{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T21:22:17Z","timestamp":1775856137083,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T00:00:00Z","timestamp":1691020800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T00:00:00Z","timestamp":1691020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s10207-023-00737-4","type":"journal-article","created":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T06:02:06Z","timestamp":1691042526000},"page":"199-223","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network"],"prefix":"10.1007","volume":"23","author":[{"given":"K.","family":"Dinesh","sequence":"first","affiliation":[]},{"given":"S. V. N.","family":"Santhosh Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,3]]},"reference":[{"issue":"18","key":"737_CR1","doi-asserted-by":"publisher","first-page":"e5342","DOI":"10.1002\/dac.5342","volume":"35","author":"N Babu","year":"2022","unstructured":"Babu, N., Santhosh Kumar, S.V.N.: Comprehensive analysis on sensor node fault management schemes in wireless sensor networks. Int. J. Commun. Syst. 35(18), e5342 (2022)","journal-title":"Int. J. Commun. Syst."},{"issue":"2","key":"737_CR2","doi-asserted-by":"publisher","first-page":"322","DOI":"10.3390\/s19020322","volume":"19","author":"D WohweSambo","year":"2019","unstructured":"WohweSambo, D., Yenke, B.O., F\u00f6rster, A., Dayang, P.: Optimized clustering algorithms for large wireless sensor networks\u2014a review. Sensors 19(2), 322 (2019)","journal-title":"Sensors"},{"key":"737_CR3","first-page":"21","volume":"23","author":"G Sakya","year":"2019","unstructured":"Sakya, G., Sharma, V.: ADMC-MAC: energy efficient adaptive MAC protocol for mission critical applications in WSN. Sustain. Comput.: Inform. Syst. 23, 21\u201328 (2019)","journal-title":"Sustain. Comput.: Inform. Syst."},{"issue":"1","key":"737_CR4","doi-asserted-by":"publisher","first-page":"2088","DOI":"10.35940\/ijitee.A4242.119119","volume":"9","author":"J John","year":"2019","unstructured":"John, J., Varkey, M.S., Selvi, M.: Security attacks in s-wbans on iot based healthcare applications. Int. J. Innov. Technol. Explor. Eng. 9(1), 2088\u20132097 (2019)","journal-title":"Int. J. Innov. Technol. Explor. Eng."},{"key":"737_CR5","doi-asserted-by":"crossref","unstructured":"Gheisari, M., Abbasi, A.A., Sayari, Z., Rizvi, Q., Asheralieva, A., Banu, S., Awaysheh, F.M., Shah, S.B.H. and Raza, K.A.: A survey on clustering algorithms in wireless sensor networks: challenges, research, and trends. In: 2020 International Computer Symposium (ICS)\u00a0(pp. 294\u2013299). December 2020","DOI":"10.1109\/ICS51289.2020.00065"},{"issue":"28","key":"737_CR6","first-page":"238","volume":"4","author":"M Bavaghar","year":"2020","unstructured":"Bavaghar, M., Mohajer, A., TaghaviMotlagh, S.: Energy efficient clustering algorithm for wireless sensor networks. J. Inform. Syst. Telecommun. (JIST) 4(28), 238 (2020)","journal-title":"J. Inform. Syst. Telecommun. (JIST)"},{"issue":"2","key":"737_CR7","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/JSEN.2017.2773119","volume":"18","author":"W Wen","year":"2017","unstructured":"Wen, W., Zhao, S., Shang, C., Chang, C.Y.: EAPC: energy-aware path construction for data collection using mobile sink in wireless sensor networks. IEEE Sens. J. 18(2), 890\u2013901 (2017)","journal-title":"IEEE Sens. J."},{"issue":"4","key":"737_CR8","doi-asserted-by":"publisher","first-page":"e27468","DOI":"10.2196\/27468","volume":"23","author":"M Ghaderzadeh","year":"2021","unstructured":"Ghaderzadeh, M., Asadi, F., Jafari, R., Bashash, D., Abolghasemi, H., Aria, M.: Deep convolutional neural network\u2013based computer-aided detection system for COVID-19 using multiple lung scans: design and implementation study. J. Med. Internet Res. 23(4), e27468 (2021)","journal-title":"J. Med. Internet Res."