[1] Muthukumaran, K. Chitra, and C. Selvakumar, "An energy efficient clustering scheme using multilevel routing for wireless sensor network," Computers & Electrical Engineering, vol. 69, pp. 642-652, July 2018 .
[2] E. Ganesh, "Analysis of wireless sensor networks through secure routing protocols using directed diffusion methods," International Journal of Wireless Network Security, vol. 7, no. 1, pp. 28-35, Aug. 2022.
[3] Shafiei, A. Khonsari, H. Derakhshi, and P. Mousavi, "Detection and mitigation of sinkhole attacks in wireless sensor networks," Journal of computer and system sciences, vol. 80, no. 3, pp. 644-653, May 2014.
[4] Sinde, F. Begum, K. Njau, and S. Kaijage, "Refining network lifetime of wireless sensor network using energy-efficient clustering and DRL-based sleep scheduling," Sensors, vol. 20, no. 5, p. 1540, Aug. 2020.
[5] Masaeli, H. Haj Seyyed Javadi, and S.H. Erfani, "Survey of Effective of Combinatorial Design Schemes in Wireless Sensor Networks Security," Journal of Communication Engineering, vol. 9, no. 2, pp. 271-282, Apr. 2020.
[6] Yi, W. Fang, W. Zhang, W. Gao, and B. Li, "Game-based trust in complex networks: Past, Present, and Future," Complexity, vol. 2021, pp. 1-7, Aug. 2021.
[7] Khan and K. Singh, "DTMS: A Dual Trust-based Multi-level Sybil Attack Detection Approach in WSNs," DOI:10.21203/rs.3.rs-2566539/v1, March 2023.
[8] Sadeghizadeh and O.R. Marouzi, "Securing cluster-heads in wireless sensor networks by a hybrid intrusion detection system based on data mining," Journal of Communication Engineering, vol. 8, 1, pp. 1-19, Mar. 2019.
[9] Wu, Y. Zhao, M. Riguidel, G. Wang, and P. Yi, "Security and trust management in opportunistic networks: a survey," Security and Communication Networks, vol. 8, no. 9, pp. 1812-1827, June 2015.
[10] R. Douceur, "The Sybil attack," First international workshop on peer-to-peer systems (IPTPS ‘02)., pp. 251-260, 2002.
[11] Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, Sept. 2003.
[12] Chen, G. Yang, S. Chen, "A security routing mechanism against sybil attack for wireless sensor networks," In 2010 International Conference on Communications and Mobile Computing,, pp. 142-146, April 2010,
[13] F. Ssu, W.T. Wang, and W.C. Chang, "Detecting Sybil attacks in Wireless Sensor Networks using neighboring information. " Computer Networks, vol. 53, no. 18, pp. 3042-3056, Aug. 2009.
[14] Misra and S. Myneni, "On identifying power control performing sybil nodes in wireless sensor networks using RSSI," In 2010 IEEE Global Telecommunications Conference GLOBECOM 2, pp. 1-5, Dec. 2010.
[15] Li, P. Mittal, M. Caesar, and N. Borisov, "Sybil control: Practical Sybil defense with computational puzzles," In Seventh ACM workshop on Scalable trusted computing, p. 67–68, July2012 .
[16] R. Almas, K. Faez, F. Eshghi, and M. Kelarestaghi, "A new lightweight watchdog-based algorithm for detecting Sybil nodes in mobile WSNs," Future Internet, vol. 10, no.1, p. 1–17, 2017.
[17] S.R.K. Dhamodharan and R. Vayanaperumal, "Detecting and preventing Sybil attacks in wireless sensor networks using message authentication and passing method," The Scientifc World Journal, vol.2015, Article ID 841267, May 2015.
[18] Sinha, A. Paul, and S. Pal, "Use of spline curve in Sybil attack detection based on received signal power-new approach," International Journal on Recent Trends in Engineering & Technology, vol. 11, no. 1, p. 602, Apr. 2014.
[19] Rafeh and M. Khodadadi, "Detecting Sybil nodes in wireless sensor networks using twohop messages," Indian Journal of Science and Technology, vol. 7, no.9, pp. 1359–1368, Aug. 2014.
[20] Jamshidi, M. Ranjbari, M. Esnaashari, N.N. Qader, and M.R. Meybodi, "Sybil node detection in mobile wireless sensor networks using observer nodes," International Journal on Informatics Visualization, vol. 2, no. 3, pp. 159–165, June 2018.
[21] Jamshidi, E. Zangeneh, M. Esnaashari, and M.R. Meybodi, "A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks.," Computers & Electrical Engineering, vol. 64, p. 220–232, Mar. 2017.
[22] Han, J. Jiang, L. Shu, J. Niu, and H.C. Chao, "Management and applications of trust in Wireless Sensor Networks: A survey," Journal of Computer and System Sciences, vol. 80, no. 3, pp. 602-617, Apr. 2014.
[23] M. Jamshidi, E. Zangeneh, M. Esnaashari, A.M. Darwesh, and M.R. Meybodi, "A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it," Wireless Personal Communications, vol. 105, pp. 145-17, May 2019.