{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T19:34:12Z","timestamp":1768592052394,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,12,21]],"date-time":"2019-12-21T00:00:00Z","timestamp":1576886400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,21]],"date-time":"2019-12-21T00:00:00Z","timestamp":1576886400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s11036-019-01401-9","type":"journal-article","created":{"date-parts":[[2019,12,21]],"date-time":"2019-12-21T18:02:46Z","timestamp":1576951366000},"page":"1853-1866","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["C-EEUC: a Cluster Routing Protocol for Coal Mine Wireless Sensor Network Based on Fog Computing and 5G"],"prefix":"10.1007","volume":"27","author":[{"given":"Wei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Bobin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Weidong","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Wuxiong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaorong","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,21]]},"reference":[{"issue":"1","key":"1401_CR1","first-page":"27","volume":"30","author":"L Cheng-Fa","year":"2007","unstructured":"Cheng-Fa L, Gui-Hai C, Mao Y, Jie W (2007) Uneven cluster-based routing protocol for wireless sensor networks. Chin J Comput 30(1):27\u201336","journal-title":"Chin J Comput"},{"key":"1401_CR2","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1109\/ACCESS.2015.2443171","volume":"3","author":"K Suto","year":"2015","unstructured":"Suto K, Nishiyama H, Kato N, Huang C (2015) An energy-efficient and delay-aware wireless computing system for industrial wireless sensor networks. IEEE Access 3:1026\u20131035","journal-title":"IEEE Access"},{"key":"1401_CR3","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/2677046.2677052","volume":"44","author":"L Vaquero","year":"2014","unstructured":"Vaquero L, Rodero-Merino L (2014) Finding your way in the definition fog: towards a comprehensive of fog computing. ACM Sigcomm Comput Commun Rev 44:27\u201332","journal-title":"ACM Sigcomm Comput Commun Rev"},{"key":"1401_CR4","doi-asserted-by":"crossref","unstructured":"Zeng J, Wang T, Lai Y, Liang J, Chen H (2016) Data delivery from WSNs to cloud based on a fog structure. In: Fourth international conference on advanced cloud and big data (Cbd 2016), p 104\u2013109","DOI":"10.1109\/CBD.2016.028"},{"key":"1401_CR5","doi-asserted-by":"publisher","first-page":"19864","DOI":"10.1109\/ACCESS.2017.2746676","volume":"5","author":"S Sharma","year":"2017","unstructured":"Sharma S, Puthal D, Tazeen S, Prasad M, Zomaya AY (2017) MSGR: a mode-switched grid-based sustainable routing protocol for wireless sensor networks. IEEE Access 5:19864\u201319875","journal-title":"IEEE Access"},{"key":"1401_CR6","doi-asserted-by":"publisher","first-page":"21296","DOI":"10.1109\/ACCESS.2017.2756826","volume":"5","author":"T Li","year":"2017","unstructured":"Li T, Liu YX, Gao LX, Liu AF (2017) A cooperative-based model for smart-sensing tasks in fog computing. IEEE Access 5:21296\u201321311","journal-title":"IEEE Access"},{"key":"1401_CR7","doi-asserted-by":"crossref","unstructured":"Lee W, Nam K, Roh H G, Kim S H (2016) A gateway based fog computing architecture for wireless sensors and actuator networks. In: 2016 18th international conference on advanced communications technology, IEEE, p 210\u2013213","DOI":"10.1109\/ICACT.2016.7423331"},{"key":"1401_CR8","doi-asserted-by":"crossref","unstructured":"Naranjo P G V, Shojafar M, Abraham A, Baccarelli E (2016) A new stable election-based routing algorithm to preserve aliveness and energy in fog-supported wireless sensor networks. In: IEEE international conference on systems, man, and cybernetics, IEEE, p 2413\u20132418","DOI":"10.1109\/SMC.2016.7844600"},{"issue":"6","key":"1401_CR9","doi-asserted-by":"publisher","first-page":"5351","DOI":"10.1109\/TVT.2016.2621140","volume":"66","author":"F