},{"issue":"10","key":"737_CR9","doi-asserted-by":"publisher","first-page":"4198","DOI":"10.3390\/en16104198","volume":"16","author":"A Sharma","year":"2023","unstructured":"Sharma, A., Babbar, H., Rani, S., Sah, D.K., Sehar, S., Gianini, G.: MHSEER: a meta-heuristic secure and energy-efficient routing protocol for wireless sensor network-based industrial IoT. Energies 16(10), 4198 (2023)","journal-title":"Energies"},{"issue":"8","key":"737_CR10","doi-asserted-by":"publisher","first-page":"5113","DOI":"10.1002\/int.22753","volume":"37","author":"M Ghaderzadeh","year":"2022","unstructured":"Ghaderzadeh, M., Aria, M., Hosseini, A., Asadi, F., Bashash, D., Abolghasemi, H.: A fast and efficient CNN model for B-ALL diagnosis and its subtypes classification using peripheral blood smear images. Int. J. Intell. Syst. 37(8), 5113\u20135133 (2022)","journal-title":"Int. J. Intell. Syst."},{"key":"737_CR11","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s11277-020-07377-0","volume":"114","author":"JK Jain","year":"2020","unstructured":"Jain, J.K.: A coherent approach for dynamic cluster-based routing and coverage hole detection and recovery in bi-layered WSN-IoT. Wirel. Pers. Commun. 114, 519\u2013543 (2020)","journal-title":"Wirel. Pers. Commun."},{"key":"737_CR12","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1007\/s11036-017-0913-y","volume":"24","author":"S Balaji","year":"2019","unstructured":"Balaji, S., Golden Julie, E., Harold Robinson, Y.: Development of fuzzy based energy efficient cluster routing protocol to increase the lifetime of wireless sensor networks. Mob. Netw. Appl. 24, 394\u2013406 (2019)","journal-title":"Mob. Netw. Appl."},{"issue":"1","key":"737_CR13","first-page":"33","volume":"7","author":"M Shokair","year":"2017","unstructured":"Shokair, M., Saad, W.: Balanced and energy-efficient multi-hop techniques for routing in wireless sensor networks. IET Netw. 7(1), 33\u201343 (2017)","journal-title":"IET Netw."},{"key":"737_CR14","doi-asserted-by":"publisher","first-page":"25334","DOI":"10.1109\/ACCESS.2019.2899752","volume":"7","author":"FA Khan","year":"2019","unstructured":"Khan, F.A., Khan, M., Asif, M., Khalid, A., Haq, I.U.: Hybrid and multi-hop advanced zonal-stable election protocol for wireless sensor networks. IEEE Access 7, 25334\u201325346 (2019)","journal-title":"IEEE Access"},{"issue":"6","key":"737_CR15","doi-asserted-by":"publisher","first-page":"2822","DOI":"10.12928\/telkomnika.v18i6.15199","volume":"18","author":"K Sekaran","year":"2020","unstructured":"Sekaran, K., Rajakumar, R., Dinesh, K., Rajkumar, Y., Latchoumi, T.P., Kadry, S., Lim, S.: An energy-efficient cluster head selection in wireless sensor network using grey wolf optimization algorithm. TELKOMNIKA (Telecommun. Comput. Electron. Control) 18(6), 2822\u20132833 (2020)","journal-title":"TELKOMNIKA (Telecommun. Comput. Electron. Control)"},{"key":"737_CR16","doi-asserted-by":"publisher","first-page":"60676","DOI":"10.1109\/ACCESS.2020.2983483","volume":"8","author":"W Osamy","year":"2020","unstructured":"Osamy, W., El-Sawy, A.A., Salim, A.: CSOCA: chicken swarm optimization based clustering algorithm for wireless sensor networks. IEEE Access 8, 60676\u201360688 (2020)","journal-title":"IEEE Access"},{"key":"737_CR17","first-page":"1","volume":"127","author":"SG Qureshi","year":"2021","unstructured":"Qureshi, S.G., Shandilya, S.K.: Novel fuzzy based crow search optimization algorithm for secure node-to-node data transmission in WSN. Wirel. Pers. Commun. 127, 1\u201321 (2021)","journal-title":"Wirel. Pers. Commun."