{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:25:08Z","timestamp":1742912708059,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031250873"},{"type":"electronic","value":"9783031250880"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25088-0_26","type":"book-chapter","created":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T14:06:45Z","timestamp":1676383605000},"page":"292-299","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Trust Aware Hybrid Key Management Scheme for WSN to Reduce the Energy Consumption in Comparison with TERP and LTB-AODV"],"prefix":"10.1007","author":[{"given":"Gorrolla Bhanu","family":"Prakash","sequence":"first","affiliation":[]},{"given":"C.","family":"Tamizhselvan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,15]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","unstructured":"Baskar, M., Renuka Devi, R., Ramkumar, J., Kalyanasundaram, P., Suchithra, M., Amutha, B.: Region centric minutiae propagation measure orient forgery detection with finger print analysis in health care systems. Neural Process. Lett. (2021). https:\/\/doi.org\/10.1007\/s11063-020-10407-4","DOI":"10.1007\/s11063-020-10407-4"},{"key":"26_CR2","doi-asserted-by":"publisher","unstructured":"Bhanu Teja, N., Devarajan, Y., Mishra, R., Sivasaravanan, S., Thanikaivel Murugan, D.: Detailed analysis on Sterculia foetida kernel oil as renewable fuel in compression ignition engine. Biomass Conv. Bioref. (2021). https:\/\/doi.org\/10.1007\/s13399-021-01328-w","DOI":"10.1007\/s13399-021-01328-w"},{"key":"26_CR3","doi-asserted-by":"publisher","unstructured":"Bhavikatti, S.K., et al.: Investigating the antioxidant and cytocompatibility of Mimusops Elengi Linn extract over human gingival fibroblast cells. Int. J. Environ. Res. Public Health 18(13) (2021). https:\/\/doi.org\/10.3390\/ijerph18137162","DOI":"10.3390\/ijerph18137162"},{"key":"26_CR4","doi-asserted-by":"publisher","unstructured":"Celaya-Echarri, M.: Radio wave propagation and WSN deployment in complex utility tunnel environments. Sensors 20(23) (2020). https:\/\/doi.org\/10.3390\/s20236710","DOI":"10.3390\/s20236710"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Dargie, W., Poellabauer, C.: Fundamentals of Wireless Sensor Networks: Theory and Practice. Wiley (2010)","DOI":"10.1002\/9780470666388"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Fagas, G., Gammaitoni, L., Gallagher, J.P., Paul, D.: ICT - Energy Concepts for Energy Efficiency and Sustainability. BoD \u2013 Books on Demand (2017)","DOI":"10.5772\/62522"},{"key":"26_CR7","doi-asserted-by":"publisher","unstructured":"Gandino, F., Montrucchio, B., Rebaudengo, M.: Random key pre-distribution with transitory master key for wireless sensor networks. In: Proceedings of the 5th International Student Workshop on Emerging Networking Experiments and Technologies - Co-Next Student Workshop 2009 (2009). https:\/\/doi.org\/10.1145\/1658997.1659012","DOI":"10.1145\/1658997.1659012"},{"key":"26_CR8","unstructured":"International Electrotechnical Commission: Internet of Things: Wireless Sensor Networks (2014)"},{"key":"26_CR9","doi-asserted-by":"publisher","unstructured":"Jagannathan, P., Gurumoorthy, S., Stateczny, A., Divakarachar, P.B., Sengupta, J.: Collision-aware routing using multi-objective seagull optimization algorithm for WSN-based IoT. Sensors 21(24) (2021). https:\/\/doi.org\/10.3390\/s21248496","DOI":"10.3390\/s21248496"},{"key":"26_CR10","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-981-16-0407-2_6","volume-title":"Computationally Intelligent Systems and their Applications","author":"A Paul","year":"2021","unstructured":"Paul, A., Sinha, S., Shaw, R.N., Ghosh, A.: A neuro-fuzzy based IDS for internet-integrated WSN. In: Bansal, J.C., Paprzycki, M., Bianchini, M., Das, S. (eds.) Computationally Intelligent Systems and their Applications. SCI, vol. 950, pp. 71\u201386. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-16-0407-2_6"},{"issue":"March","key":"26_CR11","doi-asserted-by":"publisher","first-page":"124678","DOI":"10.1016\/j.biortech.2021.124678","volume":"324","author":"G Karthigadevi","year":"2021","unstructured":"Karthigadevi, G., et al.: Chemico-nanotreatment methods for the removal of persistent organic pollutants and xenobiotics in water - a review. Biores. Technol. 324(March), 124678 (2021)","journal-title":"Biores. Technol."},{"key":"26_CR12","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-319-25210-0_19","volume-title":"Agents and Artificial Intelligence","author":"F LaPlante","year":"2015","unstructured":"LaPlante, F., Belacel, N., Kardouchi, M.: A heuristic automatic clustering method based on hierarchical clustering. In: Duval, B., van den Herik, J., Loiseau, S., Filipe, J. (eds.) ICAART 2014. LNCS (LNAI), vol. 8946, pp. 312\u2013328. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-25210-0_19"},{"key":"26_CR13","unstructured":"Ali, Q.I.: Simulation Framework of Wireless Sensor Network (WSN) Using MATLAB (2012)"},{"key":"26_CR14","doi-asserted-by":"publisher","unstructured":"Lin, I.-C., Huang, S.-Y.: A polynomial based key establishment scheme for heterogeneous sensor networks. In: 2009 Fifth International Conference on Information Assurance and Security (2009). https:\/\/doi.org\/10.1109\/ias.2009.264","DOI":"10.1109\/ias.2009.264"},{"key":"26_CR15","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-5736-4.ch001","author":"Y Maleh","year":"2018","unstructured":"Maleh, Y., Sahid, A., Ezzati, A., Belaissaoui, M.: Key management protocols for smart sensor networks. Secur. Priv. Smart Sens. Netw. (2018). https:\/\/doi.org\/10.4018\/978-1-5225-5736-4.ch001","journal-title":"Secur. Priv. Smart Sens. Netw."},{"key":"26_CR16","doi-asserted-by":"publisher","DOI":"10.1002\/9781119183426","volume-title":"SPSS Statistics for Data Analysis and Visualization","author":"K McCormick","year":"2017","unstructured":"McCormick, K., Salcedo, J., Peck, J., Wheeler, A.: SPSS Statistics for Data Analysis and Visualization. Wiley (2017)"},{"key":"26_CR17","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.4.5.370-377","author":"B Meng","year":"2009","unstructured":"Meng, B.: A secure internet voting protocol based on non-interactive deniable authentication protocol and proof protocol that two ciphertexts are encryption of the same plaintext. J. Netw. (2009). https:\/\/doi.org\/10.4304\/jnw.4.5.370-377","journal-title":"J. Netw."},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Mukherjee, P., Pattnaik, P.K., Panda, S.K.: IoT and WSN Applications for Modern Agricultural Advancements: Emerging Research and Opportunities: Emerging Research and Opportunities. IGI Global (2019)","DOI":"10.4018\/978-1-5225-9004-0"},{"key":"26_CR19","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-981-16-7498-3_2","volume-title":"AI and IoT for Smart City Applications","author":"A Banerjee","year":"2022","unstructured":"Banerjee, A., et al.: Building of efficient communication system in smart city using wireless sensor network through hybrid optimization technique. In: Piuri, V., Shaw, R.N., Ghosh, A., Islam, R. (eds.) AI and IoT for Smart City Applications. SCI, vol. 1002, pp. 15\u201330. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-7498-3_2"},{"key":"26_CR20","doi-asserted-by":"publisher","DOI":"10.4236\/wsn.2011.312044","author":"M Pandey","year":"2011","unstructured":"Pandey, M., Verma, S.: Energy consumption patterns for different mobility conditions in WSN. Wirel. Sens. Netw. (2011). https:\/\/doi.org\/10.4236\/wsn.2011.312044","journal-title":"Wirel. Sens. Netw."},{"key":"26_CR21","doi-asserted-by":"publisher","DOI":"10.2217\/epi-2020-0439","author":"K Preethi","year":"2021","unstructured":"Preethi, K., Auxzilia, K.A., Preethi, G.L., Sekar, D.: Antagomir technology in the treatment of different types of cancer. Epigenomics (2021). https:\/\/doi.org\/10.2217\/epi-2020-0439","journal-title":"Epigenomics"},{"issue":"11","key":"26_CR22","first-page":"4984","volume":"11","author":"K Sawant","year":"2021","unstructured":"Sawant, K., et al.: Dentinal microcracks after root canal instrumentation using instruments manufactured with different NiTi alloys and the SAF system: a systematic review. NATO Adv. Sci. Inst. Ser. E Appl. Sci. 11(11), 4984 (2021)","journal-title":"NATO Adv. Sci. Inst. Ser. E Appl. Sci."