{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T17:08:03Z","timestamp":1776186483800,"version":"3.50.1"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"S3","license":[{"start":{"date-parts":[[2018,3,12]],"date-time":"2018-03-12T00:00:00Z","timestamp":1520812800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373174"],"award-info":[{"award-number":["61373174"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Fundamental Research Funds for the Central Universities","award":["JB150716"],"award-info":[{"award-number":["JB150716"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s10586-018-2394-6","type":"journal-article","created":{"date-parts":[[2018,3,12]],"date-time":"2018-03-12T12:58:14Z","timestamp":1520859494000},"page":"7677-7685","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks"],"prefix":"10.1007","volume":"22","author":[{"given":"Zhaohui","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Sanyang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yiguang","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Yalin","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,12]]},"reference":[{"key":"2394_CR1","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.future.2013.12.021","volume":"37","author":"H Li","year":"2014","unstructured":"Li, H., Li, K., Qu, W., Stojmennovic, I.: Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks. Future Gener. Comput. Syst. 37, 108\u2013116 (2014)","journal-title":"Future Gener. Comput. Syst."},{"key":"2394_CR2","first-page":"1","volume":"99","author":"W Lu","year":"2017","unstructured":"Lu, W., Gong, Y., Liu, X., et al.: Collaborative energy and information transfer in green wireless sensor networks for smart cities. IEEE Trans. Ind. Inf. 99, 1\u20131 (2017)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"2394_CR3","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.jnca.2015.12.001","volume":"61","author":"AK Mishra","year":"2016","unstructured":"Mishra, A.K., Turuk, A.K.: A comparative analysis of node replica detection schemes in wireless sensor networks. J. Netw. Comput. Appl. 61, 21\u201332 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"2394_CR4","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.1016\/j.jpdc.2007.04.014","volume":"67","author":"B Xiao","year":"2007","unstructured":"Xiao, B., Yu, B., Gao, C.: CHEMAS: identify suspect nodes in selective forwarding attacks. J. Parallel Distrib. Comput. 67, 1218\u20131230 (2007)","journal-title":"J. Parallel Distrib. Comput."},{"key":"2394_CR5","first-page":"1","volume":"2","author":"RJ Kavitha","year":"2017","unstructured":"Kavitha, R.J., Caroline, B.E.: Secured and reliable data transmission on multi-hop wireless sensor network. Clust. Comput. 2, 1\u201310 (2017)","journal-title":"Clust. Comput."},{"key":"2394_CR6","doi-asserted-by":"crossref","unstructured":"Salehi, S.A., Razzaque, M.A., Naraei, P., Farrokhtala, A.: Detection of sinkhole attack in wireless sensor networks. In: Proceedings of the 2013 IEEE International Conference on Space Science and Communication, pp. 361\u2013365 (2013)","DOI":"10.1109\/IconSpace.2013.6599496"},{"issue":"3","key":"2394_CR7","first-page":"50","volume":"7","author":"A Ibrahim","year":"2015","unstructured":"Ibrahim, A., Rahman, M.M., Roy, M.C.: Detecting sinkhole attacks in wireless sensor network using hop count. Int. J. Comput. Netw. Inf. Secur. 7(3), 50\u201356 (2015)","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"2394_CR8","unstructured":"Tumrongwittayapak, C., Varakulsiripunth, R.: Detecting sinkhole attacks in wireless sensor networks. In: ICROS-SICE International Joint Conference, pp. 1966\u20131971 (2009)"},{"key":"2394_CR9","doi-asserted-by":"crossref","unstructured":"Qi, J., Hong, T., Kuang, X.H., Liu, Q.: Detection and defense of sinkhole attack in wireless sensor network. In: 2012 IEEE 14th International Conference on Communication Technology (ICCT), pp. 809\u2013813 (2012)","DOI":"10.1109\/ICCT.2012.6511315"},{"key":"2394_CR10","first-page":"97","volume":"72","author":"GJ Han","year":"2013","unstructured":"Han, G.J., Jiang, J.F., Shen, W., Shu, L., Rodrigues, J.: IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks. Inst. Eng. Technol. 72, 97\u2013105 (2013)","journal-title":"Inst. Eng. Technol."},{"key":"2394_CR11","first-page":"171","volume":"31","author":"FJ Zhang","year":"2014","unstructured":"Zhang, F.J., Zhai, L.D., Yang, J.C., Cui, X.: Sinkhole attack detection based on redundancy mechanism in wireless sensor networks. Procedia Comput. Sci. 31, 171\u2013720 (2014)","journal-title":"Procedia Comput. Sci."},{"issue":"2","key":"2394_CR12","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1002\/qre.392","volume":"17","author":"N Ye","year":"2001","unstructured":"Ye, N., Chen, Q.: An anomaly detection technique based on a Chi square statistic for detecting intrusions into information systems. Qual. Reliab. Eng. Int. 17(2), 105\u2013112 (2001)","journal-title":"Qual. Reliab. Eng. Int."},{"key":"2394_CR13","doi-asserted-by":"crossref","unstructured":"Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless micro sensor networks. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, pp. 1\u201310 (2000)","DOI":"10.1109\/HICSS.2000.926982"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2394-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-018-2394-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2394-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T18:35:03Z","timestamp":1751481303000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-018-2394-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,12]]},"references-count":13,"journal-issue":{"issue":"S3","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["2394"],"URL":"https:\/\/doi.org\/10.1007\/s10586-018-2394-6","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,12]]},"assertion":[{"value":"27 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}