{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T03:45:46Z","timestamp":1775274346698,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T00:00:00Z","timestamp":1542326400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s10922-018-9477-9","type":"journal-article","created":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T10:11:49Z","timestamp":1542363109000},"page":"573-599","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Security Aware Multipath Routing Protocol for WMSNs for Minimizing Effect of Compromising Attacks"],"prefix":"10.1007","volume":"27","author":[{"given":"A.","family":"Ranjith Kumar","sequence":"first","affiliation":[]},{"given":"A.","family":"Sivagami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,16]]},"reference":[{"issue":"5","key":"9477_CR1","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1109\/TMM.2008.922775","volume":"10","author":"A Czarlinska","year":"2008","unstructured":"Czarlinska, A., Kundur, D.: Reliable event-detection in wireless visual sensor networks through scalar collaboration and game-theoretic consideration. IEEE Trans. Multimed. 10(5), 675\u2013690 (2008)","journal-title":"IEEE Trans. Multimed."},{"issue":"2","key":"9477_CR2","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/TSMCB.2012.2215919","volume":"43","author":"HM La","year":"2013","unstructured":"La, H.M., Sheng, W.: Distributed sensor fusion for scalar field mapping using mobile sensor networks. IEEE Trans. Cybern. 43(2), 766\u2013778 (2013)","journal-title":"IEEE Trans. Cybern."},{"issue":"10","key":"9477_CR3","doi-asserted-by":"publisher","first-page":"1588","DOI":"10.1109\/JPROC.2008.928756","volume":"96","author":"IF Akyildiz","year":"2008","unstructured":"Akyildiz, I.F., Melodia, T., Chowdhury, K.R.: Wireless multimedia sensor networks: applications and testbeds. Proc. IEEE 96(10), 1588\u20131605 (2008)","journal-title":"Proc. IEEE"},{"issue":"4","key":"9477_CR4","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1109\/TST.2016.7536716","volume":"21","author":"H Huang","year":"2016","unstructured":"Huang, H., Gong, T., Chen, P., Malekian, R., Chen, T.: Secure two-party distance computation protocol based on privacy homomorphism and scalar product in wireless sensor networks. Tsinghua Sci. Technol. 21(4), 385\u2013396 (2016)","journal-title":"Tsinghua Sci. Technol."},{"key":"9477_CR5","doi-asserted-by":"crossref","unstructured":"Tian, D., Georganas, N.D.: A coverage-preserving node scheduling scheme for large wireless sensor networks. In: Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications\u2014WSNA \u201802 (2002)","DOI":"10.1145\/570743.570744"},{"issue":"5","key":"9477_CR6","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1023\/A:1016586011473","volume":"8","author":"S Megerian","year":"2002","unstructured":"Megerian, S., Koushanfar, F., Qu, G., Veltri, G., Potkonjak, M.: Exposure in wireless sensor networks: theory and practical solutions. Wirel. Netw. 8(5), 443\u2013454 (2002)","journal-title":"Wirel. Netw."},{"issue":"6","key":"9477_CR7","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1080\/15501320902876055","volume":"5","author":"E Chan","year":"2009","unstructured":"Chan, E., Han, S.: Energy efficient residual energy monitoring in wireless sensor networks. Int. J. Distrib. Sens. Netw. 5(6), 748\u2013770 (2009)","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"4","key":"9477_CR8","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1016\/j.comcom.2007.10.021","volume":"31","author":"P Narula","year":"2008","unstructured":"Narula, P., Dhurandher, S.K., Misra, S., Woungang, I.: Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing. Comput. Commun. 31(4), 760\u2013769 (2008)","journal-title":"Comput. Commun."},{"issue":"5","key":"9477_CR9","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1109\/TC.2010.34","volume":"59","author":"MT Refaei","year":"2010","unstructured":"Refaei, M.T., DaSilva, L.A., Eltoweissy, M., Nadeem, T.: Adaptation of reputation management systems to dynamic network conditions in ad hoc networks. IEEE Trans. Comput. 