<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232018000600524</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Lifetime enhancement in wireless sensor networks using binary search tree based data aggregation]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Gopikrishnan]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Priakanth]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Karpagam College of Engineering Department of Information Technology ]]></institution>
<addr-line><![CDATA[Coimbatore ]]></addr-line>
<country>India</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Kongu Engineering College Department of Computer Technology ]]></institution>
<addr-line><![CDATA[Erode ]]></addr-line>
<country>India</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2018</year>
</pub-date>
<volume>16</volume>
<numero>6</numero>
<fpage>524</fpage>
<lpage>543</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232018000600524&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232018000600524&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232018000600524&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Energy efficient data aggregation is a key solution to enhance the lifetime of wireless sensor networks since sensor nodes are battery-powered and deployed in remote environments. This article explore a two-hop data aggregation tree construction algorithm using binary search tree to reduce the total energy consumption of sensor nodes in wireless sensor networks. An adaptive and hybrid routing algorithm for simultaneous data aggregation and exploit the data correlation between nodes using the two-hop data aggregation tree framework is proposed. Routes are chosen based on the shortest response time for the broadcasting request to minimize the total energy expended by the network. This paper also proposes a high secure asymmetric key cryptography algorithm to provide the secure data communication among the network. The data aggregation function that is used in the proposed routing algorithm enhances the lifetime of sensor network by resolving the delay, collision and security issues. Simulations results show that the binary tree based data aggregation can appreciably reduces the total energy consumption and resolves the maximum data aggregation issues in wireless sensor network.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Energy Efficiency]]></kwd>
<kwd lng="en"><![CDATA[Data Aggregation]]></kwd>
<kwd lng="en"><![CDATA[Delay]]></kwd>
<kwd lng="en"><![CDATA[Collision]]></kwd>
<kwd lng="en"><![CDATA[Security]]></kwd>
<kwd lng="en"><![CDATA[Wireless Sensor Network]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alshahrany]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Abbod]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Alshahrani]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Alshahrani]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Intelligent networks data fusion web-based services for ad-hoc integrated WSNs-RFID]]></article-title>
<source><![CDATA[International Journal of Engineering and Technology Innovation]]></source>
<year>2016</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>01-15</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boudia]]></surname>
<given-names><![CDATA[O. R. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Senouci]]></surname>
<given-names><![CDATA[S. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Feham]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography]]></article-title>
<source><![CDATA[Ad Hoc Networks]]></source>
<year>2015</year>
<volume>32</volume>
<page-range>98-113</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cai]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hara]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Shu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[GA-MIP: genetic algorithm based multiple mobile agents itinerary planning in wireless sensor networks]]></source>
<year>2010</year>
<conf-name><![CDATA[ Wireless Internet Conference (WICON), 2010 The 5th Annual ICST]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-8</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chakchouk]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey on opportunistic routing in wireless communication networks]]></article-title>
<source><![CDATA[IEEE Communications Surveys &amp; Tutorials]]></source>
<year>2015</year>
<volume>17</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>2214-41</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chao]]></surname>
<given-names><![CDATA[C. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hsiao]]></surname>
<given-names><![CDATA[T. Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Design of structure-free and energy-balanced data aggregation in wireless sensor networks]]></article-title>
<source><![CDATA[Journal of Network and Computer Applications]]></source>
<year>2014</year>
<volume>37</volume>
<page-range>229-39</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Cai]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Gonzalez]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Leung]]></surname>
<given-names><![CDATA[V. C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Balanced itinerary planning for multiple mobile agents in wireless sensor networks]]></source>
<year>2010</year>
<conf-name><![CDATA[ International Conference on Ad Hoc Networks]]></conf-name>
<conf-loc> </conf-loc>
<page-range>416-28</page-range><publisher-loc><![CDATA[Berlin, Heidelberg ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gonzalez]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Leung]]></surname>
<given-names><![CDATA[V. C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Multi-agent itinerary planning for wireless sensor networks]]></source>
<year>2009</year>
<conf-name><![CDATA[ International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness]]></conf-name>
<conf-loc> </conf-loc>
<page-range>584-97</page-range><publisher-loc><![CDATA[Berlin, Heidelberg ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kwon]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Yuan]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Choi]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Leung]]></surname>
<given-names><![CDATA[V. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mobile agent-based directed diffusion in wireless sensor networks]]></article-title>
<source><![CDATA[EURASIP Journal on Advances in Signal Processing]]></source>
<year>2007</year>
