2- Yetgin, K. T. K. Cheung, M. El-Hajjar, L. H. Hanzo, “A survey of network life- time maximization techniques in wireless sensor networks,” IEEE Commun. Surv. Tutor, vol. 19, no. 2, pp. 828–854, Second quarter 2017.
4- Abuelkhail, U. Baroudi, M. Raad, and T. Sheltami, “Internet of things for healthcare monitoring applications based on RFID clustering scheme,” Wireless Networks, vol. 27, pp.747-763, 2021.
5- Landaluce, L. Arjona, A. Peraiios, F. Falcone, I. Angulo, and F. Muralter, “A Review of IOT sensing Applications and challenges using RFID and wireless sensor networks,” Sensors, vol. 20, no. 9, Apr. 2020.
6- W. Nagpukar and S. K. Jaiawal, “An Overliew of WSN and RFID Network Integration,” 2nd International Conference on Electronics and Communication Systems (ICECS), 2015.
7- Alfian, J. Rhee, H. Ahm, J. lee, and U. Farooq, “Integration of RFID, wireless sensor network, and data mining in an e-pedigree food traceability system,” Journal of Food Engineering, vol. 212, pp. 65-75, Nov. 2017.
8- Zhao, “A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem,” Journal of Medical Systems, vol. 38, no. 5, pp. 1–7, 2014.
9- Jin, C. Xu, X. Zhang, and J. Zhao, “A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography,” Journal of Medical Systems, vol. 39, no. 3, pp. 1–8, 2015.
10- Piramuthu and W. Zhau, RFID and Sensor Network Automation in the Food Industry: Ensuring Quality and Safety through Supply Chain Visibility, ch. 2, pp. 17-50, Jan. 2016.
11- Zhang, and Q. Qi, “An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryp- tography,” Journal of Medical Systems, vol. 38, no. 5, pp. 1–7, 2014.
12- Kochar, R. Chhillar, “An Effective Data Warehousing System for RFID Using Novel Data Cleaning, Data Transformation and Loading Techniques,” The Intern. Arab Journal of Information Technology, vol. 9, no. 3, May 2012.
13- Kapoor, S. Piramuthu, “Single RFID tag ownership transfer protocols,” IEEE Trans. Systems man Cybernetics Part C, vol. 42, no. 2, pp.167-173, 2012.
14- K. Bashir and S. J. Lim, ”Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks,” Sensor Journal, vol. 11, pp. 7004-7021, July 2011.
15- E. Sarma, Towards the five- cent tag. Technical report MIT.AUTOID- WH-006, MIT Auto-ID Center: New NY , USA 2001. Available online: http://www.autoidcenter. Org/research/MIT-AUTOID-WH-006-pdf(accessed on ganuary) , 2009.
16- Choi and M.S. Park, “In-network Phased Filtering Mechanism for a Large-Scale RFID Inventory Application,” In Proceedings of the 4th Intern. Conf. on IT & Applications (ICITA), Harbin, China, pp. 401-405, Jan. 2007.
17- S. Kim and A. Kashif, ” Energy Effcient In-Network Phase RFID Data filtering scheme,” 5th Intern. Conf. on Ubiquitous Intelligence and Computing UIC, pp.311-322, June 2008.
18- Sundaresan, R. Doss, S. Piramuthu, and W. L. Zhou, ” A robust grouping proof protocol for RFID EPC C1G2 tags,” IEEE Trans. Information Forensics and Security , vol. 9, no. 6, pp. 961-975, June 2014.
19- Wang and L.D. Xu, ”Data cleaning for RFID and WSN Integration,” IEEE Trans. Industrial Informatics., vol. 10, No. 1, pp. 408-418 Feb. 2014.
20- Zhang/RFID and Sensor Networks, AU7777_c018, May 2009, ch 18, pp.511-535. Available on internet.
21- Sundaresan, R. Doss, S. Piramuthu, and W. Zhou, ”Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner privacy,” Computer Communications, vol. 55, pp.112-124, Jan. 2015.
22- M. Aung, Y.S. Chang and J. Won, “Emerging RFID /USN Application and Challenge,” In Intern. Journal of RFID Security and Cryptography (LJRFIDSC), vol. 1, March-June 2012
23- Wang, Y. Ji, and B. Zhao, “ An approximate duplicate- elimination in RFID data streams based on d-left time bloom filter,” in Web Technologies and Applications, vol. 8709, pp. 413–424, Sept. 2014.
24- kuila and K. Jana, “Energy efficient clustering and routing algorithms for wireless sensor networks: particle swarm optimization approach,” Eng. Appl. Artificial Intelligence, vol. 33, pp.127-140 , Aug. 2014.