{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:33:08Z","timestamp":1767141188529,"version":"build-2238731810"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T00:00:00Z","timestamp":1636329600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T00:00:00Z","timestamp":1636329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s00779-021-01653-x","type":"journal-article","created":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T00:03:45Z","timestamp":1636329825000},"page":"889-906","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks"],"prefix":"10.1007","volume":"27","author":[{"given":"R. S.","family":"Raghav","sequence":"first","affiliation":[]},{"given":"Debnath","family":"Bhattacharyya","sequence":"additional","affiliation":[]},{"given":"Dinesh Kumar","family":"Anguraj","sequence":"additional","affiliation":[]},{"given":"Tai-hoon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,8]]},"reference":[{"key":"1653_CR1","doi-asserted-by":"crossref","unstructured":"Abirami R, Premalatha G (2014) Depletion of vampire attacks in medium access control level using interior gateway routing protocol.\" Information Communication and Embedded Systems (ICICES), 2014 International Conference on. IEEE","DOI":"10.1109\/ICICES.2014.7033801"},{"key":"1653_CR2","doi-asserted-by":"crossref","unstructured":"Achuthan E, Kishore R (2014) A novel anti jamming technique for wireless sensor networks.\" Communications and Signal Processing (ICCSP), 2014 International Conference on. IEEE","DOI":"10.1109\/ICCSP.2014.6949978"},{"key":"1653_CR3","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1016\/j.procs.2016.03.092","volume":"79","author":"Parmar Amish","year":"2016","unstructured":"Amish Parmar, Vaghela VB (2016) Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. Procedia Comput Sci 79:700\u2013707","journal-title":"Procedia Comput Sci"},{"key":"1653_CR4","doi-asserted-by":"crossref","unstructured":"Amudha P, Karthik S, Sivakumari S (2015) A hybrid swarm intelligence algorithm for intrusion detection using significant features. Sci World J 2015","DOI":"10.1155\/2015\/574589"},{"key":"1653_CR5","doi-asserted-by":"crossref","unstructured":"Amudhavel J et al (2016) Recursive ant colony optimization routing in wireless mesh network. Proceedings of the Second International Conference on Computer and Communication Technologies, Springer India","DOI":"10.1007\/978-81-322-2526-3_36"},{"issue":"4","key":"1653_CR6","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1016\/j.pmcj.2010.12.003","volume":"7","author":"R Di Pietro","year":"2011","unstructured":"Di Pietro R et al (2011) Intrusion-resilient integrity in data-centric unattended WSNs. Pervasive Mob Comput 7(4):495\u2013508","journal-title":"Pervasive Mob Comput"},{"key":"1653_CR7","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.comnet.2016.08.019","volume":"108","author":"T Dimitriou","year":"2016","unstructured":"Dimitriou T et al (2016) Imposter detection for replication attacks in mobile sensor networks. Comput Netw 108:210\u2013222","journal-title":"Comput Netw"},{"key":"1653_CR8","doi-asserted-by":"crossref","unstructured":"Dongare SP, Mangrulkar RS (2015) Implementing energy efficient technique for defense against Gray-Hole and Black-Hole attacks in wireless sensor networks. Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in. IEEE","DOI":"10.1109\/ICACEA.2015.7164689"},{"issue":"3","key":"1653_CR9","first-page":"262","volume":"28","author":"M Elhoseny","year":"2016","unstructured":"Elhoseny M et al (2016) A secure data routing schema forWSN using Elliptic Curve Cryptography and homomorphic encryption. J King Saud Univ Comput Inf Sci 28(3):262\u2013275","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"1653_CR10","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.procs.2018.05.184","volume":"132","author":"A Gambhir","year":"2018","unstructured":"Gambhir A, Payal A, Arya R (2018) Performance analysis of artificial bee colony optimization based clustering protocol in various scenarios of WSN. Procedia Comput Sci 132:183\u2013188","journal-title":"Procedia Comput