<volume>2007</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Conan]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Leguay]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Friedman]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fixed point opportunistic routing in delay tolerant networks]]></article-title>
<source><![CDATA[IEEE Journal on Selected Areas in Communications]]></source>
<year>2008</year>
<volume>26</volume>
<numero>5</numero>
<issue>5</issue>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ghosh]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Incel]]></surname>
<given-names><![CDATA[O. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[V. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Krishnamachari]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Multi-channel scheduling algorithms for fast aggregated convergecast in sensor networks]]></source>
<year>2009</year>
<conf-name><![CDATA[ Mobile Adhoc and Sensor Systems, 2009. MASS'09. IEEE 6th International Conference on]]></conf-name>
<conf-loc> </conf-loc>
<page-range>363-72</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gopikrishnan]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Priakanth]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[HSDA: hybrid communication for secure data aggregation in wireless sensor network]]></article-title>
<source><![CDATA[Wireless Networks]]></source>
<year>2016</year>
<volume>22</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1061-78</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[G. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Misra]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Garg]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Multiple mobile agents based data dissemination protocol for wireless sensor networks]]></source>
<year>2012</year>
<conf-name><![CDATA[ International Conference on Computer Science and Information Technology]]></conf-name>
<conf-loc> </conf-loc>
<page-range>334-45</page-range><publisher-loc><![CDATA[Berlin, Heidelberg ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Han]]></surname>
<given-names><![CDATA[M. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhartia]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Qiu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Rozner]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[O3: Optimized overlay-based opportunistic routing]]></source>
<year>2011</year>
<conf-name><![CDATA[ twelfthACM international symposium on mobile ad hoc networking and computing]]></conf-name>
<conf-loc> </conf-loc>
<page-range>2</page-range><publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ho]]></surname>
<given-names><![CDATA[J. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Wright]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Das]]></surname>
<given-names><![CDATA[S. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[ZoneTrust: Fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing]]></article-title>
<source><![CDATA[IEEE Transactions on Dependable and Secure Computing]]></source>
<year>2012</year>
<volume>9</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>494-511</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Intanagonwiwat]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Govindan]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Estrin]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Directed diffusion: A scalable and robust communication paradigm for sensor networks]]></source>
<year>2000</year>
<conf-name><![CDATA[ 6thannual international conference on Mobile computing and networking]]></conf-name>
<conf-loc> </conf-loc>
<page-range>56-67</page-range><publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Joo]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Choi]]></surname>
<given-names><![CDATA[J. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Shroff]]></surname>
<given-names><![CDATA[N. B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Delay performance of scheduling with data aggregation in wireless sensor networks]]></article-title>
<source><![CDATA[INFOCOM, 2010 Proceedings IEEE]]></source>
<year>2010</year>
<page-range>1-9</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Karaboga]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Okdem]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Ozturk]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cluster based wireless sensor network routing using artificial bee colony algorithm]]></article-title>
<source><![CDATA[Wireless Networks]]></source>
<year>2012</year>
<volume>18</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>847-60</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Konstantopoulos]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Mpitziopoulos]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gavalas]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Pantziou]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Effective determination of mobile agent itineraries for data aggregation on sensor networks]]></article-title>
<source><![CDATA[IEEE Transactions on Knowledge and Data Engineering]]></source>
<year>2010</year>
<volume>22</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>1679-93</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Guo]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Prasad]]></surname>
<given-names><![CDATA[S. K.]]></given-names>
</name>
</person-group>
<source><![CDATA[An energy-efficient distributed algorithm for minimum-latency aggregation scheduling in wireless sensor networks]]></source>
<year>2010</year>
<conf-name><![CDATA[ Distributed Computing Systems (ICDCS), 2010 IEEE 30th International Conference on]]></conf-name>
<conf-loc> </conf-loc>
<page-range>827-36</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[On multicopy opportunistic forwarding protocols in nondeterministic delay tolerant networks]]></article-title>
<source><![CDATA[IEEE Transactions on Parallel and Distributed Systems]]></source>
<year>2012</year>
<volume>23</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1121-8</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mao]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Tang]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[X. Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Ma]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Energy-efficient opportunistic routing in wireless sensor networks]]></article-title>
<source><![CDATA[IEEE Transactions on Parallel and Distributed Systems]]></source>
<year>2011</year>
