{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T09:40:21Z","timestamp":1773740421212,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2022,2,17]],"date-time":"2022-02-17T00:00:00Z","timestamp":1645056000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,2,17]],"date-time":"2022-02-17T00:00:00Z","timestamp":1645056000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s11042-022-12157-y","type":"journal-article","created":{"date-parts":[[2022,2,17]],"date-time":"2022-02-17T15:02:59Z","timestamp":1645110179000},"page":"11145-11185","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["SLP-RRFPR: a source location privacy protection scheme based on random ring and limited hop fake packet routing for wireless sensor networks"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7718-6232","authenticated-orcid":false,"given":"Anurag","family":"Shukla","sequence":"first","affiliation":[]},{"given":"Deepak","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Mohit","family":"Sajwan","sequence":"additional","affiliation":[]},{"given":"Malay","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Divya","family":"Kumari","sequence":"additional","affiliation":[]},{"given":"Ajit","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Manikant","family":"Panthi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,17]]},"reference":[{"key":"12157_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3083731","author":"M Adil","year":"2021","unstructured":"Adil M, Jan MA, Mastorakis S, Song H, Jadoon MM, Abbas S, Farouk A (2021) Hash-MAC-DSDV: mutual authentication for intelligent IoT-based cyber-physical systems. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2021.3083731","journal-title":"IEEE Internet Things J"},{"key":"12157_CR2","doi-asserted-by":"publisher","unstructured":"Bagree R, Jain VR, Kumar A, Ranjan P (2010) TigerCENSE: Wireless image sensor network to monitor tiger movement. Lect. Notes Comput. Sci. (Including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics). Springer, Berlin, Heidelberg, pp 13\u201324. https:\/\/doi.org\/10.1007\/978-3-642-17520-6_2","DOI":"10.1007\/978-3-642-17520-6_2"},{"key":"12157_CR3","doi-asserted-by":"publisher","first-page":"29129","DOI":"10.3390\/s151129129","volume":"15","author":"J Chen","year":"2015","unstructured":"Chen J, Lin Z, Hu Y, Wang B (2015) Hiding the source based on limited flooding for sensor networks. Sensors (Switzerland) 15:29129\u201329148. https:\/\/doi.org\/10.3390\/s151129129","journal-title":"Sensors (Switzerland)"},{"key":"12157_CR4","doi-asserted-by":"publisher","unstructured":"Comput JPD, Long J, Liu A, Dong M, Li Z (2015) An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing. J Parallel Distrib Comput 81\u201382. https:\/\/doi.org\/10.1016\/j.jpdc.2015.04.003","DOI":"10.1016\/j.jpdc.2015.04.003"},{"key":"12157_CR5","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.pmcj.2005.12.003","volume":"2","author":"J Deng","year":"2006","unstructured":"Deng J, Han R, Mishra S (2006) Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive Mob Comput 2:159\u2013186. https:\/\/doi.org\/10.1016\/j.pmcj.2005.12.003","journal-title":"Pervasive Mob Comput"},{"key":"12157_CR6","doi-asserted-by":"publisher","first-page":"26907","DOI":"10.1007\/s11042-017-4352-3","volume":"78","author":"K Dou","year":"2019","unstructured":"Dou K, Guo B, Kuang L (2019) A privacy-preserving multimedia recommendation in the context of social network based on weighted noise injection. Multimed Tools Appl 78:26907\u201326926. https:\/\/doi.org\/10.1007\/s11042-017-4352-3","journal-title":"Multimed Tools Appl"},{"key":"12157_CR7","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.adhoc.2015.07.015","volume":"37","author":"M Florian","year":"2016","unstructured":"Florian M, Pieper F, Baumgart I (2016) Establishing location-privacy in decentralized long-distance geocast services. Ad Hoc Networks 37:110\u2013121. https:\/\/doi.org\/10.1016\/j.adhoc.2015.07.015","journal-title":"Ad Hoc