References
- K. Wong, T. Wolf, S. Gorinsky, and J. Turner, "Teaching experiences with a virtual network laboratory," ACM SIGCSE Bulletin, vol. 39, no. 1, pp. 481-485, 2007. https://doi.org/10.1145/1227504.1227473
- T. H. Hai, E. N. Huh, and M. Jo, "A lightweight intrusion detection framework for wireless sensor networks," Wireless Communications and Mobile Computing, vol. 10, no. 4, pp. 559-572, 2010. https://doi.org/10.1002/wcm.785
- E. N. Huh and T. H. Hai, Lightweight Intrusion Detection for Wireless Sensor Networks. Rijeka, Croatia : INTECH Open Access Publisher, 2011.
- Omnet official site [Online], Available: http://www.omnetpp.org.
- Castalia official site [Online]. Available: https://castalia.forge.nicta.com.au/index.php/en/index.html.
- The Network Simulator (ns-2) [Online]. Available: http://www.isi.edu/nsnam/ns.
- OPNET official site [Online]. Available: http://www.riverbed.com/products/performance-management-control/opnet.html?redirect=opnet.
- Tcl SourceForge Project [Online]. Available: http://tcl.sourceforge.net/.
- D. Mechta, S. Harous, M. Djoudi, and A. Douar, "A collaborative learning environment for a biology practical work," in Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services (iiWAS2010), Paris, 2010, pp. 389-394.
- M. Chatterjee, S. K. Das, and D. Turgut, "WCA: a weighted clustering algorithm for mobile ad hoc networks," Cluster Computing, vol. 5, no. 2, pp. 193-204, 2002. https://doi.org/10.1023/A:1013941929408
- W. Choi and M. Woo, "A distributed weighted clustering algorithm for mobile ad hoc networks," in Proceedings of Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT-ICIW'06), Guadeloupe, French Caribbean, 2006, pp. 73-73.
- A. Zabian, A. Ibrahim, and F. Al-Kalani, "Dynamic head cluster election algorithm for clustered Ad-Hoc networks," Journal of Computer Science, vol. 4, no. 1, pp. 42-50, 2008. https://doi.org/10.3844/jcssp.2008.42.50
- M. Chawla, J. Singhai, and J. L. Rana, "Clustering in mobile ad hoc networks: a review," International Journal of Computer Science and Information Security, vol. 8, no. 2, pp. 293-301, 2010.
- S. Mehta, P. Sharma, and K. Kotecha, "A survey on various cluster head election algorithms for MANET," in Proceedings of 2011 Nirma University International Conference on Engineering (NUiCONE), Ahmedabad, India, 2011, pp. 1-6.
- H. Kim, "An efficient clustering scheme for data aggregation considering mobility in mobile wireless sensor networks," International Journal of Control and Automation, vol. 6, no. 1, pp. 221-234, 2013.
- M. Chatterjee, S. K. Das, and D. Turgut, "A weight based distributed clustering algorithm for mobile ad hoc networks," in Proceedings of the 7th International Conference on High Performance Computing (HiPC2000), Bangalore, India, 2000, pp. 511-521.
- R. Agarwal, R. Gupta, and M. Motwani, "Review of weighted clustering algorithms for mobile ad hoc networks," Computer Science & Telecommunications, vol. 33, no. 1, pp. 71-78, 2012.
- A. A. Abbasi and M. Younis, "A survey on clustering algorithms for wireless sensor networks," Computer Communications, vol. 30, no. 14, pp. 2826-2841, 2007. https://doi.org/10.1016/j.comcom.2007.05.024
- K. A. Darabkh, S. S. Ismail, M. Al-Shurman, I. F. Jafar, E. Alkhader, and M. F. Al-Mistarihi, "Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks," Journal of Network and Computer Applications, vol. 35, no. 6, pp. 2068-2080, 2012. https://doi.org/10.1016/j.jnca.2012.08.008
- V. Geetha, P. V. Kallapur, and S. Tellajeera, "Clustering in wireless sensor networks: performance comparison of LEACH & LEACH-C protocols using NS2," Procedia Technology, vol. 4, pp. 163-170, 2012. https://doi.org/10.1016/j.protcy.2012.05.024
- Y. Wang, X. Wu, J. Wang, W. Liu, and W. Zheng, "An OVSF code based routing protocol for clustered wireless sensor networks," International Journal of Future Generation Communication and Networking, vol. 5, no. 3, pp. 117-128, 2012.