},{"issue":"4","key":"737_CR18","doi-asserted-by":"publisher","first-page":"1917","DOI":"10.1007\/s12083-021-01116-3","volume":"14","author":"E Yousefpoor","year":"2021","unstructured":"Yousefpoor, E., Barati, H., Barati, A.: A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks. Peer-to-Peer Netw. Appl. 14(4), 1917\u20131942 (2021)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"737_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-023-14539-2","volume":"82","author":"V Thirunavukkarasu","year":"2023","unstructured":"Thirunavukkarasu, V., Kumar, A.S., Prakasam, P., Suresh, G.: Elliptic curve cryptography based key management and flexible authentication scheme for 5G wireless networks. Multimed. Tools Appl. 82, 1\u201315 (2023)","journal-title":"Multimed. Tools Appl."},{"key":"737_CR20","doi-asserted-by":"publisher","first-page":"102522","DOI":"10.1016\/j.simpat.2022.102522","volume":"117","author":"J Liu","year":"2022","unstructured":"Liu, J., Liu, L., Liu, Z., Lai, Y., Qin, H., Luo, S.: WSN node access authentication protocol based on trusted computing. Simul. Model. Pract. Theory 117, 102522 (2022)","journal-title":"Simul. Model. Pract. Theory"},{"key":"737_CR21","doi-asserted-by":"publisher","first-page":"102296","DOI":"10.1016\/j.sysarc.2021.102296","volume":"120","author":"AK Maurya","year":"2021","unstructured":"Maurya, A.K., Das, A.K., Jamal, S.S., Giri, D.: Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters. J. Syst. Architect. 120, 102296 (2021)","journal-title":"J. Syst. Architect."},{"issue":"6","key":"737_CR22","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1109\/TIFS.2013.2240299","volume":"8","author":"X Li","year":"2013","unstructured":"Li, X., Zhou, F., Junping, Du.: LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 8(6), 505\u2013924 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"737_CR23","doi-asserted-by":"publisher","first-page":"2405","DOI":"10.1007\/s11277-021-08335-0","volume":"119","author":"PS Khot","year":"2021","unstructured":"Khot, P.S., Naik, U.: Particle-water wave optimization for secure routing in wireless sensor network using cluster head selection. Wirel. Pers. Commun. 119, 2405\u20132429 (2021)","journal-title":"Wirel. Pers. Commun."},{"issue":"6","key":"737_CR24","doi-asserted-by":"publisher","first-page":"4723","DOI":"10.1007\/s11276-020-02351-x","volume":"26","author":"DK Sah","year":"2020","unstructured":"Sah, D.K., Amgoth, T.: A novel efficient clustering protocol for energy harvesting in wireless sensor networks. Wirel. Netw. 26(6), 4723\u20134737 (2020)","journal-title":"Wirel. Netw."},{"issue":"10","key":"737_CR25","first-page":"8564","volume":"34","author":"P Kathiroli","year":"2022","unstructured":"Kathiroli, P., Selvadurai, K.: Energy efficient cluster head selection using improved sparrow search algorithm in wireless sensor networks. J. King Saud Univ.-Comput. Inf. Sci. 34(10), 8564\u20138575 (2022)","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"737_CR26","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.70208","author":"N Shabbir","year":"2017","unstructured":"Shabbir, N., Hassan, S.R.: Routing protocols for wireless sensor networks (WSNs). Wirel. Sens. Netw. Insights Innov. (2017). https:\/\/doi.org\/10.5772\/intechopen.70208","journal-title":"Wirel. Sens. Netw. Insights Innov."