<volume>22</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>1934-42</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mpitziopoulos]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gavalas]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Konstantopoulos]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Pantziou]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Deriving efficient mobile agent routes in wireless sensor networks with NOID algorithm]]></source>
<year>2007</year>
<conf-name><![CDATA[ Personal, Indoor and Mobile Radio Communications, 2007. PIMRC 2007. IEEE 18th International Symposium on]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-5</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rezvani]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ignjatovic]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Bertino]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Jha]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks]]></article-title>
<source><![CDATA[IEEE Transactions on Dependable and Secure Computing]]></source>
<year>2015</year>
<volume>12</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>98-110</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rozner]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Seshadri]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Mehta]]></surname>
<given-names><![CDATA[Y. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Qiu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks]]></article-title>
<source><![CDATA[IEEE transactions on Mobile computing]]></source>
<year>2009</year>
<volume>8</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>1622</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shakshuki]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Malik]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Denko]]></surname>
<given-names><![CDATA[M. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Software agent-based directed diffusion in wireless sensor network]]></article-title>
<source><![CDATA[Telecommunication Systems]]></source>
<year>2008</year>
<volume>38</volume>
<numero>3-4</numero>
<issue>3-4</issue>
<page-range>161-74</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sudarsono]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Huda]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Fahmi]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Al-Rasyid]]></surname>
<given-names><![CDATA[M. U. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Kristalina]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Secure data exchange in environmental health monitoring system through wireless sensor network]]></article-title>
<source><![CDATA[International Journal of Engineering and Technology Innovation]]></source>
<year>2016</year>
<volume>6</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>103-22</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Luo]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Das]]></surname>
<given-names><![CDATA[S. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks]]></article-title>
<source><![CDATA[IEEE Transactions on Dependable and Secure Computing]]></source>
<year>2012</year>
<volume>9</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>785-97</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kwon]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Chao]]></surname>
<given-names><![CDATA[H. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Multiple mobile agents' itinerary planning in wireless sensor networks: survey and evaluation]]></article-title>
<source><![CDATA[Iet Communications]]></source>
<year>2011</year>
<volume>5</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>1769-76</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[CORMAN: A novel cooperative opportunistic routing scheme in mobile ad hoc networks]]></article-title>
<source><![CDATA[IEEE Journal on Selected Areas in Communications]]></source>
<year>2012</year>
<volume>30</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>289-96</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Qi]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Dynamic mobile agent migration in Wireless Sensor Networks]]></article-title>
<source><![CDATA[International Journal of Ad Hoc and Ubiquitous Computing]]></source>
<year>2006</year>
<volume>2</volume>
<numero>1-2</numero>
<issue>1-2</issue>
<page-range>73-82</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Qi]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mobile agent migration modeling and design for target tracking in wireless sensor networks]]></article-title>
<source><![CDATA[Ad Hoc Networks]]></source>
<year>2008</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-16</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yao]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Cao]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Vasilakos]]></surname>
<given-names><![CDATA[A. V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for heterogeneous wireless sensor net-works]]></article-title>
<source><![CDATA[IEEE/ACM Transactions on Networking]]></source>
<year>2015</year>
<volume>23</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>810-23</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Minimum-time aggregation scheduling in multi-sink sensor networks]]></source>
<year>2011</year>
<conf-name><![CDATA[ Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2011 8th Annual IEEE Communications Society Conference on]]></conf-name>
<conf-loc> </conf-loc>
<page-range>422-30</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zeng]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Lou]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Location-aided opportunistic forwarding in multirate and multihop wireless networks]]></article-title>
<source><![CDATA[IEEE Transactions on Vehicular Technology]]></source>
<year>2009</year>
<volume>58</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>3032-40</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zeydan]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Kivanc]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Comaniciu]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Tureli]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Energy-efficient routing for correlated data in wireless sensor networks]]></article-title>
<source><![CDATA[Ad Hoc Networks]]></source>
<year>2012</year>
<volume>10</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>962-75</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