Chiti","year":"2017","unstructured":"Chiti F, Fantacci R, Tani A (2017) Performance evaluation of an adaptive channel allocation technique for cognitive wireless sensor networks. IEEE Trans Veh Technol 66(6):5351\u20135363","journal-title":"IEEE Trans Veh Technol"},{"issue":"6","key":"1401_CR10","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/MCOM.2017.1600679","volume":"55","author":"JB Ni","year":"2017","unstructured":"Ni JB, Zhang AQ, Lin XD, Shen XM (2017) Ecurity, privacy, and fairness in fog-based vehicular Crowdsensing. IEEE Commun Mag 55(6):146\u2013152","journal-title":"IEEE Commun Mag"},{"key":"1401_CR11","doi-asserted-by":"publisher","first-page":"12103","DOI":"10.1109\/ACCESS.2018.2805680","volume":"6","author":"Q Liu","year":"2018","unstructured":"Liu Q, Li P, Zhao WT, Cai W, Yu S, Leung VCM (2018) A survey on security threats and defensive techniques of machine learning: a data driven view. IEEE Access 6:12103\u201312117","journal-title":"IEEE Access"},{"issue":"7","key":"1401_CR12","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1093\/comjnl\/bxy025","volume":"61","author":"JR Cheng","year":"2018","unstructured":"Cheng JR, Zhou JH, Liu Q, Tang XY, Guo YX (2018) A DDoS detection method for socially aware networking based on forecasting fusion feature sequence. Comput J 61(7):959\u2013970","journal-title":"Comput J"},{"issue":"1","key":"1401_CR13","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MVT.2018.2879647","volume":"14","author":"JY Feng","year":"2019","unstructured":"Feng JY, Liu Z, Wu C, Ji YS (2019) Mobile edge computing for the internet of vehicles: offloading framework and job scheduling. IEEE Veh Technol Mag 14(1):28\u201336","journal-title":"IEEE Veh Technol Mag"},{"issue":"12","key":"1401_CR14","doi-asserted-by":"publisher","first-page":"10660","DOI":"10.1109\/TVT.2017.2714704","volume":"66","author":"JY Feng","year":"2017","unstructured":"Feng JY, Liu Z, Wu C, Ji YS (2017) AVE: autonomous vehicular edge computing framework with ACO-based scheduling. IEEE Trans Veh Technol 66(12):10660\u201310675","journal-title":"IEEE Trans Veh Technol"},{"issue":"10","key":"1401_CR15","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MCOM.2018.1800089","volume":"56","author":"C Wu","year":"2018","unstructured":"Wu C, Liu Z, Zhang D, Yoshinaga T, Ji YS (2018) Spatial intelligence toward trustworthy vehicular iot. IEEE Commun Mag 56(10):22\u201327","journal-title":"IEEE Commun Mag"},{"issue":"6","key":"1401_CR16","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1109\/JIOT.2016.2550561","volume":"3","author":"M Jutila","year":"2016","unstructured":"Jutila M (2016) An adaptive edge router enabling internet of things. IEEE Internet Things J 3(6):1061\u20131069","journal-title":"IEEE Internet Things J"},{"key":"1401_CR17","doi-asserted-by":"crossref","unstructured":"Yangui S, Ravindran P, Bibani O, Glitho R H, Ben Hadj-Alouane N, Morrow M J, Polakos P A (2016) A platform as-a-service for hybrid cloud\/fog environments. In: 22nd IEEE international symposium on local and metropolitan area networks, IEEE, p 1\u20137","DOI":"10.1109\/LANMAN.2016.7548853"},{"key":"1401_CR18","doi-asserted-by":"crossref","unstructured":"Yaseen Q, AlBalas F, Jararweh Y, Al-Ayyoub M (2016) A fog computing based system for selective forwarding detection in mobile wireless sensor networks. In: 1st international workshops on foundations and applications of self * systems (Fas*W), IEEE, p 256\u2013262","DOI":"10.1109\/FAS-W.2016.60"},{"key":"1401_CR19","doi-asserted-by":"crossref","unstructured":"Gebre-Amlak H, Lee S, Jabbari A M A, Chen Y, Choi B Y, Huang C T, Song S (2017) MIST: mobility-inspired SofTware- defined fog system. IEEE international conference on consumer electronics (ICCE), IEEE","DOI":"10.1109\/ICCE.2017.7889243"},{"key":"1401_CR20","doi-asserted-by":"crossref","unstructured":"Huang