Networks"},{"key":"12157_CR8","doi-asserted-by":"publisher","first-page":"22301","DOI":"10.1007\/s11042-021-10820-4","volume":"80","author":"N Gupta","year":"2021","unstructured":"Gupta N, Jain A, Vaisla KS, Kumar A, Kumar R (2021) Performance analysis of DSDV and OLSR wireless sensor network routing protocols using FPGA hardware and machine learning. Multimed Tools Appl 80:22301\u201322319. https:\/\/doi.org\/10.1007\/s11042-021-10820-4","journal-title":"Multimed Tools Appl"},{"key":"12157_CR9","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1016\/j.future.2017.08.044","volume":"82","author":"G Han","year":"2018","unstructured":"Han G, Zhou L, Wang H, Zhang W, Chan S (2018) A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things, Futur. Gener Comput Syst 82:689\u2013697. https:\/\/doi.org\/10.1016\/j.future.2017.08.044","journal-title":"Gener Comput Syst"},{"key":"12157_CR10","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MWC.2017.1800061","volume":"25","author":"G Han","year":"2018","unstructured":"Han G, Wang H, Guizani M, Chan S, Zhang W (2018) A k-means cluster-based location privacy protection scheme in WSNs for IoT. IEEE Wirel Commun 25:84\u201390. https:\/\/doi.org\/10.1109\/MWC.2017.1800061","journal-title":"IEEE Wirel Commun"},{"key":"12157_CR11","doi-asserted-by":"publisher","first-page":"1337","DOI":"10.1109\/TIFS.2018.2876839","volume":"14","author":"Z Hong","year":"2019","unstructured":"Hong Z, Wang R, Ji S, Beyah R (2019) Attacker location evaluation-based fake source scheduling for source location privacy in cyber-physical systems. IEEE Trans Inf Forensics Secur 14:1337\u20131350. https:\/\/doi.org\/10.1109\/TIFS.2018.2876839","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"12157_CR12","doi-asserted-by":"publisher","first-page":"102430","DOI":"10.1016\/j.jnca.2019.102430","volume":"147","author":"S Jain","year":"2019","unstructured":"Jain S, Pattanaik KK, Shukla A (2019)Query-driven virtual wheel based routing protocol for wireless sensor networks with mobile sink. J Netw Comput Appl 147:102430. https:\/\/doi.org\/10.1016\/j.jnca.2019.102430","journal-title":"J Netw Comput Appl"},{"key":"12157_CR13","doi-asserted-by":"publisher","first-page":"4882","DOI":"10.1109\/JIOT.2020.3030120","volume":"8","author":"S Jain","year":"2021","unstructured":"Jain S, Pattanaik KK, Verma RK, Bharti S, Shukla A (2021)Delay-aware green routing for mobile-sink-based wireless sensor networks. IEEE Internet Things J 8:4882\u20134892. https:\/\/doi.org\/10.1109\/JIOT.2020.3030120","journal-title":"IEEE Internet Things J"},{"key":"12157_CR14","doi-asserted-by":"publisher","first-page":"1202","DOI":"10.1109\/TGCN.2021.3077318","volume":"5","author":"MA Jan","year":"2021","unstructured":"Jan MA, Khan F, Mastorakis S, Adil M, Akbar A, Stergiou N (2021) LightIoT: Lightweight and secure communication for energy-efficient IoT in health informatics. IEEE Trans Green Commun Netw 5:1202\u20131211. https:\/\/doi.org\/10.1109\/TGCN.2021.3077318","journal-title":"IEEE Trans Green Commun Netw"},{"key":"12157_CR15","unstructured":"Kamat P, Zhang Y, Trappe W, Ozturk C (2005) Enhancing source-location privacy in Sensor Network Routing, 1\u201310. http:\/\/ieeexplore.ieee.org\/document\/1437121\/"},{"key":"12157_CR16","doi-asserted-by":"publisher","first-page":"21823","DOI":"10.1007\/s11042-021-10789-0","volume":"80","author":"H Luo","year":"2021","unstructured":"Luo H, Zhang H, Long S, Lin Y (2021) Enhancing frequent location privacy-preserving strategy based on geo-Indistinguishability. Multimed Tools Appl 80:21823\u201321841. https:\/\/doi.org\/10.1007\/s11042-021-10789-0","journal-title":"Multimed Tools Appl"},{"key":"12157_CR17","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.pmcj.2018.01.006","volume":"44","author":"R Manjula","year":"2018","unstructured":"Manjula R, Datta R (2018) A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs. Pervasive Mob Comput 44:58\u201373. https:\/\/doi.org\/10.1016\/j.pmcj.2018.01.006","journal-title":"Pervasive Mob Comput"},{"key":"12157_CR18","doi-asserted-by":"publisher","unstructured":"Misra