{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T17:33:53Z","timestamp":1775842433489,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T00:00:00Z","timestamp":1763683200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T00:00:00Z","timestamp":1763683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10586-025-05820-0","type":"journal-article","created":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T14:20:18Z","timestamp":1763734818000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Improved secure three-factor-based mutual authentication scheme for wireless sensor networks in internet of things environments"],"prefix":"10.1007","volume":"29","author":[{"given":"Seungmin","family":"Byun","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8124-3853","authenticated-orcid":false,"given":"Jihyeon","family":"Ryu","sequence":"additional","affiliation":[]},{"given":"Younsung","family":"Choi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5777-4256","authenticated-orcid":false,"given":"Hakjun","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,21]]},"reference":[{"issue":"10","key":"5820_CR1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3745","volume":"30","author":"D Kaur","year":"2019","unstructured":"Kaur, D., Kumar, D., Saini, K.K., Grover, H.S.: An improved user authentication protocol for wireless sensor networks. Transactions on Emerging Telecommunications Technologies 30(10), e3745 (2019)","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"1","key":"5820_CR2","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1109\/JSYST.2020.2981049","volume":"15","author":"F Wu","year":"2020","unstructured":"Wu, F., Li, X., Xu, L., Vijayakumar, P., Kumar, N.: A novel three-factor authentication protocol for wireless sensor networks with iot notion. IEEE Syst. J. 15(1), 1120\u20131129 (2020)","journal-title":"IEEE Syst. J."},{"key":"5820_CR3","doi-asserted-by":"crossref","unstructured":"Vaidya, B., Makrakis, D., Mouftah, H.T.: Improved two-factor user authentication in wireless sensor networks, in 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (IEEE, 2010), pp. 600\u2013606","DOI":"10.1109\/WIMOB.2010.5645004"},{"issue":"9","key":"5820_CR4","doi-asserted-by":"publisher","first-page":"4081","DOI":"10.1109\/TII.2018.2834351","volume":"14","author":"D Wang","year":"2018","unstructured":"Wang, D., Li, W., Wang, P.: Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Transactions on Industrial Informatics 14(9), 4081\u20134092 (2018)","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"5820_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3264565","author":"SS Sahoo","year":"2023","unstructured":"Sahoo, S.S., Mohanty, S., Sahoo, K.S., Daneshmand, M., Gandomi, A.H.: A three factor based authentication scheme of 5g wireless sensor networks for iot system. IEEE Internet of Things Journal (2023). https:\/\/doi.org\/10.1109\/JIOT.2023.3264565","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"5820_CR6","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0232277","volume":"15","author":"CT Chen","year":"2020","unstructured":"Chen, C.T., Lee, C.C., Lin, I.C.: Efficient and secure three-party mutual authentication key agreement protocol for wsns in iot environments. PLoS ONE 15(4), e0232277 (2020)","journal-title":"PLoS ONE"},{"issue":"15","key":"5820_CR7","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: A survey. Computer Networks 54(15), 2787\u20132805 (2010)","journal-title":"Computer Networks"},{"key":"5820_CR8","unstructured":"Nack, F.: An overview on wireless sensor networks. Institute of Computer Science (ICS), Freie Universit\u00e4t Berlin 6 (2010)"},{"issue":"3","key":"5820_CR9","doi-asserted-by":"publisher","first-page":"4938","DOI":"10.1109\/JSYST.2021.3127438","volume":"16","author":"S Zou","year":"2021","unstructured":"Zou, S., Cao, Q., Wang, C., Huang, Z., Xu, G.: A robust two-factor user authentication scheme-based ecc for smart home in iot. IEEE Syst. J. 16(3), 4938\u20134949 (2021)","journal-title":"IEEE Syst. J."