L, Li G L, Wu J, Li L, Li J H, Morello R (2016) Software-defined QoS provisioning for fog computing advanced wireless sensor networks. In: 2016 proceedings of IEEE sensors, IEEE, p 1\u20133","DOI":"10.1109\/ICSENS.2016.7808814"},{"key":"1401_CR21","doi-asserted-by":"crossref","unstructured":"Pacheco J, Hariri S (2016) IoT security framework for smart cyber infrastructures. In: IEEE 1st international workshops on foundations and applications of self * systems (Fas*W), IEEE, p 242\u2013247","DOI":"10.1109\/FAS-W.2016.58"},{"issue":"5","key":"1401_CR22","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MNET.2016.7579023","volume":"30","author":"Q Liu","year":"2016","unstructured":"Liu Q, Hu XP, Ngai ECH, Liang M, Leung VCM, Cai ZP, Yin JP (2016) A security patch addressing bandwidth request vulnerabilities in the IEEE 802.16 standard. IEEE Netw 30(5):26\u201334","journal-title":"IEEE Netw"},{"key":"1401_CR23","doi-asserted-by":"publisher","unstructured":"Liu Z, Tsuda T, Watanabe H, Ryuo S, Iwasawa N (2018) Data driven cyber-physical system for landslide detection. Mobile networks and applications. https:\/\/doi.org\/10.1007\/s11036-018-1031-1","DOI":"10.1007\/s11036-018-1031-1"},{"key":"1401_CR24","doi-asserted-by":"crossref","unstructured":"Handy M J, Haase M, Timmermann D (2002) Low energy adaptive clustering hierarchy with deterministic cluster-head selection. In: 4th International workshop on mobile and wireless communications network, MWCN 2002, IEEE, p 368\u2013372","DOI":"10.1109\/MWCN.2002.1045790"},{"issue":"5","key":"1401_CR25","doi-asserted-by":"publisher","first-page":"1222","DOI":"10.3724\/SP.J.1001.2012.04061","volume":"23","author":"CJ Jiang","year":"2012","unstructured":"Jiang CJ, Shi WR, Tang XL, Wang P, Xiang M (2012) Energy-balanced unequal clustering routing protocol for wireless sensor networks. J Software 23(5):1222\u20131232","journal-title":"J Software"},{"issue":"2\u20133","key":"1401_CR26","first-page":"99","volume":"3","author":"M Ye","year":"2007","unstructured":"Ye M, Li CF, Chen GH, Wu J (2007) An energy efficient clustering scheme in wireless sensor networks. Ad Hoc Sens Wireless Netw 3(2\u20133):99\u2013119","journal-title":"Ad Hoc Sens Wireless Netw"},{"key":"1401_CR27","unstructured":"Stanislava S, Wendi B H (2005) Prolonging the lifetime of wireless sensor networks via unequal clustering. In: 19th IEEE international parallel and distributed processing symposium, IPDPS 2005, IEEE, p 1\u20138"},{"key":"1401_CR28","volume-title":"Wireless sensor networks","author":"LM Sun","year":"2005","unstructured":"Sun LM, Li JZ, Chen Y, Zhu HS (2005) Wireless sensor networks. Tsinghua University Press, Peiking"},{"issue":"5","key":"1401_CR29","first-page":"1336","volume":"40","author":"AF Liu","year":"2009","unstructured":"Liu AF, He H, Wu XY, Chen ZG (2009) Optimization of parameter selection for wireless sensor network with mobile base station. J Centr South Univ Sci Technol 40(5):1336\u20131344","journal-title":"J Centr South Univ Sci Technol"},{"key":"1401_CR30","unstructured":"Wendi R H, Anantha C, Hari B (2000) Energy-efficient communication protocol for wireless microsensor networks. In: the 33rd annual Hawaii international conference on system sciences, IEEE 2, 1-10"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01401-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-019-01401-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01401-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T09:18:41Z","timestamp":1666603121000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-019-01401-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,21]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["1401"],"URL":"https:\/\/doi.org\/10.1007\/s11036-019-01401-9","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,21]]},"assertion":[{"value":"21 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}