S, Mohanta D (2010) Adaptive listen for energy-efficient medium access control in wireless sensor networks. Multimed Tools Appl Springer: 121\u2013145. https:\/\/doi.org\/10.1007\/s11042-009-0410-9","DOI":"10.1007\/s11042-009-0410-9"},{"key":"12157_CR19","doi-asserted-by":"publisher","unstructured":"Mutalemwa LC, Shin S (2018) Strategic location-based random routing for source location privacy in wireless sensor networks. Sensors (Switzerland) 18. https:\/\/doi.org\/10.3390\/s18072291","DOI":"10.3390\/s18072291"},{"key":"12157_CR20","doi-asserted-by":"publisher","first-page":"140169","DOI":"10.1109\/ACCESS.2019.2943710","volume":"7","author":"LC Mutalemwa","year":"2019","unstructured":"Mutalemwa LC, Shin S (2019) Regulating the packet transmission cost of source location privacy routing schemes in event monitoring wireless networks. IEEE Access 7:140169\u2013140181. https:\/\/doi.org\/10.1109\/ACCESS.2019.2943710","journal-title":"IEEE Access"},{"key":"12157_CR21","doi-asserted-by":"publisher","unstructured":"Mutalemwa LC, Shin S (2019) Achieving source location privacy protection in monitoring wireless sensor networks through proxy node routing. Sensors (Switzerland) 19. https:\/\/doi.org\/10.3390\/s19051037","DOI":"10.3390\/s19051037"},{"key":"12157_CR22","doi-asserted-by":"publisher","unstructured":"Nadian-Ghomsheh A, Farahani B, Kavian M (2021) A hierarchical privacy-preserving IoT architecture for vision-based hand rehabilitation assessment. Multimed Tools Appl 1\u201324. https:\/\/doi.org\/10.1007\/s11042-021-10563-2","DOI":"10.1007\/s11042-021-10563-2"},{"key":"12157_CR23","doi-asserted-by":"publisher","unstructured":"Naumowicz T, Freeman R, Kirk H, Dean B, Calsyn M, Liers A, Braendle A, Guilford T, Schiller J (2010) Wireless sensor network for habitat monitoring on Skomer Island. In: Proc. - Conf. Local Comput. Networks, LCN, pp 882\u2013889. https:\/\/doi.org\/10.1109\/LCN.2010.5735827","DOI":"10.1109\/LCN.2010.5735827"},{"key":"12157_CR24","doi-asserted-by":"publisher","unstructured":"Ozturk C, Zhang Y, Trappe W (2004)Source-location privacy in energy-constrained sensor network routing. In: Proc. 2004 ACM Work. Secur. Ad Hoc Sens. Networks, SASN\u201904, Association for Computing Machinery, pp 88\u201393. https:\/\/doi.org\/10.1145\/1029102.1029117","DOI":"10.1145\/1029102.1029117"},{"key":"12157_CR25","doi-asserted-by":"publisher","unstructured":"Ozturk C, Zhang Y, Trappe W, Ott M (2004)Source-location privacy for networks of energy-constrained sensors. In: Proc. - Second IEEE Work. Softw. Technol. Futur. Embed. Ubiquitous Syst, pp 68\u201372. https:\/\/doi.org\/10.1109\/WSTFES.2004.1300417","DOI":"10.1109\/WSTFES.2004.1300417"},{"key":"12157_CR26","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1080\/03772063.2017.1371652","volume":"64","author":"M Raja","year":"2018","unstructured":"Raja M, Datta R (2018) An enhanced source location privacy protection technique for wireless sensor networks using randomized routes. IETE J Res 64:764\u2013776. https:\/\/doi.org\/10.1080\/03772063.2017.1371652","journal-title":"IETE J Res"},{"key":"12157_CR27","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1109\/JIOT.2014.2360217","volume":"1","author":"AM Rashwan","year":"2014","unstructured":"Rashwan AM, Taha A-EM, Hassanein HS (2014) Characterizing the performance of security functions in mobile computing systems. IEEE Internet Things J 1:399\u2013413. https:\/\/doi.org\/10.1109\/JIOT.2014.2360217","journal-title":"IEEE Internet Things J"},{"key":"12157_CR28","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.compeleceng.2018.03.018","volume":"67","author":"M Sajwan","year":"2018","unstructured":"Sajwan M, Gosain D, Sharma AK (2018) Hybrid energy-efficient multi-path routing for wireless sensor networks R. Comput Electr Eng 67:96\u2013113. https:\/\/doi.org\/10.1016\/j.compeleceng.2018.03.018","journal-title":"Comput Electr Eng"},{"key":"12157_CR29","doi-asserted-by":"crossref","unstructured":"Sheu J (2008) Anonymous path routing in wireless