},{"key":"737_CR27","doi-asserted-by":"crossref","unstructured":"Selvi, M., Nandhini, C., Thangaramya, K., Kulothungan, K. and Kannan, A.: HBO based clustering and energy optimized routing algorithm for WSN. In: 2016 Eighth International Conference on Advanced Computing (ICoAC)\u00a0(pp. 89\u201392). January 2017","DOI":"10.1109\/ICoAC.2017.7951751"},{"key":"737_CR28","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7940895","author":"BA Alqaralleh","year":"2022","unstructured":"Alqaralleh, B.A., Aldhaban, F., AlQaralleh, E.A., Kumar, A., Gupta, D., Joshi, G.P.: Swarm intelligence with adaptive neuro-fuzzy inference system-based routing protocol for clustered wireless sensor networks. Comput. Intell. Neurosci. (2022). https:\/\/doi.org\/10.1155\/2022\/7940895","journal-title":"Comput. Intell. Neurosci."},{"issue":"1","key":"737_CR29","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1186\/s13638-018-1067-8","volume":"2018","author":"Q Wang","year":"2018","unstructured":"Wang, Q., Guo, S., Hu, J., Yang, Y.: Spectral partitioning and fuzzy C- means based clustering algorithm for big data wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2018(1), 54 (2018)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"737_CR30","doi-asserted-by":"publisher","first-page":"66013","DOI":"10.1109\/ACCESS.2020.2985495","volume":"8","author":"S Lata","year":"2020","unstructured":"Lata, S., Mehfuz, S., Urooj, S., Alrowais, F.: Fuzzy clustering algorithm for enhancing reliability and network lifetime of wireless sensor networks. IEEE Access 8, 66013\u201366024 (2020)","journal-title":"IEEE Access"},{"key":"737_CR31","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/1362417","author":"VK Prasad","year":"2023","unstructured":"Prasad, V.K., Periyasamy, S.: energy optimization-based clustering protocols in wireless sensor networks and Internet of Things-survey. Int. J. Distrib. Sens. Netw. (2023). https:\/\/doi.org\/10.1155\/2023\/1362417","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"1","key":"737_CR32","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s13198-022-01796-x","volume":"14","author":"AK Rai","year":"2023","unstructured":"Rai, A.K., Daniel, A.K.: FEEC: fuzzy based energy efficient clustering protocol for WSN. Int. J. Syst. Assur. Eng. Manag. 14(1), 297\u2013307 (2023)","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"issue":"6","key":"737_CR33","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1049\/iet-wss.2015.0087","volume":"6","author":"A Ray","year":"2016","unstructured":"Ray, A., De, D.: Energy efficient clustering protocol based on K-means (EECPK-means)-midpoint algorithm for enhanced network lifetime in wireless sensor network. IET Wirel. Sens. Syst. 6(6), 181\u2013191 (2016)","journal-title":"IET Wirel. Sens. Syst."},{"key":"737_CR34","doi-asserted-by":"crossref","unstructured":"Gantassi, R., Masood, Z., Lim, S., Sias, Q.A. and Choi, Y.: Performance analysis of machine learning algorithms with clustering protocol in wireless sensor networks. In: 2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)\u00a0(pp. 543\u2013546). February 2023","DOI":"10.1109\/ICAIIC57133.2023.10067019"},{"key":"737_CR35","first-page":"1","volume":"2021","author":"M Ghaderzadeh","year":"2021","unstructured":"Ghaderzadeh, M., Asadi, F., Hosseini, A., Bashash, D., Abolghasemi, H., Roshanpour, A.: Machine learning in detection and classification of leukemia using smear blood images: a systematic review. Sci. Program. 2021, 1\u201314 (2021)","journal-title":"Sci. Program."},{"key":"737_CR36","doi-asserted-by":"publisher","first-page":"117334","DOI":"10.1016\/j.eswa.2022.117334","volume":"203","author":"J Amutha","year":"2022","unstructured":"Amutha, J., Sharma, S., Sharma, S.K.: An energy efficient cluster based hybrid optimization algorithm with static sink and mobile sink node for wireless sensor networks. Expert Syst. Appl. 203, 117334 (2022)","journal-title":"Expert Syst. Appl."