Sci"},{"key":"1653_CR11","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1016\/j.asoc.2015.07.023","volume":"36","author":"E Hancer","year":"2015","unstructured":"Hancer E et al (2015) A binary ABC algorithm based on advanced similarity scheme for feature selection. Appl Soft Comput 36:334\u2013348","journal-title":"Appl Soft Comput"},{"key":"1653_CR12","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.procs.2014.11.061","volume":"42","author":"MAM Isa","year":"2014","unstructured":"Isa MAM et al (2014) Cryptographic key exchange protocol with message authentication codes (mac) using finite state machine. Procedia Comput Sci 42:263\u2013270","journal-title":"Procedia Comput Sci"},{"issue":"1","key":"1653_CR13","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.aeue.2015.09.017","volume":"70","author":"H Jadidoleslamy","year":"2016","unstructured":"Jadidoleslamy H, Aref MR, Bahramgiri H (2016) A fuzzy fully distributed trust management system in wireless sensor networks. AEU-Int J Electron Commun 70(1):40\u201349","journal-title":"AEU-Int J Electron Commun"},{"key":"1653_CR14","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.comnet.2016.05.007","volume":"104","author":"S Kumari","year":"2016","unstructured":"Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput Netw 104:137\u2013154","journal-title":"Comput Netw"},{"key":"1653_CR15","unstructured":"Lee YS, Alasaarela E, Lee HJ (2014) Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system. Information Networking (ICOIN), 2014 International Conference on. IEEE"},{"key":"1653_CR16","unstructured":"Lichman M (2013) UCI Machine Learning Repository [http:\/\/archive.ics.uci.edu\/ml]. Irvine, CA: University of California, School of Information and ComputerScience. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup.data10.percent.gz"},{"key":"1653_CR17","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.adhoc.2014.09.018","volume":"25","author":"J Maerien","year":"2015","unstructured":"Maerien J et al (2015) SecLooCI: a comprehensive security middleware architecture for shared wireless sensor networks. Ad Hoc Netw 25:141\u2013169","journal-title":"Ad Hoc Netw"},{"key":"1653_CR18","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.adhoc.2016.10.007","volume":"55","author":"A Mehmood","year":"2017","unstructured":"Mehmood A, Umar MM, Song H (2017) ICMDS: Secure inter-cluster multiple-key distribution scheme for wireless sensor networks.\". Ad Hoc Netw 55:97\u2013106","journal-title":"Ad Hoc Netw"},{"key":"1653_CR19","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.comnet.2016.05.005","volume":"105","author":"M-L Messai","year":"2016","unstructured":"Messai M-L, Seba H (2016) A survey of key management schemes in multi-phase wireless sensor networks. Comput Netw 105:60\u201374","journal-title":"Comput Netw"},{"key":"1653_CR20","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.jnca.2015.12.001","volume":"61","author":"AK Mishra","year":"2016","unstructured":"Mishra AK, Turuk AK (2016) A comparative analysis of node replica detection schemes in wireless sensor networks. J Netw Comput Appl 61:21\u201332","journal-title":"J Netw Comput Appl"},{"key":"1653_CR21","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.procs.2016.06.038","volume":"89","author":"AH Moon","year":"2016","unstructured":"Moon AH, Iqbal U, MohiuddinBhat G (2016) Mutual Entity Authentication Protocol Based on ECDSA for WSN. Procedia Comput Sci 89:187\u2013192","journal-title":"Procedia Comput Sci"},{"key":"1653_CR22","doi-asserted-by":"crossref","unstructured":"Moon PS, Ingole PK (2015) \"An overview on: intrusion detection system with secure hybrid mechanism in wireless sensor network.\" Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in. IEEE","DOI":"10.1109\/ICACEA.2015.7164714"},{"key":"1653_CR23","doi-asserted-by":"publisher","first-page":"4597","DOI":"10.1016\/j.ins.2010.07.005","volume":"181","author":"S Muhammad","year":"2011","unstructured":"Muhammad S, Di Caro GA, M Farooq (2011) Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions. Inf Sci 181:4597\u20134624","journal-title":"Inf Sci"},{"key":"1653_CR24","unstructured":"Murphy FE et al (2015) Development of an heterogeneous wireless sensor network for instrumentation and analysis of beehives.