},{"key":"5820_CR10","doi-asserted-by":"publisher","first-page":"101330","DOI":"10.1109\/ACCESS.2022.3208347","volume":"10","author":"Y Cho","year":"2022","unstructured":"Cho, Y., Oh, J., Kwon, D., Son, S., Lee, J., Park, Y.: A secure and anonymous user authentication scheme for iot-enabled smart home environments using puf. IEEE Access 10, 101330\u2013101346 (2022)","journal-title":"IEEE Access"},{"issue":"1","key":"5820_CR11","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/2098530","volume":"2021","author":"H Lee","year":"2021","unstructured":"Lee, H., Kang, D., Lee, Y., Won, D.: Secure three-factor anonymous user authentication scheme for cloud computing environment. Wireless Communications and Mobile Computing 2021(1), 2098530 (2021)","journal-title":"Wireless Communications and Mobile Computing"},{"key":"5820_CR12","doi-asserted-by":"crossref","unstructured":"Nogia, Y., Singh, S., Tyagi, V.: Multifactor authentication schemes for multiserver based wireless application: a review, in 2023 third international conference on secure cyber computing and communication (ICSCCC) (IEEE, 2023), pp. 196\u2013201","DOI":"10.1109\/ICSCCC58608.2023.10177011"},{"issue":"11","key":"5820_CR13","doi-asserted-by":"publisher","DOI":"10.3390\/sym14112394","volume":"14","author":"X Wang","year":"2022","unstructured":"Wang, X., Teng, Y., Chi, Y., Hu, H.: A robust and anonymous three-factor authentication scheme based ecc for smart home environments. Symmetry 14(11), 2394 (2022)","journal-title":"Symmetry"},{"key":"5820_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3442619","author":"VO Nyangaresi","year":"2024","unstructured":"Nyangaresi, V.O., Alsolami, E., Ahmad, M.: Trust-enabled energy efficient protocol for secure remote sensing in supply chain management. IEEE Access (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3442619","journal-title":"IEEE Access"},{"issue":"6","key":"5820_CR15","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12061368","volume":"12","author":"J Lee","year":"2023","unstructured":"Lee, J., Oh, J., Park, Y.: A secure and anonymous authentication protocol based on three-factor wireless medical sensor networks. Electronics 12(6), 1368 (2023)","journal-title":"Electronics"},{"issue":"1","key":"5820_CR16","doi-asserted-by":"publisher","DOI":"10.3390\/electronics14010010","volume":"14","author":"J Mo","year":"2024","unstructured":"Mo, J., Zhang, Z., Lin, Y.: A practically secure two-factor and mutual authentication protocol for distributed wireless sensor networks using puf. Electronics 14(1), 10 (2024)","journal-title":"Electronics"},{"issue":"2","key":"5820_CR17","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1007\/s10207-023-00770-3","volume":"23","author":"G Tyagi","year":"2024","unstructured":"Tyagi, G., Kumar, R.: An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function. Int. J. Inf. Secur. 23(2), 935\u2013962 (2024)","journal-title":"Int. J. Inf. Secur."},{"issue":"1","key":"5820_CR18","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-52134-z","volume":"14","author":"W Huang","year":"2024","unstructured":"Huang, W.: Ecc-based three-factor authentication and key agreement scheme for wireless sensor networks. Sci. Rep. 14(1), 1787 (2024)","journal-title":"Sci. Rep."},{"issue":"6","key":"5820_CR19","doi-asserted-by":"publisher","first-page":"4264","DOI":"10.1007\/s12083-024-01806-8","volume":"17","author":"CM Kumar","year":"2024","unstructured":"Kumar, C.M., Dwivedi, S.K., Brindha, M., Al-Shehari, T., Alfakih, T., Alsalman, H., Amin, R.: Repaca: Robust ecc based privacy-controlled mutual authentication and session key sharing protocol in coalmines application with provable security. Peer-to-Peer Networking and Applications 17(6), 4264\u20134285 (2024)","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"5820_CR20","unstructured":"Liu, K., Guan, J., Hu, X., Zhang, J., Liu, J., Zhang, H.: Aeaka: An adaptive and efficient authentication and key agreement scheme for iot in cloud-edge-device collaborative environments. arXiv preprint arXiv:2411.09231 (2024)"},{"issue":"9","key":"5820_CR21","doi-asserted-by":"publisher","first-page":"16325","DOI":"10.1109\/JIOT.2024.3351892","volume":"11","author":"J Cui","year":"2024","unstructured":"Cui, J., Zhu, Y., Zhong, H., Zhang, Q., Gu, C., He, D.: Efficient blockchain-based mutual authentication and session key agreement for cross-domain iiot. IEEE Internet Things J. 11(9), 16325\u201316338 (2024)","journal-title":"IEEE Internet Things J."