{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T15:25:01Z","timestamp":1773933901753,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T00:00:00Z","timestamp":1762819200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T00:00:00Z","timestamp":1762819200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10586-025-05665-7","type":"journal-article","created":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T20:27:45Z","timestamp":1762892865000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Improving the network efficiency of IoT using embedded fault-resilient services"],"prefix":"10.1007","volume":"29","author":[{"given":"Mohana","family":"Farzin","sequence":"first","affiliation":[]},{"given":"Azadeh Alsadat Emrani","family":"Zarandi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,11]]},"reference":[{"key":"5665_CR1","doi-asserted-by":"crossref","unstructured":"Balakrishnan, D., Rajkumar, T.D., Dhanasekaran, S., Murugan, B.: Cluster Comput. 27(3), 2999\u20133016 (2024). Secure and energy-efficient data transmission framework for IoT-based healthcare applications using EMCQLR and EKECC,","DOI":"10.1007\/s10586-023-04130-7"},{"key":"5665_CR2","doi-asserted-by":"crossref","unstructured":"Saemi, B., Hosseinbadi, A.A.R., Khodadadi, A., Mirkamali, S., Abraham, A.: Solving task scheduling problem in mobile cloud computing using the hybrid multi-objective Harris Hawks optimization algorithm. IEEE Access. 11, 125033\u2013125054 (2023)","DOI":"10.1109\/ACCESS.2023.3329069"},{"issue":"2","key":"5665_CR3","doi-asserted-by":"publisher","first-page":"1313","DOI":"10.1007\/s10586-023-04005-x","volume":"27","author":"K Abedpour","year":"2024","unstructured":"Abedpour, K., Hosseini Shirvani, M., Abedpour, E.: A genetic-based clustering algorithm for efficient resource allocating of IoT applications in layered fog heterogeneous platforms. Cluster Comput. 27(2), 1313\u20131331 (2024)","journal-title":"Cluster Comput."},{"key":"5665_CR4","doi-asserted-by":"crossref","unstructured":"Neelamegam, D., Bhuvaneswari, P.: Improving Energy Efficiency in next-generation IoT Networks with Beam Adjustment Technique, in Recent Advancement of IoT Devices in Pollution Control and Health Applications, pp. 153\u2013166. Elsevier (2023)","DOI":"10.1016\/B978-0-323-95876-9.00004-5"},{"key":"5665_CR5","doi-asserted-by":"crossref","unstructured":"Bozorgi, S.M., Hajiabadi, M.R., Hosseinabadi, A.A.R., Sangaiah, A.K.: Clustering based on Whale optimization algorithm for IoT over wireless nodes. Soft Comput. 25(7), 5663\u20135682 (2021)","DOI":"10.1007\/s00500-020-05563-7"},{"key":"5665_CR6","doi-asserted-by":"crossref","unstructured":"Varastan, B., Jamali, S., Fotohi, R.: Hardening of the internet of things by using an intrusion detection system based on deep learning. Cluster Comput. 27, 2465\u20132488 (2024)","DOI":"10.1007\/s10586-023-04097-5"},{"key":"5665_CR7","doi-asserted-by":"crossref","unstructured":"Sterbenz, J.P.: Smart city and IoT resilience, survivability, and disruption tolerance: Challenges, modelling, and a survey of research opportunities, in 2017 9th international workshop on resilient networks design and modeling (RNDM), : IEEE, pp. 1\u20136. (2017)","DOI":"10.1109\/RNDM.2017.8093025"},{"key":"5665_CR8","unstructured":"Foster, K.A.: A case study approachto understanding regional resilience, (2007)"},{"key":"5665_CR9","doi-asserted-by":"crossref","unstructured":"Sangaiah, A.K., Hosseinabadi, A.A.R., Shareh, M.B., Bozorgi Rad, S.Y., Zolfagharian, A., Chilamkurti, N.: IoT resource allocation and optimization based on heuristic algorithm, Sensors, vol. 20, no. 2, p. 539, (2020)","DOI":"10.3390\/s20020539"},{"issue":"6","key":"5665_CR10","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1007\/s11036-020-01661-w","volume":"25","author":"MA Khoshkholghi","year":"2020","unstructured":"Khoshkholghi, M.A., et al.: Service function chain placement for joint cost and latency optimization. Mob. Networks Appl. 25(6), 2191\u20132205 (2020)","journal-title":"Mob. Networks Appl."