\" Instrumentation and Measurement Technology Conference (I2MTC), 2015 IEEE International. IEEE"},{"key":"1653_CR25","unstructured":"Pang C, Xu G, Zhang Yunpu (2020) A new energy efficient management approach for wireless sensor networks in target tracking. Def Technol"},{"key":"1653_CR26","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/j.procs.2015.04.198","volume":"48","author":"A Patil","year":"2015","unstructured":"Patil A, Gaikwad R (2015) comparative analysis of the prevention techniques of Denial of Service attacks in wireless sensor network. Procedia Comput Sci 48:387\u2013393","journal-title":"Procedia Comput Sci"},{"key":"1653_CR27","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/j.procs.2016.03.094","volume":"79","author":"S Patil","year":"2016","unstructured":"Patil S, Chaudhari S (2016) DoS attack prevention technique in wireless sensor networks. Procedia Comput Sci 79:715\u2013721","journal-title":"Procedia Comput Sci"},{"issue":"4","key":"1653_CR28","doi-asserted-by":"publisher","first-page":"2439","DOI":"10.1007\/s11277-020-07158-9","volume":"112","author":"RS Raghav","year":"2020","unstructured":"Raghav RS, Thirugnansambandam Kalaipriyan, Anguraj Dinesh Kumar (2020) Beeware routing scheme for detecting network layer attacks in wireless sensor networks. Wirel Pers Commun 112(4):2439\u20132459","journal-title":"Wirel Pers Commun"},{"key":"1653_CR29","doi-asserted-by":"crossref","unstructured":"Raghav RS et al (2021) Cuddle death algorithm using ABC for detecting unhealthy nodes in wireless sensor networks. Evol Intell 1\u201313","DOI":"10.1007\/s12065-021-00570-5"},{"key":"1653_CR30","unstructured":"Rambabu BA, Reddy V, Janakiraman S (2019) Hybrid Artificial Bee Colony and Monarchy Butterfly Optimization Algorithm (HABC-MBOA)-based cluster head selection for WSNs. J King Saud Univ Comput Inf Sci"},{"key":"1653_CR31","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.asoc.2019.03.040","volume":"79","author":"E Saad","year":"2019","unstructured":"Saad E, Elhosseini MA, Haikal AY (2019) Culture-based artificial bee colony with heritage mechanism for optimization of wireless sensors network. Appl Soft Comput 79:59\u201373","journal-title":"Appl Soft Comput"},{"key":"1653_CR32","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.procs.2015.08.331","volume":"63","author":"Syed Muhammad Sajjad","year":"2015","unstructured":"Sajjad Syed Muhammad, Bouk SafdarHussain, Yousaf Muhammad (2015) Neighbor node trust based intrusion detection system for wsn. Procedia Comput Sci 63:183\u2013188","journal-title":"Procedia Comput Sci"},{"key":"1653_CR33","doi-asserted-by":"crossref","unstructured":"Salunke A, Ambawade D (2015) Dynamic Sequence Number Thresholding protocol for detection of blackhole attack in Wireless Sensor Network.\" Communication, Information & Computing Technology (ICCICT), 2015 International Conference on. IEEE","DOI":"10.1109\/ICCICT.2015.7045745"},{"key":"1653_CR34","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1016\/j.procs.2015.10.078","volume":"70","author":"SK Shankar","year":"2015","unstructured":"Shankar SK, Tomar AS, Tak GK (2015) Secure medical data transmission by using ECC with mutual authentication in WSNs. Procedia Comput Sci 70:455\u2013461","journal-title":"Procedia Comput Sci"},{"key":"1653_CR35","doi-asserted-by":"crossref","unstructured":"Tanabe N, Kohno E, Kakuda Y (2012) An impersonation attack detection method using bloom filters and dispersed data transmission for wireless sensor networks. Green Computing and Communications (GreenCom), 2012 IEEE International Conference on. IEEE","DOI":"10.1109\/GreenCom.2012.126"},{"key":"1653_CR36","doi-asserted-by":"crossref","unstructured":"Taylor C, Johnson T (2015) Strong authentication countermeasures using dynamic keying for sinkhole and distance spoofing attacks in smart grid networks. Wireless Communications and Networking Conference (WCNC), 2015 IEEE. IEEE","DOI":"10.1109\/WCNC.2015.7127747"},{"key":"1653_CR37","doi-asserted-by":"crossref","unstructured":"Thenmozhi