},{"issue":"July","key":"26_CR23","first-page":"100138","volume":"5","author":"V Shanmugam","year":"2021","unstructured":"Shanmugam, V., et al.: Circular economy in biocomposite development: state-of-the-art, challenges and emerging trends. Compos. Part C: Open Access 5(July), 100138 (2021)","journal-title":"Compos. Part C: Open Access"},{"key":"26_CR24","doi-asserted-by":"publisher","DOI":"10.2174\/2666255813999200928220535","author":"C Tamizhselvan","year":"2022","unstructured":"Tamizhselvan, C., Vijayalakshmi, V.: Distributed time-dependent key management scheme for internet of things. Recent Adv. Comput. Sci. Commun. (2022). https:\/\/doi.org\/10.2174\/2666255813999200928220535","journal-title":"Recent Adv. Comput. Sci. Commun."},{"key":"26_CR25","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-981-16-2164-2_22","volume-title":"Advanced Computing and Intelligent Technologies","author":"A Banerjee","year":"2022","unstructured":"Banerjee, A., et al.: Construction of effective wireless sensor network for smart communication using modified ant colony optimization technique. In: Bianchini, M., Piuri, V., Das, S., Shaw, R.N. (eds.) Advanced Computing and Intelligent Technologies. LNNS, vol. 218, pp. 269\u2013278. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-2164-2_22"},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"Touati, Y., Daachi, B., Arab, A.C.: Energy Management in Wireless Sensor Networks. Elsevier (2017)","DOI":"10.1016\/B978-1-78548-219-9.50001-1"},{"issue":"January","key":"26_CR27","first-page":"1090131","volume":"2022","author":"F Ullah","year":"2022","unstructured":"Ullah, F., Zahid Khan, M., Mehmood, G., Qureshi, M.S., Fayaz, M.: Energy efficiency and reliability considerations in wireless body area networks: a survey. Comput. Math. Methods Med. 2022(January), 1090131 (2022)","journal-title":"Comput. Math. Methods Med."},{"key":"26_CR28","unstructured":"Veerasimman, A., et al.: Thermal properties of natural fiber sisal based hybrid composites \u2013 a brief review. J. Nat. Fibers 1\u201311 (2021)"},{"key":"26_CR29","doi-asserted-by":"publisher","unstructured":"Wang, X., Yang, Z., Feng, Z., Zhao, J.: A WSN Layer-cluster key management scheme based on quadratic polynomial and Lagrange interpolation polynomial. Sensors 20(16) (2020). https:\/\/doi.org\/10.3390\/s20164388","DOI":"10.3390\/s20164388"},{"key":"26_CR30","unstructured":"Yang, J.: Energy Efficient Data Aggregation in Wireless Sensor Networks (2015)"},{"key":"26_CR31","doi-asserted-by":"publisher","unstructured":"Zhou, J.: Efficient and secure routing protocol based on encryption and authentication for wireless sensor networks. In: 2010 International Conference on Artificial Intelligence and Education (ICAIE) (2010). https:\/\/doi.org\/10.1109\/icaie.2010.5641155","DOI":"10.1109\/icaie.2010.5641155"}],"container-title":["Communications in Computer and Information Science","Advanced Communication and Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25088-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T14:09:12Z","timestamp":1676383752000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25088-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031250873","9783031250880"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25088-0_26","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"15 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Communication and Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacis2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icacis.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"258","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"69","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}