},{"key":"5665_CR11","first-page":"100508","volume":"30","author":"S Banyal","year":"2021","unstructured":"Banyal, S., Bharadwaj, K.K., Sharma, D.K., Khanna, A., Rodrigues, J.J.: HiLSeR: Hierarchical learning-based sectionalised routing paradigm for pervasive communication and resource efficiency in opportunistic IoT network. Sustainable Computing: Inf. Syst. 30, 100508 (2021)","journal-title":"Sustainable Computing: Inf. Syst."},{"issue":"4","key":"5665_CR12","doi-asserted-by":"publisher","first-page":"2396","DOI":"10.1109\/TSC.2021.3052219","volume":"15","author":"M Bahutair","year":"2021","unstructured":"Bahutair, M., Bouguettaya, A., Neiat, A.G.: Multi-perspective trust management framework for crowdsourced IoT services. IEEE Trans. Serv. Comput. 15(4), 2396\u20132409 (2021)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"2","key":"5665_CR13","first-page":"1199","volume":"42","author":"S Ajith Kumar","year":"2022","unstructured":"Ajith Kumar, S., Banyal, S., Bhardwaj, K.K., Thakur, H.K., Sharma, D.K.: Distributed probability density based multi-objective routing for Opp-IoT networks enabled by machine learning. J. Intell. Fuzzy Syst. 42(2), 1199\u20131211 (2022)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"5665_CR14","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1016\/j.comcom.2020.02.006","volume":"153","author":"G Chen","year":"2020","unstructured":"Chen, G., Jiang, T., Wang, M., Tang, X., Ji, W.: Modeling and reasoning of IoT architecture in semantic ontology dimension. Comput. Commun. 153, 580\u2013594 (2020)","journal-title":"Comput. Commun."},{"key":"5665_CR15","doi-asserted-by":"publisher","first-page":"145469","DOI":"10.1109\/ACCESS.2020.3014736","volume":"8","author":"H Bello-Salau","year":"2020","unstructured":"Bello-Salau, H., Onumanyi, A.J., Abu-Mahfouz, A.M., Adejo, A.O., Mu\u2019Azu, M.B.: New discrete cuckoo search optimization algorithms for effective route discovery in IoT-based vehicular ad-hoc networks. IEEE Access. 8, 145469\u2013145488 (2020)","journal-title":"IEEE Access."},{"issue":"5","key":"5665_CR16","doi-asserted-by":"publisher","first-page":"2538","DOI":"10.1109\/TSC.2021.3064329","volume":"15","author":"AG Neiat","year":"2021","unstructured":"Neiat, A.G., Bouguettaya, A., Bahutair, M.: A deep reinforcement learning approach for composing moving IoT services. IEEE Trans. Serv. Comput. 15(5), 2538\u20132550 (2021)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"5665_CR17","doi-asserted-by":"crossref","unstructured":"Pramanik, P.K.D., Choudhury, P.: Mobility-aware service provisioning for delay tolerant applications in a mobile crowd computing environment. SN Appl. Sci. 2(3), 403 (2020)","DOI":"10.1007\/s42452-020-2212-7"},{"key":"5665_CR18","doi-asserted-by":"crossref","unstructured":"Saemi, B., Sadeghilalimi, M., Hosseinabadi, A.A.R., Mouhoub, M., Sadaoui, S.: A new optimization approach for task scheduling problem using water cycle algorithm in mobile cloud computing. In: 2021 2021IEEE Congress on Evolutionary Computation (CEC), : IEEE, pp. 530\u2013539. (2021)","DOI":"10.1109\/CEC45853.2021.9504780"},{"key":"5665_CR19","unstructured":"Wang, Y.: System resilience quantification for probabilistic design of Internet-of-Things architecture, in International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, vol. 50084: American Society of Mechanical Engineers, p. V01BT02A011. (2016)"},{"key":"5665_CR20","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.adhoc.2015.01.006","volume":"32","author":"KT Nguyen","year":"2015","unstructured":"Nguyen, K.T., Laurent, M., Oualha, N.: Survey on secure communication protocols for the internet of things. Ad Hoc Netw. 32, 17\u201331 (2015)","journal-title":"Ad Hoc Netw."