R, Karthikeyan P, Vijayakumar V, Keerthana M, Amudhavel J (2015) Backtracking performance analysis of Internet protocol for DDoS flooding detection. In Circuit, Power and Computing Technologies (ICCPCT), 2015 International Conference on (pp. 1\u20134). IEEE","DOI":"10.1109\/ICCPCT.2015.7159474"},{"key":"1653_CR38","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.procs.2013.06.155","volume":"19","author":"M Tripathi","year":"2013","unstructured":"Tripathi M, Gaur MS, Laxmi V (2013) Comparing the impact of black hole and gray hole attack on LEACH in WSN. Procedia Comput Sci 19:1101\u20131107","journal-title":"Procedia Comput Sci"},{"key":"1653_CR39","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.procs.2016.02.012","volume":"78","author":"Raksha Upadhyay","year":"2016","unstructured":"Upadhyay Raksha, Bhatt Uma Rathore, Tripathi Harendra (2016) DDOS Attack Aware DSR Routing Protocol in WSN. Procedia Comput Sci 78:68\u201374","journal-title":"Procedia Comput Sci"},{"issue":"4","key":"1653_CR40","first-page":"3313","volume":"6","author":"D Verma","year":"2015","unstructured":"Verma D, Singh G, Patidar K (2015) Detection of vampire attack in wireless sensor networks. Int J Comput Sci Inf Technol 6(4):3313\u20133317","journal-title":"Int J Comput Sci Inf Technol"},{"key":"1653_CR41","doi-asserted-by":"crossref","unstructured":"Vijayalakshmi V, Sharmila R, Shalini R (2015) Hierarchical key management scheme using Hyper EllipticCurve Cryptography in Wireless Sensor Networks.\" Signal Processing, Communication and Networking (ICSCN), 2015 3rd International Conference on. IEEE","DOI":"10.1109\/ICSCN.2015.7219840"},{"key":"1653_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2014.03.003","volume":"20","author":"D Wang","year":"2014","unstructured":"Wang D, Wang P (2014) Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Netw 20:1\u201315","journal-title":"Ad Hoc Netw"},{"key":"1653_CR43","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1016\/j.procs.2020.04.096","volume":"171","author":"AS Yadav","year":"2020","unstructured":"Yadav AS et al (2020) Increasing Efficiency of Sensor Nodes by Clustering in Section Based Hybrid Routing Protocol with Artificial Bee Colony. Procedia Comput Sci 171:887\u2013896","journal-title":"Procedia Comput Sci"},{"key":"1653_CR44","unstructured":"Zade AV, Tugnayat RM. A honey bee swarm intelligence algorithm for communication networks. Int J Eng Sci Res Technol ISSN: 2277\u20139655"},{"issue":"3","key":"1653_CR45","first-page":"1","volume":"54","author":"X Zhang","year":"2017","unstructured":"Zhang X, Zhang X, Wang L (2017) Antenna design by an adaptive variable differential artificial bee colony algorithm. IEEE Trans Magn 54(3):1\u20134","journal-title":"IEEE Trans Magn"},{"key":"1653_CR46","doi-asserted-by":"publisher","first-page":"102094","DOI":"10.1016\/j.adhoc.2020.102094","volume":"101","author":"X Zhang","year":"2020","unstructured":"Zhang X, Lu X, Zhang X (2020) Mobile wireless sensor network lifetime maximization by using evolutionary computing methods. Ad Hoc Networks 101:102094","journal-title":"Ad Hoc Networks"}],"updated-by":[{"DOI":"10.1007\/s00779-021-01658-6","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T00:00:00Z","timestamp":1637712000000}}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-021-01653-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00779-021-01653-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-021-01653-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T10:15:18Z","timestamp":1685009718000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00779-021-01653-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,8]]},"references-count":46,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["1653"],"URL":"https:\/\/doi.org\/10.1007\/s00779-021-01653-x","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,8]]},"assertion":[{"value":"5 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2021","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s00779-021-01658-6","URL":"https:\/\/doi.org\/10.1007\/s00779-021-01658-6","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}