59(5), 707\u2013719 (2010)","journal-title":"IEEE Trans. Comput."},{"issue":"6","key":"9477_CR10","doi-asserted-by":"publisher","first-page":"924","DOI":"10.1109\/TIFS.2013.2240299","volume":"8","author":"X Li","year":"2013","unstructured":"Li, X., Zhou, F., Du, J.: LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 8(6), 924\u2013935 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"9477_CR11","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/TDSC.2013.30","volume":"11","author":"N Basilico","year":"2014","unstructured":"Basilico, N., Gatti, N., Monga, M., Sicari, S.: Security games for node localization through verifiable multilateration. IEEE Trans. Dependable Secure Comput. 11(1), 72\u201385 (2014)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"9477_CR12","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/JPROC.2007.909914","volume":"96","author":"D Kundur","year":"2008","unstructured":"Kundur, D., Luh, W., Okorafor, U.N., Zourntos, T.: Security and privacy for distributed multimedia sensor networks. Proc. IEEE 96(1), 112\u2013130 (2008)","journal-title":"Proc. IEEE"},{"issue":"3","key":"9477_CR13","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1007\/s11227-010-0500-5","volume":"64","author":"H Wang","year":"2010","unstructured":"Wang, H.: Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks. J. Supercomput. 64(3), 883\u2013897 (2010)","journal-title":"J. Supercomput."},{"issue":"4","key":"9477_CR14","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.adhoc.2010.08.003","volume":"9","author":"A Newell","year":"2011","unstructured":"Newell, A., Akkaya, K.: Distributed collaborative camera actuation for redundant data elimination in wireless multimedia sensor networks. Ad Hoc Netw. 9(4), 514\u2013527 (2011)","journal-title":"Ad Hoc Netw."},{"issue":"1","key":"9477_CR15","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s11042-012-1054-8","volume":"67","author":"Y Zhang","year":"2012","unstructured":"Zhang, Y., Li, X., Yang, J., Liu, Y., Xiong, N., Vasilakos, A.: A real-time dynamic key management for hierarchical wireless multimedia sensor network. Multimed. Tools Appl. 67(1), 97\u2013117 (2012)","journal-title":"Multimed. Tools Appl."},{"issue":"9","key":"9477_CR16","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1016\/j.image.2014.07.007","volume":"29","author":"T Xiang","year":"2014","unstructured":"Xiang, T., Yu, C., Chen, F.: Secure MQ coder: an efficient way to protect JPEG 2000 images in wireless multimedia sensor networks. Signal Process. Image Commun. 29(9), 1015\u20131027 (2014)","journal-title":"Signal Process. Image Commun."},{"issue":"1","key":"9477_CR17","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s11235-009-9235-0","volume":"45","author":"M Guerrero-Zapata","year":"2009","unstructured":"Guerrero-Zapata, M., Zilan, R., Barcel\u00f3-Ordinas, J.M., Bicakci, K., Tavli, B.: The future of security in wireless multimedia sensor networks. Telecommun. Syst. 45(1), 77\u201391 (2009)","journal-title":"Telecommun. Syst."},{"issue":"1","key":"9477_CR18","first-page":"9","volume":"30","author":"Q Lin","year":"2013","unstructured":"Lin, Q., Wang, R., Ye, N., Wang, Z.: Energy efficient distributed steganography for secure communication in wireless multimedia sensor networks. J. Electron. 30(1), 9\u201316 (2013)","journal-title":"J. Electron."},{"issue":"6","key":"9477_CR19","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1109\/TDSC.2012.68","volume":"9","author":"Y Sun","year":"2012","unstructured":"Sun, Y., Luo, H., Das, S.K.: A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Trans. Dependable Secure Comput. 9(6), 785\u2013797 (2012)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"6","key":"9477_CR20","doi-asserted-by":"publisher","first-page":"3425","DOI":"10.1007\/s11042-014-2443-y","volume":"75","author":"M Ghadi","year":"2015","unstructured":"Ghadi, M., Laouamer, L., Moulahi, T.: Securing data exchange in wireless multimedia sensor networks: perspectives and challenges. Multimed. Tools Appl. 75(6), 3425\u20133451 (2015)","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"9477_CR21","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1007\/s11277-015-2621-x","volume":"87","author":"BD Deebak","year":"2015","unstructured":"Deebak, B.D.: Secure and efficient mutual adaptive user authentication scheme for heterogeneous wireless sensor networks using multimedia client\u2013server systems. Wirel. Pers. Commun. 