},{"key":"5820_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3529309","author":"MA Aleisa","year":"2025","unstructured":"Aleisa, M.A.: Blockchain-enabled zero trust architecture for privacy-preserving cybersecurity in iot environments. IEEE Access (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3529309","journal-title":"IEEE Access"},{"issue":"1","key":"5820_CR23","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyaf004","volume":"11","author":"S Fathenojavan","year":"2025","unstructured":"Fathenojavan, S., Moeini, A., Javadi, H.H.S.: A post-quantum lattice-based lightweight anonymous authentication scheme for iot. Journal of Cybersecurity 11(1), tyaf004 (2025)","journal-title":"Journal of Cybersecurity"},{"key":"5820_CR24","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/s10623-015-0096-0","volume":"77","author":"E Andreeva","year":"2015","unstructured":"Andreeva, E., Mennink, B., Preneel, B.: Open problems in hash function security. Designs, Codes and Cryptography 77, 611\u2013631 (2015)","journal-title":"Designs, Codes and Cryptography"},{"key":"5820_CR25","doi-asserted-by":"crossref","unstructured":"Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance, in Fast Software Encryption: 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004. Revised Papers 11 (Springer, 2004), pp. 371\u2013388","DOI":"10.1007\/978-3-540-25937-4_24"},{"issue":"3\u20134","key":"5820_CR26","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.cose.2008.04.001","volume":"27","author":"JL Tsai","year":"2008","unstructured":"Tsai, J.L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Computers & Security 27(3\u20134), 115\u2013121 (2008)","journal-title":"Computers & Security"},{"key":"5820_CR27","doi-asserted-by":"publisher","first-page":"844","DOI":"10.1007\/s00145-014-9185-x","volume":"28","author":"M Bellare","year":"2015","unstructured":"Bellare, M.: New proofs for nmac and hmac: Security without collision resistance. J. Cryptol. 28, 844\u2013878 (2015)","journal-title":"J. Cryptol."},{"issue":"5","key":"5820_CR28","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0176250","volume":"12","author":"Y Choi","year":"2017","unstructured":"Choi, Y., Lee, Y., Moon, J., Won, D.: Security enhanced multi-factor biometric authentication scheme using bio-hash function. PLoS ONE 12(5), e0176250 (2017)","journal-title":"PLoS ONE"},{"key":"5820_CR29","doi-asserted-by":"crossref","unstructured":"Che, W., Saqib, F., Plusquellic, J.: PUF-based authentication, in 2015 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD) (IEEE, 2015), pp. 337\u2013344","DOI":"10.1109\/ICCAD.2015.7372589"},{"key":"5820_CR30","doi-asserted-by":"crossref","unstructured":"Taniguchi, M., Shiozaki, M., Kubo, H., Fujino, T.: A stable key generation from PUF responses with a Fuzzy Extractor for cryptographic authentications, in 2013 IEEE 2nd Global Conference on Consumer Electronics (GCCE) (IEEE, 2013), pp. 525\u2013527","DOI":"10.1109\/GCCE.2013.6664910"},{"key":"5820_CR31","doi-asserted-by":"crossref","unstructured":"Liu, J.K., Baek, J., Zhou, J.: Online\/offline identity-based signcryption revisited, in Information Security and Cryptology: 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers 6 (Springer, 2011), pp. 36\u201351","DOI":"10.1007\/978-3-642-21518-6_3"},{"issue":"1","key":"5820_CR32","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.comcom.2006.07.012","volume":"30","author":"J Munilla","year":"2006","unstructured":"Munilla, J., Peinado, A.: Off-line password-guessing attack to peyravian-jeffries\u2019s remote user authentication protocol. Computer Communications 30(1), 52\u201354 (2006)","journal-title":"Computer Communications"},{"issue":"1","key":"5820_CR33","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1109\/JSEN.2015.2475298","volume":"16","author":"P Kumar","year":"2015","unstructured":"Kumar, P., Gurtov, A., Iinatti, J., Ylianttila, M., Sain, M.: Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens. J. 16(1), 254\u2013264 (2015)","journal-title":"IEEE Sens. J."},{"key":"5820_CR34","doi-asserted-by":"crossref","unstructured":"Zhu, W.T.: Node replication attacks in wireless sensor networks: bypassing the neighbor-based detection scheme, in 2011 International Conference on Network Computing and Information Security, vol.