- E. Ekici, Y. Gu, and D. Bozdag, "Mobility-based communication in wireless sensor networks," IEEE Communications Magazine, vol. 44, no. 7, pp. 56-62, 2006.
- J. Y. Yu and P. H. J. Chong, "A survey of clustering schemes for mobile ad hoc networks," IEEE Communications Surveys & Tutorials, vol. 7, no. 1, pp. 32-48, 2005. https://doi.org/10.1109/COMST.2005.1423333
- B. Sun, C. Gui, Y. Song, and C. Hu, "Stable clusterhead selection algorithm for ad hoc networks," International Journal of Future Generation Communication and Networking, vol. 6, no. 3, pp. 95-105, 2013.
- I. I. Er and W. K. G. Seah, "Mobility-based d-hop clustering algorithm for mobile ad hoc networks," in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), Atlanta, GA, 2004, pp. 2359-2364.
- T. Kavitha and D. Sridharan, "Security vulnerabilities in wireless sensor networks: a survey," Journal of Information Assurance and Security, vol. 5, no. 1, pp. 31-44, 2010.
- A. Dahane, N. Berrached, and B. Kechar, "Energy Efficient and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks," Procedia Computer Science, vol. 34, pp. 63-70, 2014. https://doi.org/10.1016/j.procs.2014.07.040
- A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002. https://doi.org/10.1023/A:1016598314198
- S. Ganeriwal and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," in Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Network (SASN2004), Washington, DC, 2004, pp. 66-77.
- I. Khalil, S. Bagchi, and N. B. Shroff, "LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks," in Proceedings of International Conference on Dependable Systems and Networks (DSN2005), Yokohama, Japan, 2005, pp. 612-621.
- S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom), Boston, MA, 2000, pp. 255-265.
- K. Benahmed, H. Haffaf, and M. Merabti, "Monitoring of wireless sensor networks," in Sustainable Wireless Sensor Networks, W. Seah and Y. K. Tan, Eds. Rijeka, Croatia: InTech, 2010.
- C. Hsin and M. Liu, "Self-monitoring of wireless sensor networks," Computer Communications, vol. 29, no. 4, pp. 462-476, 2006. https://doi.org/10.1016/j.comcom.2004.12.031
- Y. Yu and L. Zhang, "A secure clustering algorithm in mobile ad hoc networks," in Proceedings of 2012 IACSIT Hong Kong Conferences (IPCSIT vol. 29), 2012, pp. 73-77.
- X. Liu, "A survey on clustering routing protocols in wireless sensor networks," Sensors, vol. 12, no. 8, pp. 11113-11153, 2012. https://doi.org/10.3390/s120811113
- S. Taneja and A. Kush, "A Survey of routing protocols in mobile ad hoc networks," International Journal of Innovation, Management and Technology, vol. 1, no. 3, 279-285, 2010.
- C. E. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers," ACM SIGCOMM Computer Communication Review, vol. 24, no. 4, pp. 234-244, 1994. https://doi.org/10.1145/190809.190336
- A. P. R. da Silva, M. H. Martins, B. P. Rocha, A. A. Loureiro, L. B. Ruiz, and H. C. Wong, "Decentralized intrusion detection in wireless sensor networks," in Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, Montreal, Canada, 2005, pp. 16-23.
- M. S. Islam and S. A. Rahman, "Anomaly intrusion detection system in wireless sensor networks: security threats and existing approaches," International Journal of Advanced Science and Technology, vol. 36, no. 1, pp. 1-8, 2011.