},{"key":"737_CR37","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.fss.2021.07.018","volume":"438","author":"KK Le-Ngoc","year":"2022","unstructured":"Le-Ngoc, K.K., Tho, Q.T., Bui, T.H., Rahmani, A.M., Hosseinzadeh, M.: Optimized fuzzy clustering in wireless sensor networks using improved squirrel search algorithm. Fuzzy Sets Syst. 438, 121\u2013147 (2022)","journal-title":"Fuzzy Sets Syst."},{"key":"737_CR38","doi-asserted-by":"publisher","first-page":"102197","DOI":"10.1016\/j.cose.2021.102197","volume":"103","author":"J Jasper","year":"2021","unstructured":"Jasper, J.: A secure routing scheme to mitigate attack in wireless adhoc sensor network. Comput. Secur. 103, 102197 (2021)","journal-title":"Comput. Secur."},{"key":"737_CR39","doi-asserted-by":"crossref","unstructured":"Ghaderzadeh, M. and Aria, M.: Management of covid-19 detection using artificial intelligence in 2020 pandemic. In\u00a0Proceedings of the 5th International Conference on Medical and Health Informatics\u00a0(pp. 32\u201338). May 2021","DOI":"10.1145\/3472813.3472820"},{"key":"737_CR40","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s11047-015-9491-8","volume":"15","author":"RR Sahoo","year":"2016","unstructured":"Sahoo, R.R., Sardar, A.R., Singh, M., Ray, S., Sarkar, S.K.: A bio inspired and trust based approach for clustering in WSN. Nat. Comput. 15, 423\u2013434 (2016)","journal-title":"Nat. Comput."},{"key":"737_CR41","doi-asserted-by":"publisher","first-page":"1637","DOI":"10.1007\/s11277-019-06788-y","volume":"110","author":"T Kalidoss","year":"2020","unstructured":"Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., Kannan, A.: QoS aware trust based routing algorithm for wireless sensor networks. Wirel. Pers. Commun. 110, 1637\u20131658 (2020)","journal-title":"Wirel. Pers. Commun."},{"key":"737_CR42","doi-asserted-by":"publisher","first-page":"102215","DOI":"10.1016\/j.adhoc.2020.102215","volume":"106","author":"A Saidi","year":"2020","unstructured":"Saidi, A., Benahmed, K., Seddiki, N.: Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks. Ad Hoc Netw. 106, 102215 (2020)","journal-title":"Ad Hoc Netw."},{"key":"737_CR43","doi-asserted-by":"publisher","first-page":"3873","DOI":"10.1007\/s11276-021-02660-9","volume":"27","author":"SVN Santhosh Kumar","year":"2021","unstructured":"Santhosh Kumar, S.V.N., Palanichamy, Y., Selvi, M., Ganapathy, S., Kannan, A., Perumal, S.P.: Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks. Wirel. Netw. 27, 3873\u20133894 (2021)","journal-title":"Wirel. Netw."},{"key":"737_CR44","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1016\/j.future.2021.06.049","volume":"125","author":"T Khan","year":"2021","unstructured":"Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.: ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs. Futur. Gener. Comput. Syst. 125, 921\u2013943 (2021)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"737_CR45","doi-asserted-by":"crossref","unstructured":"Stephen, K.V.K. and Mathivanan, V.: An energy aware secure wireless network using particle swarm optimization. In: 2018 Majan international conference (MIC)\u00a0(pp. 1\u20136). March 2018","DOI":"10.1109\/MINTC.2018.8363148"},{"issue":"5","key":"737_CR46","first-page":"1857","volume":"34","author":"A Vinitha","year":"2022","unstructured":"Vinitha, A., Rukmini, M.S.S.: Secure and energy aware multi-hop routing protocol in WSN using Taylor-based hybrid optimization algorithm. J. King Saud Univ.-Comput. Inf. Sci. 34(5), 1857\u20131868 (2022)","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"737_CR47","doi-asserted-by":"publisher","first-page":"2761","DOI":"10.1007\/s11227-018-2693-y","volume":"75","author":"T Wang","year":"2019","unstructured":"Wang, T., Hu, K., Yang, X., Zhang, G., Wang, Y.: A trust enhancement scheme for cluster-based wireless sensor networks. J. Supercomput. 