{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T23:02:43Z","timestamp":1754262163526,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s00500-021-05881-4","type":"journal-article","created":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T10:02:43Z","timestamp":1621850563000},"page":"1033-1043","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A cluster UAV inspired honeycomb defense system to confront military IoT: a dynamic game approach"],"prefix":"10.1007","volume":"27","author":[{"given":"Yufeng","family":"Meng","sequence":"first","affiliation":[]},{"given":"Jiancheng","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jianhua","family":"He","sequence":"additional","affiliation":[]},{"given":"Siqi","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Deepak","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Catarina","family":"Moreira","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2851-4260","authenticated-orcid":false,"given":"Prayag","family":"Tiwari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5711-7977","authenticated-orcid":false,"given":"Chenguang","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,24]]},"reference":[{"key":"5881_CR1","doi-asserted-by":"publisher","first-page":"11250","DOI":"10.1109\/JIOT.2020.2996671","volume":"7","author":"MS Abdalzaher","year":"2020","unstructured":"Abdalzaher MS, Muta O (2020) A game-theoretic approach for enhancing security and data trustworthiness in iot applications. IEEE Int Things J 7:11250\u201311261. https:\/\/doi.org\/10.1109\/JIOT.2020.2996671","journal-title":"IEEE Int Things J"},{"key":"5881_CR2","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1049\/iet-wss.2018.5114","volume":"9","author":"MS Abdalzaher","year":"2019","unstructured":"Abdalzaher MS, Samy L, Muta O (2019) Nonzero-sum game-based trust model to enhance wireless sensor networks security for iot applications. IET Wireless Sens Syst 9:218\u2013226","journal-title":"IET Wireless Sens Syst"},{"doi-asserted-by":"publisher","unstructured":"Abdalzaher MS, Seddik K, Muta, O (2017) An effective stackelberg game for high-assurance of data trustworthiness in wsns. In 2017 IEEE symposium on computers and communications (ISCC) (pp. 1257\u20131262). https:\/\/doi.org\/10.1109\/ISCC.2017.8024697","key":"5881_CR3","DOI":"10.1109\/ISCC.2017.8024697"},{"key":"5881_CR4","doi-asserted-by":"publisher","first-page":"1503","DOI":"10.1049\/iet-com.2016.1336","volume":"11","author":"MS Abdalzaher","year":"2017","unstructured":"Abdalzaher MS, Seddik K, Muta O (2017) Using stackelberg game to enhance cognitive radio sensor networks security. Iet Commun 11:1503\u20131511","journal-title":"Iet Commun"},{"key":"5881_CR5","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1109\/jiot.2017.2786546","volume":"5","author":"N Abuzainab","year":"2018","unstructured":"Abuzainab N, Saad W (2018) Dynamic connectivity game for adversarial internet of battlefield things systems. IEEE Int Things J 5:378\u2013390. https:\/\/doi.org\/10.1109\/jiot.2017.2786546","journal-title":"IEEE Int Things J"},{"key":"5881_CR6","doi-asserted-by":"publisher","first-page":"16043","DOI":"10.1007\/s00521-020-04705-0","volume":"32","author":"S Bebortta","year":"2020","unstructured":"Bebortta S, Senapati D, Rajput NK, Singh AK, Rathi VK, Pandey HM, Jaiswal AK, Qian J (2020) Evidence of power-law behavior in cognitive iot applications. Neural Comput Appl 32:16043\u201316055","journal-title":"Neural Comput Appl"},{"key":"5881_CR7","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/JIOT.2014.2337018","volume":"1","author":"P Chen","year":"2014","unstructured":"Chen P, Cheng S, Chen K (2014) Information fusion to defend intentional attack in internet of things. IEEE Int Things J 1:337\u2013348","journal-title":"IEEE Int Things J"},{"key":"5881_CR8","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1016\/j.jclepro.2018.12.096","volume":"212","author":"SP Gochhayat","year":"2019","unstructured":"Gochhayat SP, Kaliyar P, Conti M, Tiwari P, Prasath V, Gupta D, Khanna A (2019) Lisa: Lightweight context-aware iot service architecture. J Clean Prod 212:1345\u20131356","journal-title":"J Clean Prod"},{"key":"5881_CR9","doi-asserted-by":"publisher","first-page":"173","DOI":"10.14400\/JDC.2016.14.10.173","volume":"14","author":"SJ Han","year":"2016","unstructured":"Han SJ, Park JH (2016) A study on segmentation and priority of tactical considerations (mett+tc). J Digit Converg 14:173\u2013181","journal-title":"J Digit Converg"},{"key":"5881_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-019-0268-2","volume":"6","author":"S Kumar","year":"2019","unstructured":"Kumar S, Tiwari P, Zymbler M (2019) Internet of things is a revolutionary approach for future technology enhancement: a review. J Big Data 6:1\u201321","journal-title":"J Big Data"},{"doi-asserted-by":"crossref","unstructured":"Lagkas T, Argyriou V, Bibi S, Sarigiannidis P (2018) Uav iot framework views and challenges: Towards protecting drones as \u201cthings\u201d. Sensors, 18","key":"5881_CR11","DOI":"10.3390\/s18114015"},{"key":"5881_CR12","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1137\/0112033","volume":"12","author":"CE Lemke","year":"1964","unstructured":"Lemke CE, Howson JT Jr (1964) Equilibrium points of bimatrix games. J Soc Ind Appl Math 12:413\u2013423. https:\/\/doi.org\/10.1137\/0112033","journal-title":"J Soc Ind Appl Math"},{"unstructured":"Liu Q, Dong J (2017) Research on key techniques of the application of uavs in iots. Appl Elect Techn 22\u201326","key":"5881_CR13"},{"unstructured":"Ma G (2017) Fault-tolerant topology control and connectivity recovery method for wireless sensor networks. Ph.D. thesis Beijing University of Posts and Telecommunications","key":"5881_CR14"},{"unstructured":"Ma G, Yu P (2016) Connectivity recovery strategy for wireless sensor networks considering barrier. Sens Microsyst 123\u2013126","key":"5881_CR15"},{"issue":"16","key":"5881_CR16","first-page":"1","volume":"14248220","author":"A Mohamed","year":"2016","unstructured":"Mohamed A, Karim S, Maha E, Osamu M, Hiroshi F, Adel AR (2016) Game theory meets wireless sensor networks security requirements and threats mitigation: a survey. Sensors 14248220(16):1\u201327","journal-title":"Sensors"},{"key":"5881_CR17","doi-asserted-by":"publisher","first-page":"2334","DOI":"10.1109\/COMST.2019.2902862","volume":"21","author":"M Mozaffari","year":"2019","unstructured":"Mozaffari M, Saad W, Bennis M, Nam Y-H, Debbah M (2019) A tutorial on uavs for wireless networks: Applications, challenges, and open problems. IEEE Commun Surv Tutor 21:2334\u20132360","journal-title":"IEEE Commun Surv Tutor"},{"key":"5881_CR18","doi-asserted-by":"publisher","first-page":"10160","DOI":"10.1109\/JIOT.2020.2974678","volume":"7","author":"J Qian","year":"2020","unstructured":"Qian J, Tiwari P, Gochhayat SP, Pandey HM (2020) A noble double-dictionary-based ECG compression technique for ioth. IEEE Int Things J 7:10160\u201310170","journal-title":"IEEE Int Things J"},{"unstructured":"Qin N, Wu D, Yu Y (2017) A double connectivity recovery algorithm in partition based on backbone polygon in sensor networks. Comput Eng Sci 673\u2013677","key":"5881_CR19"},{"doi-asserted-by":"crossref","unstructured":"Ray PP (2015) Towards an internet of things based architectural framework for defence. In 2015 International conference on control, instrumentation, communication and computational technologies (ICCICCT) (pp. 411\u2013416). IEEE","key":"5881_CR20","DOI":"10.1109\/ICCICCT.2015.7475314"},{"doi-asserted-by":"publisher","unstructured":"Suri N, Tortonesi M, Michaelis J, Budulas P, Benincasa G, Russell S, Stefanelli C, Winkler R (2016) Analyzing the applicability of internet of things to the battlefield environment. In 2016 International conference on military communications and information systems (ICMCIS) (pp. 1\u20138). IEEE. https:\/\/doi.org\/10.1109\/icmcis.2016.7496574","key":"5881_CR21","DOI":"10.1109\/icmcis.2016.7496574"},{"doi-asserted-by":"publisher","unstructured":"Tortonesi M, Morelli A, Govoni M, Michaelis J, Suri N, Stefanelli C, Russell S (2016) Leveraging internet of things within the military network environment \u2014 challenges and solutions. In 2016 IEEE 3rd World forum on internet of things (WF-IoT) (pp. 111\u2013116). IEEE. https:\/\/doi.org\/10.1109\/wf-iot.2016.7845503","key":"5881_CR22","DOI":"10.1109\/wf-iot.2016.7845503"},{"key":"5881_CR23","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1109\/JIOT.2015.2482363","volume":"3","author":"Z Xu","year":"2016","unstructured":"Xu Z, Chen L, Chen C, Guan X (2016) Joint clustering and routing design for reliable and efficient data collection in large-scale wireless sensor networks. IEEE Int Things J 3:520\u2013532. https:\/\/doi.org\/10.1109\/JIOT.2015.2482363","journal-title":"IEEE Int Things J"},{"doi-asserted-by":"publisher","unstructured":"Yang B, Cao X, Yuen C, Qian L (2020) Offloading optimization in edge computing for deep learning enabled target tracking by internet-of-uavs. IEEE Int Things J 1 https:\/\/doi.org\/10.1109\/JIOT.2020.3016694","key":"5881_CR24","DOI":"10.1109\/JIOT.2020.3016694"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-05881-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-021-05881-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-05881-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T12:16:42Z","timestamp":1673525802000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-021-05881-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,24]]},"references-count":24,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["5881"],"URL":"https:\/\/doi.org\/10.1007\/s00500-021-05881-4","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2021,5,24]]},"assertion":[{"value":"12 May 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}