vol. 3, no. 2, pp.
5883–5890, 2014.


Y. M.
Miao, “Cluster-head election algorithm for wireless sensor networks based on
LEACH protocol,” Applied Mechanics and Materials, vol. 738-739, pp. 19–22,


Taneja, “An energy efficient approach using load distribution through
LEACH-TLCH protocol,” Journal of Network Communications and Emerging
Technologies (JNCET), vol. 5, no. 3, pp. 20–23, 2015.


Peng, T. Wang, and C. P. Low, “Energy neutral clustering for energy harvesting
wireless sensors networks,” Ad Hoc Networks, vol. 28, pp. 1–16, 2015.


T. Ganediwal, and A. Kunte, “Intrusion detection system in wireless sensor
networks: a review,” International Journal of Advanced Computer Science
and Applications, vol. 6, no. 12, pp. 131–139, 2015.


Y. El Mourabit, A. Bouirden, A. Toumanari,
and N. E. Moussaid, “Intrusion detection techniques in wireless sensor network
using data mining algorithms: comparative evaluation based on attacks
detection,” International Journal of Advanced Computer Science and
Applications (IJACSA), vol. 6, no. 9, pp. 164–172, 2015.