87(3), 1013\u20131035 (2015)","journal-title":"Wirel. Pers. Commun."},{"issue":"1","key":"9477_CR22","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s11460-008-0013-7","volume":"3","author":"Y Sun","year":"2008","unstructured":"Sun, Y., Ma, H., Liu, L., Zheng, Y.E.: ASAR: an ant-based service-aware routing algorithm for multimedia sensor networks. Front. Electr. Electron. Eng. China 3(1), 25\u201333 (2008)","journal-title":"Front. Electr. Electron. Eng. China"},{"key":"9477_CR23","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/S1005-8885(09)60582-3","volume":"17","author":"ZY Li","year":"2010","unstructured":"Li, Z.Y., Wang, R.C.: Load balancing-based hierarchical routing algorithm for wireless multimedia sensor networks. J. China Univ. Posts Telecommun. 17, 51\u201359 (2010)","journal-title":"J. China Univ. Posts Telecommun."},{"issue":"1\u20132","key":"9477_CR24","first-page":"79","volume":"44","author":"L Shu","year":"2009","unstructured":"Shu, L., Zhang, Y., Yang, L.T., Wang, Y., Hauswirth, M., Xiong, N.: TPGF: geographic routing in wireless multimedia sensor networks. Telecommun. Syst. 44(1\u20132), 79\u201395 (2009)","journal-title":"Telecommun. Syst."},{"issue":"17","key":"9477_CR25","doi-asserted-by":"publisher","first-page":"2991","DOI":"10.1016\/j.comnet.2010.05.014","volume":"54","author":"L Cobo","year":"2010","unstructured":"Cobo, L., Quintero, A., Pierre, S.: Ant-based routing for wireless multimedia sensor networks using multiple QoS metrics. Comput. Netw. 54(17), 2991\u20133010 (2010)","journal-title":"Comput. Netw."},{"issue":"1","key":"9477_CR26","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1186\/1687-1499-2011-142","volume":"2011","author":"K Lin","year":"2011","unstructured":"Lin, K., Chen, M.: Research on energy efficient fusion-driven routing in wireless multimedia sensor networks. EURASIP J. Wirel. Commun. Netw. 2011(1), 142 (2011)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"3","key":"9477_CR27","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/s11277-011-0309-4","volume":"60","author":"JM Kim","year":"2011","unstructured":"Kim, J.M., Seo, H.S., Kwak, J.: Routing protocol for heterogeneous hierarchical wireless multimedia sensor networks. Wirel. Pers. Commun. 60(3), 559\u2013569 (2011)","journal-title":"Wirel. Pers. Commun."},{"issue":"4","key":"9477_CR28","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1016\/j.adhoc.2010.09.001","volume":"9","author":"D Kandris","year":"2011","unstructured":"Kandris, D., Tsagkaropoulos, M., Politis, I., Tzes, A., Kotsopoulos, S.: Energy efficient and perceived QoS aware video routing over wireless multimedia sensor networks. Ad Hoc Netw. 9(4), 591\u2013607 (2011)","journal-title":"Ad Hoc Netw."},{"key":"9477_CR29","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.ins.2013.06.014","volume":"249","author":"BY Li","year":"2013","unstructured":"Li, B.Y., Chuang, P.J.: Geographic energy-aware non-interfering multipath routing for multimedia transmission in wireless sensor networks. Inf. Sci. 249, 24\u201337 (2013)","journal-title":"Inf. Sci."},{"issue":"10","key":"9477_CR30","first-page":"1","volume":"57","author":"H Huang","year":"2014","unstructured":"Huang, H., Cao, X., Wang, R., Wen, Y.: A QoS-aware routing algorithm based on ant-cluster in wireless multimedia sensor networks. Sci. China Inf. Sci. 57(10), 1\u201316 (2014)","journal-title":"Sci. China Inf. Sci."},{"issue":"2","key":"9477_CR31","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.1007\/s11277-013-1425-0","volume":"75","author":"H Shen","year":"2013","unstructured":"Shen, H., Bai, G., Tang, Z., Zhao, L.: QMOR: QoS-aware multi-sink opportunistic routing for wireless multimedia sensor networks. Wirel. Pers. Commun. 