},{"key":"5665_CR21","doi-asserted-by":"crossref","unstructured":"Alanazi, S., et al.: On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications, in 2015 17th International Conference on E-health Networking, Application & Services (HealthCom), : IEEE, pp. 205\u2013210. (2015)","DOI":"10.1109\/HealthCom.2015.7454499"},{"issue":"4","key":"5665_CR22","doi-asserted-by":"publisher","first-page":"4313","DOI":"10.1007\/s12652-023-04541-9","volume":"14","author":"P Pirozmand","year":"2023","unstructured":"Pirozmand, P., Jalalinejad, H., Hosseinabadi, A.A.R., Mirkamali, S., Li, Y.: An improved particle swarm optimization algorithm for task scheduling in cloud computing. J. Ambient Intell. Humaniz. Comput. 14(4), 4313\u20134327 (2023)","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"5665_CR23","doi-asserted-by":"crossref","unstructured":"Xing, F., Wang, W.: Analyzing resilience to node misbehaviors in wireless multi-hop networks, in 2007 IEEE Wireless Communications and Networking Conference, : IEEE, pp. 3489\u20133494. (2007)","DOI":"10.1109\/WCNC.2007.640"},{"key":"5665_CR24","doi-asserted-by":"crossref","unstructured":"Tsado, Y., Lund, D., Gamage, K.: Resilient wireless communication networking for Smart grid BAN, in 2014 IEEE International Energy Conference (ENERGYCON), : IEEE, pp. 846\u2013851. (2014)","DOI":"10.1109\/ENERGYCON.2014.6850524"},{"key":"5665_CR25","doi-asserted-by":"crossref","unstructured":"Singh, R., Sharma, K.P., Awasthi, L.K.: A machine learning-based ensemble model for Securing the IoT network. Cluster comput. 27, 10883\u201310897 (2024)","DOI":"10.1007\/s10586-024-04519-y"},{"key":"5665_CR26","doi-asserted-by":"crossref","unstructured":"Zhao, W., et al.: Enhanced K-NN with bayesian optimization algorithm for predicting energy efficiency of smart grids in IoT. Cluster Comput. 27, 12311\u201312322 (2024)","DOI":"10.1007\/s10586-024-04480-w"},{"key":"5665_CR27","doi-asserted-by":"crossref","unstructured":"Alwan, H., Agarwal, A.: A survey on fault tolerant routing techniques in wireless sensor networks, in 2009 third international conference on sensor technologies and applications, : IEEE, pp. 366\u2013371. (2009)","DOI":"10.1109\/SENSORCOMM.2009.62"},{"key":"5665_CR28","doi-asserted-by":"crossref","unstructured":"Wang, X., Xing, G., Zhang, Y., Lu, C., Pless, R., Gill, C.: Integrated coverage and connectivity configuration in wireless sensor networks, in Proceedings of the 1st international conference on Embedded networked sensor systems, pp. 28\u201339. (2003)","DOI":"10.1145\/958491.958496"},{"issue":"7","key":"5665_CR29","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1016\/j.jpdc.2005.12.010","volume":"66","author":"F Dai","year":"2006","unstructured":"Dai, F., Wu, J.: On constructing k-connected k-dominating set in wireless ad hoc and sensor networks. J. Parallel Distrib. Comput. 66(7), 947\u2013958 (2006)","journal-title":"J. Parallel Distrib. Comput."},{"key":"5665_CR30","doi-asserted-by":"crossref","unstructured":"Vasilev, V., Iliev, G., Poulkov, V., Mihovska, A.: Optimization of Wireless Node Discovery in an IoT Network, in 2015 IEEE Globecom Workshops (GC Wkshps), pp. 1\u20135. IEEE (2015)","DOI":"10.1109\/GLOCOMW.2015.7414153"},{"key":"5665_CR31","first-page":"123571","volume":"8","author":"HQ Al-Shammari","year":"2020","unstructured":"Al-Shammari, H.Q., Lawey, A.Q., El-Gorashi, T.E., Elmirghani, J.M.: Resilient Service Embedding IoT Networks IEEE Access. 8, 123571\u2013123584 (2020)","journal-title":"Resilient Service Embedding IoT Networks IEEE Access."},{"issue":"1","key":"5665_CR32","doi-asserted-by":"publisher","first-page":"16","DOI":"10.3390\/jsan8010016","volume":"8","author":"N Abbas","year":"2019","unstructured":"Abbas, N., Asim, M., Tariq, N., Baker, T., Abbas, S.: A mechanism for Securing IoT-enabled applications at the fog layer. J. Sens. Actuator Networks. 