{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:08:27Z","timestamp":1761581307184,"version":"3.41.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319195773"},{"type":"electronic","value":"9783319195780"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19578-0_35","type":"book-chapter","created":{"date-parts":[[2015,5,12]],"date-time":"2015-05-12T08:07:21Z","timestamp":1431418041000},"page":"429-441","source":"Crossref","is-referenced-by-count":11,"title":["Balanced and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Amine","family":"Dahane","sequence":"first","affiliation":[]},{"given":"Nasr-Eddine","family":"Berrached","sequence":"additional","affiliation":[]},{"given":"Abdelhamid","family":"Loukil","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"35_CR1","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: A Survey. Computer Networks\u00a038(2), 393\u2013422 (2002)","journal-title":"Computer Networks"},{"key":"35_CR2","first-page":"193","volume":"5","author":"M. Chatterjee","year":"2002","unstructured":"Chatterjee, M., Das, S., Turgut, D.: WCA: a weighted clustering algorithm for mobile ad hoc networks. Journal of Cluster Computing (Special Issue on Mobile Ad-hoc Networks)\u00a05, 193\u2013204 (2002)","journal-title":"Journal of Cluster Computing (Special Issue on Mobile Ad-hoc Networks)"},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Zabian, A., Ibrahim, A., Al-Kalani, F.: Dynamic Head Cluster Election Algorithm for clustered Ad-hoc Networks. Journal of Computer Science\u00a04(1) (2008)","DOI":"10.3844\/jcssp.2008.42.50"},{"issue":"4","key":"35_CR4","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1007\/s11276-009-0182-1","volume":"16","author":"H. Safa","year":"2010","unstructured":"Safa, H., Artail, H., Tabet, D.: A cluster-based trust-aware routing protocol for mobile ad-hoc net-works. Wireless Networks\u00a016(4), 969\u2013984 (2010)","journal-title":"Wireless Networks"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Safa, H., Mirza, O., Artail, H.: A Dynamic Energy Efficient Clustering Algorithm for MANETs. In: IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, pp. 51\u201356 (2008)","DOI":"10.1109\/WiMob.2008.67"},{"issue":"3","key":"35_CR6","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1504\/IJICS.2009.031032","volume":"3","author":"M. Elhdhili","year":"2009","unstructured":"Elhdhili, M., Azzouz, L., Kamoun, F.: Reputation based clustering algorithm for security management in ad hoc networks with liars. International Journal of Information and Computer Security\u00a03(3), 228\u2013244 (2009)","journal-title":"International Journal of Information and Computer Security"},{"key":"35_CR7","unstructured":"Yu, Y., Zhang, L.: A Secure Clustering Algorithm in Mobile Ad-hoc Networks. In: 2012 IACSIT Hong Kong Conferences, vol.\u00a029, pp. 73\u201377 (2012)"},{"issue":"1","key":"35_CR8","first-page":"71","volume":"33","author":"R. Agarwal","year":"2012","unstructured":"Agarwal, R., Gupta, R., Motwani, M.: Review of Weighted Clustering Algorithms for Mobile Ad-hoc Networks. Computer Science and Telecommunications\u00a033(1), 71\u201378 (2012)","journal-title":"Computer Science and Telecommunications"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Dahane, A., Berrached, N., Kechar, B.: Energy Efficient and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks. In: The 9th International Conference on Future Networks and Communications, Procedia Computer Science, Niagara Falls, Ontario, Canada, August 17 -20, vol.\u00a034, pp. 63\u201370 (2014)","DOI":"10.1016\/j.procs.2014.07.040"},{"issue":"5","key":"35_CR10","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1016\/j.adhoc.2008.08.006","volume":"7","author":"S. Soro","year":"2009","unstructured":"Soro, S., Heinzelman, W.B.: Cluster head election techniques for coverage preservation in wire-less sensor networks. Ad-Hoc Networks Journal\u00a07(5), 955\u2013972 (2009)","journal-title":"Ad-Hoc Networks Journal"},{"issue":"4","key":"35_CR11","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1002\/sec.624","volume":"6","author":"K. Benahmed","year":"2013","unstructured":"Benahmed, K., Merabti, M., Haffaf, H.: Distributed monitoring for misbehavior detection in wireless sensor networks. Security and Communication