“…Many corrective measures were introduced to mitigate the inherent weaknesses of the discussed systems. Hempstead, Tripathi, Mauro, Wei, and Brooks (), Sinha and Chandrakasan (), Onibonoje (), and Ottman, Hofmann, and Lesieutre () had reported the use of power management techniques, while Ye, Heidemann, and Estrin () and Ali, Al Bulushi, Nadir, and Hussain () reported the use of medium access control protocols. Heinzelman, Kulik, and Balakrishnan (), Zhang and Arora (), Di Pietro, Mancini, and Jajodia (), Cheng, Gao, Zhang, and Yang (), and Di Pietro, Ma, Soriente, and Tsudik () also discussed the use of routing (self‐healing) protocols to mitigate the problems.…”