75(2), 1307\u20131330 (2013)","journal-title":"Wirel. Pers. Commun."},{"key":"9477_CR32","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.asoc.2015.01.052","volume":"30","author":"N Magaia","year":"2017","unstructured":"Magaia, N., Horta, N., Neves, R., Pereira, P.R., Correia, M.: A multi-objective routing algorithm for wireless multimedia sensor networks. Appl. Soft Comput. 30, 104\u2013112 (2017)","journal-title":"Appl. Soft Comput."},{"issue":"7","key":"9477_CR33","doi-asserted-by":"publisher","first-page":"9378120","DOI":"10.1177\/155014779378120","volume":"12","author":"L Han","year":"2016","unstructured":"Han, L., Sun, S., Joo, B., Jin, X., Han, S.: QoS-aware routing mechanism in OpenFlow-enabled wireless multimedia sensor networks. Int. J. Distrib. Sens. Netw. 12(7), 9378120 (2016)","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"7","key":"9477_CR34","doi-asserted-by":"publisher","first-page":"1367","DOI":"10.1002\/dac.2770","volume":"28","author":"S Misra","year":"2014","unstructured":"Misra, S., Mali, G., Mondal, A.: Distributed topology management for wireless multimedia sensor networks: exploiting connectivity and cooperation. Int. J. Commun. Syst. 28(7), 1367\u20131386 (2014)","journal-title":"Int. J. Commun. Syst."},{"issue":"6","key":"9477_CR35","doi-asserted-by":"publisher","first-page":"1978","DOI":"10.1109\/TC.2015.2456026","volume":"65","author":"G Mali","year":"2016","unstructured":"Mali, G., Misra, S.: TRAST: trust-based distributed topology management for wireless multimedia sensor networks. IEEE Trans. Comput. 65(6), 1978\u20131991 (2016)","journal-title":"IEEE Trans. Comput."},{"issue":"9","key":"9477_CR36","doi-asserted-by":"publisher","first-page":"1238","DOI":"10.1080\/0305215X.2013.836637","volume":"46","author":"H Li","year":"2013","unstructured":"Li, H., Zhang, L.: A discrete hybrid differential evolution algorithm for solving integer programming problems. Eng. Optim. 46(9), 1238\u20131268 (2013)","journal-title":"Eng. Optim."},{"issue":"2","key":"9477_CR37","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s10462-012-9370-y","volume":"43","author":"N Shahid","year":"2012","unstructured":"Shahid, N., Naqvi, I.H., Qaisar, S.B.: Characteristics and classification of outlier detection techniques for wireless sensor networks in harsh environments: a survey. Artif. Intell. Rev. 43(2), 193\u2013228 (2012)","journal-title":"Artif. Intell. Rev."},{"issue":"10","key":"9477_CR38","doi-asserted-by":"publisher","first-page":"2051","DOI":"10.1109\/TCYB.2014.2363878","volume":"45","author":"S Bechikh","year":"2015","unstructured":"Bechikh, S., Chaabani, A., Said, L.B.: An efficient chemical reaction optimization algorithm for multi objective optimization. IEEE Trans. Cybern. 45(10), 2051\u20132064 (2015)","journal-title":"IEEE Trans. Cybern."},{"key":"9477_CR39","doi-asserted-by":"crossref","unstructured":"Heinzleman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy efficient communication protocol for wireless micro sensor networks. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, p. 10 (2000)","DOI":"10.1109\/HICSS.2000.926982"},{"key":"9477_CR40","doi-asserted-by":"crossref","unstructured":"Wright, S., Nocedal, J.: Numerical Optimization vol. 35, no. (67\u201368), p. 7. Springer Science, Berlin (1999)","DOI":"10.1007\/b98874"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-018-9477-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-018-9477-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-018-9477-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T02:48:11Z","timestamp":1775270891000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-018-9477-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,16]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["9477"],"URL":"https:\/\/doi.org\/10.1007\/s10922-018-9477-9","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,16]]},"assertion":[{"value":"24 April 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}