Networks\u00a06(4), 388\u2013400 (2013)","journal-title":"Security and Communication Networks"},{"issue":"1-2","key":"35_CR12","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1504\/IJSNET.2010.031852","volume":"7","author":"M. Lehsaini","year":"2010","unstructured":"Lehsaini, M., Guyennet, H., Feham, M.: An efficient cluster-based self-organization algorithm for wireless sensor networks. Int. Journal. Sensor Networks\u00a07(1-2), 85\u201394 (2010)","journal-title":"Int. Journal. Sensor Networks"},{"issue":"6","key":"35_CR13","doi-asserted-by":"publisher","first-page":"2068","DOI":"10.1016\/j.jnca.2012.08.008","volume":"35","author":"K.A. Darabkh","year":"2012","unstructured":"Darabkh, K.A., Ismail, S., Al-Shurman, M.: Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks. Journal of Network and Computer Appli-cations\u00a035(6), 2068\u20132080 (2012)","journal-title":"Journal of Network and Computer Appli-cations"},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Choi, W., Woo, M.: A Distributed Weighted Clustering Algorithm for Mobile Ad Hoc Net-works. In: Proc. of the IEEE Advanced International Conference on Telecommunications and Interna-tional Conference on Internet and Web Applications and Services (AICT\/ICIW 2006), p. 73 (2006)","DOI":"10.1109\/AICT-ICIW.2006.11"},{"issue":"14-15","key":"35_CR15","doi-asserted-by":"publisher","first-page":"2826","DOI":"10.1016\/j.comcom.2007.05.024","volume":"30","author":"A. Abbassi","year":"2007","unstructured":"Abbassi, A., Younis, M.: A Survey on Clustering Algorithms for Wireless Sensor Networks. Computer Communications Journal\u00a030(14-15), 2826\u20132841 (2007)","journal-title":"Computer Communications Journal"},{"issue":"2","key":"35_CR16","first-page":"293","volume":"8","author":"M. Chawla","year":"2010","unstructured":"Chawla, M., Singhai, J., Rana, J.L.: Clustering in Mobile Ad- hoc Networks: A Review. International Journal of Computer Science and Information Security (IJCSIS)\u00a08(2), 293\u2013301 (2010)","journal-title":"International Journal of Computer Science and Information Security, (IJCSIS)"},{"key":"35_CR17","doi-asserted-by":"crossref","unstructured":"Er, I.I., Seah, W.K.G.: Mobility-based d-Hop Clustering Algorithm for Mobile Ad Hoc Networks. In: IEEE Wireless Communications and Networking Conference (WCNC 2004), pp. 2359\u20132364 (2004)","DOI":"10.1109\/WCNC.2004.1311457"},{"key":"35_CR18","doi-asserted-by":"crossref","unstructured":"Khalil, I., Bagchi, S., Shroff, N.B.: LITEWORP: a lightweight Counter measure for the wormhole attack in multihop wireless networks. In: International Conference on Dependable Systems and Networks, pp. 612\u2013621 (2005)","DOI":"10.1109\/DSN.2005.58"},{"issue":"4","key":"35_CR19","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.comcom.2004.12.031","volume":"29","author":"M.L. Hsin","year":"2006","unstructured":"Hsin, M.L.: Self-monitoring of wireless sensor networks. Computer Communications\u00a029(4), 462\u2013476 (2006)","journal-title":"Computer Communications"},{"key":"35_CR20","doi-asserted-by":"crossref","unstructured":"Shaikh, R.A., Jameel, H., Lee, S., Y.J., et al.: Trust management problem in distributed wireless sensor networks. In: Proceedings of the 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA), pp. 411\u2013414 (2006)","DOI":"10.1109\/RTCSA.2006.61"},{"issue":"4","key":"35_CR21","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1002\/wcm.785","volume":"10","author":"T.H. Hai","year":"2010","unstructured":"Hai, T.H., Huhi, E.N., Jo, M.: A lightweight intrusion detection framework for wireless sensor net-works. Wireless Communications and Mobile Computing (Wiley)\u00a010(4), 559\u2013572 (2010)","journal-title":"Wireless Communications and Mobile Computing (Wiley)"}],"container-title":["IFIP Advances in Information and Communication Technology","Computer Science and Its Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19578-0_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T23:11:18Z","timestamp":1748387478000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-19578-0_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319195773","9783319195780"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19578-0_35","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2015]]}}}