\u00a02 (IEEE, 2011), pp. 156\u2013160","DOI":"10.1109\/NCIS.2011.130"},{"issue":"5","key":"5820_CR35","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1080\/02564602.2016.1215270","volume":"34","author":"M Masdari","year":"2017","unstructured":"Masdari, M.: Towards secure localized certificate revocation in mobile ad-hoc networks. IETE Technical Review 34(5), 561\u2013571 (2017)","journal-title":"IETE Technical Review"},{"issue":"2","key":"5820_CR36","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/S1353-4858(09)70015-7","volume":"2009","author":"T Rowan","year":"2009","unstructured":"Rowan, T.: Password protection: the next generation. Network Security 2009(2), 4\u20137 (2009)","journal-title":"Network Security"},{"key":"5820_CR37","doi-asserted-by":"crossref","unstructured":"Wang, D., Wang, P., Ma, C.g., Chen, Z.: Robust smart card based password authentication scheme against smart card security breach. Cryptology ePrint Archive (2012)","DOI":"10.4304\/jnw.8.1.148-155"},{"key":"5820_CR38","unstructured":"Salem, M.B., Stolfo, S.J.: Masquerade attack detection using a search-behavior modeling approach. Columbia University, Computer Science Department, Technical Report CUCS-027-09 (2009)"},{"key":"5820_CR39","doi-asserted-by":"crossref","unstructured":"Salem, M.B., Hershkop, S., Stolfo, S.J.: A survey of insider attack detection research. Insider Attack and Cyber Security: Beyond the Hacker pp. 69\u201390 (2008)","DOI":"10.1007\/978-0-387-77322-3_5"},{"issue":"1","key":"5820_CR40","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/S0167-4048(03)00114-7","volume":"22","author":"CL Lin","year":"2003","unstructured":"Lin, C.L., Hwang, T.: A password authentication scheme with secure password updating. Computers & Security 22(1), 68\u201372 (2003)","journal-title":"Computers & Security"},{"issue":"4","key":"5820_CR41","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MNET.2004.1316761","volume":"18","author":"F Sivrikaya","year":"2004","unstructured":"Sivrikaya, F., Yener, B.: Time synchronization in sensor networks: a survey. IEEE Network 18(4), 45\u201350 (2004)","journal-title":"IEEE Network"},{"key":"5820_CR42","doi-asserted-by":"crossref","unstructured":"Saadeh, M., Sleit, A., Qatawneh, M., Almobaideen, W.: Authentication techniques for the internet of things: A survey, in 2016 cybersecurity and cyberforensics conference (CCC) (IEEE, 2016), pp. 28\u201334","DOI":"10.1109\/CCC.2016.22"},{"issue":"8","key":"5820_CR43","doi-asserted-by":"publisher","first-page":"8914","DOI":"10.1109\/TVT.2020.2997694","volume":"69","author":"J Cui","year":"2020","unstructured":"Cui, J., Wang, Y., Zhang, J., Xu, Y., Zhong, H.: Full session key agreement scheme based on chaotic map in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 69(8), 8914\u20138924 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"5820_CR44","doi-asserted-by":"crossref","unstructured":"Chien, H.Y., Chen, C.H.: A remote authentication scheme preserving user anonymity, in 19th International Conference on Advanced Information Networking and Applications (AINA\u201905) Volume 1 (AINA papers), vol.\u00a02 (IEEE, 2005), pp. 245\u2013248","DOI":"10.1109\/AINA.2005.54"},{"key":"5820_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102494","volume":"52","author":"H Lee","year":"2020","unstructured":"Lee, H., Kang, D., Ryu, J., Won, D., Kim, H., Lee, Y.: A three-factor anonymous user authentication scheme for internet of things environments. Journal of Information Security and Applications 52, 102494 (2020)","journal-title":"Journal of Information Security and Applications"},{"issue":"22","key":"5820_CR46","doi-asserted-by":"publisher","DOI":"10.3390\/s22228793","volume":"22","author":"P Tyagi","year":"2022","unstructured":"Tyagi, P., Kumari, S., Alzahrani, B.A., Gupta, A., Yang, M.H.: An enhanced user authentication and key agreement scheme for wireless sensor networks tailored for iot. Sensors 22(22), 8793 (2022)","journal-title":"Sensors"},{"key":"5820_CR47","doi-asserted-by":"crossref","unstructured":"Cremers, C., Feltz, M.: Beyond eCK: Perfect forward secrecy under actor compromise and ephemeral-key reveal, in Computer Security\u2013ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings 17 (Springer, 2012), pp. 734\u2013751","DOI":"10.1007\/978-3-642-33167-1_42"},{"issue":"4","key":"5820_CR48","first-page":"99","volume":"13","author":"M Gupta","year":"2020","unstructured":"Gupta, M., Garg, P., Gupta, S., Joon, R.: A novel approach for malicious node detection in cluster-head gateway switching routing in mobile ad hoc networks. International Journal of Future Generation Communication and Networking 13(4), 99\u2013111 (2020)","journal-title":"International Journal of Future Generation Communication and