- S. Marchesani, L. Pomante, M. Pugliese, and F. Santucci, "A middleware approach to provide security in IEEE 802.15. 4 wireless sensor networks," in Proceedings of International Conference on Mobile Wireless Middleware, Operating Systems and Applications (Mobilware), Bologna, Italy, 2013, pp. 85-93.
- H. Ghamgin, M. S. Akhgar, and M. T. Jafari, "Attacks in Wireless Sensor Network," Journal of Applied Sciences Research, vol. 7, no. 7, pp. 954-960, 2011.
- D. Martins and H. Guyennet, "Security in wireless sensor networks: a survey of attacks and countermeasures," International Journal of Space-Based and Situated Computing, vol. 1, no. 2, pp. 151-162, 2011. https://doi.org/10.1504/IJSSC.2011.040341
- C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2, pp. 293-315, 2003. https://doi.org/10.1016/S1570-8705(03)00008-8
- A. Sheth, C. Hartung, and R. Han, "A decentralized fault diagnosis system for wireless sensor networks," in Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, Washington, DC, 2005.
- I. Khalil, S. Bagchi, N. F. Shroff, "MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks," Ad Hoc Networks, vol. 6, no. 3, pp. 344-362, 2008. https://doi.org/10.1016/j.adhoc.2007.02.001
- S. Kaplantzis, A. Shilton, N. Mani, and Y. A. Sekercioglu, "Detecting selective forwarding attacks in wireless sensor networks using support vector machines," in Proceedings of 3rd International Conference on Intelligent Sensors, Sensor Networks and Information (ISSNIP2007), Melbourne, Australia, 2007, pp. 335-340). IEEE.
- S. A. Camtepe and B. Yener, "Key distribution mechanisms for wireless sensor networks: a survey," Rensselaer Polytechnic Institute, Troy, New York, Technical Report 05-07, 2005.
- P. Berwal, "Security in wireless sensor networks: issues and challenges," International Journal of Engineering and Innovative Technology, vol. 3, no. 5, pp.192-198, 2013.
- W. Stallings, Cryptography and Network Security: Principles and Practices, 5th ed. Harlow: Pearson Education, 2010.
- A. S. K. Pathan, H. W. Lee, and C. S. Hong, "Security in wireless sensor networks: issues and challenges," in Proceedings of the 8th International Conference Advanced Communication Technology (ICACT2006), Phoenix Park, Korea, 2006, pp. 1048-1054.
- R. A. Shaikh, H. Jameel, S. Lee, S. Rajput, and Y. J. Song, "Trust management problem in distributed wireless sensor networks," in Proceedings of 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, Sydneyt, 2006, pp. 411-414.
- A. H. Hussein, A. O. Abu Salem, and S. Yousef, "A flexible weighted clustering algorithm based on battery power for Mobile Ad hoc Networks," in Proceedings of IEEE International Symposium on Industrial Electronics (ISIE2008), Cambridge, UK, 2008, pp. 2102-2107.
- C. Li, Y. Wang, F. Huang, and D. Yang, "A novel enhanced weighted clustering algorithm for mobile networks," in Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing (WiCom'09), Beijing, China, 2009, pp. 1-4.
- S. Soro and W. B. Heinzelman, "Cluster head election techniques for coverage preservation in wireless sensor networks," Ad Hoc Networks, vol. 7, no. 5, pp. 955-972, 2009. https://doi.org/10.1016/j.adhoc.2008.08.006
- M. Lehsaini, H. Guyennet, and M. Feham, "An efficient cluster-based self-organisation algorithm for wireless sensor networks," International Journal of Sensor Networks, vol. 7, no. 1, pp. 85-94, 2010. https://doi.org/10.1504/IJSNET.2010.031852
- K. Benahmed, M. Merabti, and H. Haffaf, "Distributed monitoring for misbehaviour detection in wireless sensor networks," Security and Communication Networks, vol. 6, no. 4, pp. 388-400, 2013. https://doi.org/10.1002/sec.624