8(1), 16 (2019)","journal-title":"J. Sens. Actuator Networks"},{"key":"5665_CR33","doi-asserted-by":"crossref","unstructured":"Liang, X., Zhao, J., Shetty, S., Li, D.: Towards data assurance and resilience in IoT using blockchain, in MILCOM 2017\u20132017 IEEE Military Communications Conference (MILCOM), : IEEE, pp. 261\u2013266. (2017)","DOI":"10.1109\/MILCOM.2017.8170858"},{"key":"5665_CR34","doi-asserted-by":"crossref","unstructured":"Al-Khafajiy, M., Baker, T., Al-Libawy, H., Waraich, A., Chalmers, C., Alfandi, O.: Fog computing framework for internet of things applications, in 2018 11th International Conference on Developments in eSystems Engineering (DeSE), : IEEE, pp. 71\u201377. (2018)","DOI":"10.1109\/DeSE.2018.00017"},{"issue":"5","key":"5665_CR35","doi-asserted-by":"publisher","first-page":"3578","DOI":"10.1109\/TII.2019.2922699","volume":"16","author":"I Al Ridhawi","year":"2019","unstructured":"Al Ridhawi, I., Kotb, Y., Aloqaily, M., Jararweh, Y., Baker, T.: A profitable and energy-efficient cooperative fog solution for IoT services. IEEE Trans. Industr. Inf. 16(5), 3578\u20133586 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"5665_CR36","doi-asserted-by":"crossref","unstructured":"Sandor, H., Genge, B., Sebestyen-Pal, G.: Resilience in the Internet of Things: The software defined networking approach, in 2015 IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), : IEEE, pp. 545\u2013552. (2015)","DOI":"10.1109\/ICCP.2015.7312717"},{"key":"5665_CR37","doi-asserted-by":"crossref","unstructured":"Gusev, M., Ristov, S., Prodan, R., Dzanko, M., Bilic, I.: Resilient IoT eHealth solutions in case of disasters, in 2017 9th International Workshop on Resilient Networks Design and Modeling (RNDM), : IEEE, pp. 1\u20137. (2017)","DOI":"10.1109\/RNDM.2017.8093024"},{"key":"5665_CR38","doi-asserted-by":"crossref","unstructured":"Kim, H., Kang, E., Broman, D., Lee, E.A.: An architectural mechanism for resilient IoT services, in Proceedings of the 1st ACM Workshop on the Internet of Safe Things, pp. 8\u201313. (2017)","DOI":"10.1145\/3137003.3137010"},{"key":"5665_CR39","doi-asserted-by":"crossref","first-page":"3940","DOI":"10.1109\/TIFS.2019.2924555","volume":"15","author":"HM Almohri","year":"2020","unstructured":"Almohri, H.M., Watson, L.T., Evans, D.: An attack-resilient architecture for the internet of things. IEEE Trans. Inf. Forensics Secur. 15, 3940\u20133954 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5665_CR40","doi-asserted-by":"publisher","first-page":"13260","DOI":"10.1109\/ACCESS.2019.2891969","volume":"7","author":"D Ratasich","year":"2019","unstructured":"Ratasich, D., Khalid, F., Geissler, F., Grosu, R., Shafique, M., Bartocci, E.: A roadmap toward the resilient internet of things for cyber-physical systems. IEEE Access. 7, 13260\u201313283 (2019)","journal-title":"IEEE Access."},{"key":"5665_CR41","first-page":"2948","volume":"8","author":"HQ Al-Shammari","year":"2019","unstructured":"Al-Shammari, H.Q., Lawey, A.Q., El-Gorashi, T.E., Elmirghani, J.M.: Service Embedding IoT Networks IEEE Access. 8, 2948\u20132962 (2019)","journal-title":"Service Embedding IoT Networks IEEE Access."},{"key":"5665_CR42","doi-asserted-by":"crossref","unstructured":"Camarinha-Matos, L.M., Tomic, S., Gra\u00e7a, P.: Technological Innovation for the Internet of Things: 4th IFIP WG 5.5\/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2013, Costa de Caparica, Portugal, April 15\u201317, Proceedings. Springer, 2013. (2013)","DOI":"10.1007\/978-3-642-37291-9"},{"issue":"2","key":"5665_CR43","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/JIOT.2014.2301819","volume":"1","author":"J Huang","year":"2014","unstructured":"Huang, J., Meng, Y., Gong, X., Liu, Y., Duan, Q.: A novel deployment scheme for green internet of things. IEEE Internet Things J. 1(2), 196\u2013205 (2014)","journal-title":"IEEE Internet Things J."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05665-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05665-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05665-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T13:07:17Z","timestamp":1773925637000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05665-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,11]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["5665"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05665-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,11]]},"assertion":[{"value":"30 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights statement"}}],"article-number":"19"}}