75, 2761\u20132788 (2019)","journal-title":"J. Supercomput."},{"key":"737_CR48","doi-asserted-by":"publisher","first-page":"53576","DOI":"10.1109\/ACCESS.2018.2865909","volume":"6","author":"TA Alghamdi","year":"2018","unstructured":"Alghamdi, T.A.: Secure and energy efficient path optimization technique in wireless sensor networks using DH method. IEEE Access 6, 53576\u201353582 (2018)","journal-title":"IEEE Access"},{"issue":"1\u20132","key":"737_CR49","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1504\/IJCAET.2020.108107","volume":"13","author":"HC Kantharaju","year":"2020","unstructured":"Kantharaju, H.C., Murthy, K.N.: Enhancing performance of WSN by utilising secure QoS-based explicit routing. Int. J. Comput. Aided Eng. Technol 13(1\u20132), 101\u2013124 (2020)","journal-title":"Int. J. Comput. Aided Eng. Technol"},{"key":"737_CR50","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12180","author":"M Gheisari","year":"2023","unstructured":"Gheisari, M., Ebrahimzadeh, F., Rahimi, M., Moazzamigodarzi, M., Liu, Y., Dutta Pramanik, P.K., Heravi, M.A., Mehbodniya, A., Ghaderzadeh, M., Feylizadeh, M.R., Kosari, S.: Deep learning: applications, architectures, models, tools, and frameworks: a comprehensive survey. CAAI Trans. Intell. Technol. (2023). https:\/\/doi.org\/10.1049\/cit2.12180","journal-title":"CAAI Trans. Intell. Technol."},{"key":"737_CR51","first-page":"1","volume-title":"Pairing-free identity-based digital signature algorithm for broadcast authentication based on modified ECC using battle royal optimization algorithm","author":"V Kumar","year":"2022","unstructured":"Kumar, V., Ray, S.: Pairing-free identity-based digital signature algorithm for broadcast authentication based on modified ECC using battle royal optimization algorithm, pp. 1\u201325. Wireless Personal Communications, Springer, London (2022)"},{"key":"737_CR52","doi-asserted-by":"crossref","unstructured":"Jain, U. and Hussain, M.: Simple, secure and dynamic protocol for mutual authentication of nodes in wireless sensor networks. In: 2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT)\u00a0(pp. 1\u20137). February 2017","DOI":"10.1109\/ICECCT.2017.8117951"},{"key":"737_CR53","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1007\/s11276-015-1013-1","volume":"22","author":"R Logambigai","year":"2016","unstructured":"Logambigai, R., Kannan, A.: Fuzzy logic based unequal clustering for wireless sensor networks. Wirel. Netw. 22, 945\u2013957 (2016)","journal-title":"Wirel. Netw."},{"key":"737_CR54","doi-asserted-by":"crossref","unstructured":"Alghamdi, W.Y., Wu, H. and Kanhere, S.S.: Reliable and secure end-to-end data aggregation using secret sharing in wsns. In: 2017 IEEE Wireless Communications and Networking Conference (WCNC)\u00a0(pp. 1\u20136). IEEE. March 2017","DOI":"10.1109\/WCNC.2017.7925558"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00737-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00737-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00737-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T02:06:06Z","timestamp":1705975566000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00737-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,3]]},"references-count":54,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["737"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00737-4","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,3]]},"assertion":[{"value":"21 July 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There are no competing interests among the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}