Networking"},{"issue":"1","key":"5820_CR49","volume":"2016","author":"J Kim","year":"2016","unstructured":"Kim, J., Moon, J., Jung, J., Won, D.: Security analysis and improvements of session key establishment for clustered sensor networks. Journal of Sensors 2016(1), 4393721 (2016)","journal-title":"Journal of Sensors"},{"key":"5820_CR50","doi-asserted-by":"crossref","unstructured":"Sarvabhatla, M., Reddy, M.C.M., Vorugunti, C.S.: A robust remote user authentication scheme resistant to known session specific temporary information attack, in 2015 Applications and Innovations in Mobile Computing (AIMoC) (IEEE, 2015), pp. 164\u2013169","DOI":"10.1109\/AIMOC.2015.7083847"},{"key":"5820_CR51","volume-title":"Vulnerabilities of multi-factor authentication in modern computer networks","author":"M Tolbert","year":"2021","unstructured":"Tolbert, M.: Vulnerabilities of multi-factor authentication in modern computer networks. Worcester Polytechnic Institute Worcester, UK (2021)"},{"issue":"4","key":"5820_CR52","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1631\/FITEE.1400232","volume":"16","author":"KH Yeh","year":"2015","unstructured":"Yeh, K.H.: A lightweight authentication scheme with user untraceability. Frontiers of Information Technology & Electronic Engineering 16(4), 259\u2013271 (2015)","journal-title":"Frontiers of Information Technology & Electronic Engineering"},{"key":"5820_CR53","unstructured":"Blanchet, B., Smyth, B., Cheval, V., Sylvestre, M.: Proverif 2.00: automatic cryptographic protocol verifier, user manual and tutorial. Version from pp. 05\u201316 (2018)"},{"key":"5820_CR54","unstructured":"Burrows, M., Abadi, M., Needham, R.M.: The Scope of a Logic of Authentication., in Distributed Computing and Cryptography (1989), pp. 119\u2013126"},{"key":"5820_CR55","doi-asserted-by":"crossref","unstructured":"Riley, G.F., Henderson, T.R.: in Modeling and tools for network simulation (Springer, 2010), pp. 15\u201334","DOI":"10.1007\/978-3-642-12331-3_2"},{"issue":"2","key":"5820_CR56","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9020272","volume":"9","author":"L Campanile","year":"2020","unstructured":"Campanile, L., Gribaudo, M., Iacono, M., Marulli, F., Mastroianni, M.: Computer network simulation with ns-3: A systematic literature review. Electronics 9(2), 272 (2020)","journal-title":"Electronics"},{"key":"5820_CR57","doi-asserted-by":"crossref","unstructured":"Wu, H., Nabar, S., Poovendran, R.: An energy framework for the network simulator 3 (ns-3), in 4th International ICST Conference on Simulation Tools and Techniques (2012)","DOI":"10.4108\/icst.simutools.2011.245534"},{"key":"5820_CR58","doi-asserted-by":"crossref","unstructured":"Fontes, H., Campos, R., Ricardo, M.: A trace-based ns-3 simulation approach for perpetuating real-world experiments, in Proceedings of the 2017 Workshop on ns-3 (2017), pp. 118\u2013124","DOI":"10.1145\/3067665.3067681"}],"updated-by":[{"DOI":"10.1007\/s10586-026-05937-w","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T00:00:00Z","timestamp":1770163200000}}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05820-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05820-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05820-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T13:07:46Z","timestamp":1773925666000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05820-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,21]]},"references-count":58,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["5820"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05820-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,21]]},"assertion":[{"value":"14 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 January 2026","order":6,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":7,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The original online version of this article was revised: In this article the author\u2019s name Younsung Choi was incorrectly written as Yoonsung Choi.","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2026","order":9,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":10,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":11,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s10586-026-05937-w","URL":"https:\/\/doi.org\/10.1007\/s10586-026-05937-w","order":12,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest\/Competing interests"}}],"article-number":"47"}}