sensor networks, 2728\u20132734","DOI":"10.1109\/ICC.2008.515"},{"key":"12157_CR30","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.3233\/JIFS-169674","volume":"35","author":"A Shukla","year":"2018","unstructured":"Shukla A, Tripathi S (2018) An optimal relay node selection technique to support green internet of things. J Intell Fuzzy Syst 35:1301\u20131314. https:\/\/doi.org\/10.3233\/JIFS-169674","journal-title":"J Intell Fuzzy Syst"},{"key":"12157_CR31","doi-asserted-by":"publisher","first-page":"3471","DOI":"10.1007\/s11276-020-02277-4","volume":"26","author":"A Shukla","year":"2020","unstructured":"Shukla A, Tripathi S (2020) A multi-tier based clustering framework for scalable and energy efficient WSN-assisted IoT network. Wirel Networks 26:3471\u20133493. https:\/\/doi.org\/10.1007\/s11276-020-02277-4","journal-title":"Wirel Networks"},{"key":"12157_CR32","doi-asserted-by":"publisher","first-page":"2611","DOI":"10.1007\/s11277-020-07167-8","volume":"112","author":"A Shukla","year":"2020","unstructured":"Shukla A, Tripathi S (2020) An effective relay node selection technique for energy efficient WSN-assisted IoT. Wirel Pers Commun 112:2611\u20132641. https:\/\/doi.org\/10.1007\/s11277-020-07167-8","journal-title":"Wirel Pers Commun"},{"key":"12157_CR33","doi-asserted-by":"publisher","first-page":"102182","DOI":"10.1016\/j.adhoc.2020.102182","volume":"107","author":"A Singh","year":"2020","unstructured":"Singh A, Nagaraju A (2020) Low latency and energy efficient routing-aware network coding-based data transmission in multi-hop and multi-sink WSN. Ad Hoc Netw 107:102182. https:\/\/doi.org\/10.1016\/j.adhoc.2020.102182","journal-title":"Ad Hoc Netw"},{"key":"12157_CR34","doi-asserted-by":"publisher","unstructured":"Sun Z, Wang P, Vuran MC, Al-Rodhaan MA, Al-Dhelaan AM, Akyildiz IF (2011) BorderSense: Border patrol through advanced wireless sensor networks. Ad Hoc Netw 9:468\u2013477. https:\/\/doi.org\/10.1016\/j.adhoc.2010.09.008","DOI":"10.1016\/j.adhoc.2010.09.008"},{"key":"12157_CR35","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.future.2017.11.042","volume":"81","author":"JT Thirukrishna","year":"2018","unstructured":"Thirukrishna JT, Karthik S, Arunachalam VP (2018) Revamp energy efficiency in Homogeneous Wireless Sensor Networks using Optimized Radio Energy Algorithm (OREA) and Power-Aware Distance Source Routing protocol. Futur Gener Comput Syst 81:331\u2013339. https:\/\/doi.org\/10.1016\/j.future.2017.11.042","journal-title":"Futur Gener Comput Syst"},{"key":"12157_CR36","doi-asserted-by":"publisher","unstructured":"Wang J, Gao Y, Yin X, Li F, Kim HJ (2018) (2018) An enhanced PEGASIS algorithm with mobile sink support for wireless sensor networks. Wirel Commun Mob Comput. https:\/\/doi.org\/10.1155\/2018\/9472075","DOI":"10.1155\/2018\/9472075"},{"key":"12157_CR37","doi-asserted-by":"publisher","first-page":"433","DOI":"10.3970\/cmc.2018.04132","volume":"56","author":"J Wang","year":"2018","unstructured":"Wang J, Ju C, Gao Y, Sangaiah AK, Kim GJ (2018) A PSO based energy efficient coverage control algorithm for wireless sensor networks. Comput Mater Contin 56:433\u2013446. https:\/\/doi.org\/10.3970\/cmc.2018.04132","journal-title":"Comput Mater Contin"},{"key":"12157_CR38","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.comnet.2018.11.005","volume":"148","author":"H Wang","year":"2019","unstructured":"Wang H, Han G, Zhou L, Ansere JA, Zhang W (2019) A Source Location privacy protection scheme based on ring-loop routing for the IoT. Comput Networks 148:142\u2013150. https:\/\/doi.org\/10.1016\/j.comnet.2018.11.005","journal-title":"Comput Networks"},{"key":"12157_CR39","doi-asserted-by":"publisher","first-page":"1494","DOI":"10.3390\/s19071494","volume":"19","author":"J Wang","year":"2019","unstructured":"Wang J, Gao Y, Liu W, Sangaiah AK, Kim H-J(2019) Energy efficient routing algorithm with mobile sink support for wireless sensor networks. Sensors 19:1494. https:\/\/doi.org\/10.3390\/s19071494","journal-title":"Sensors"},{"key":"12157_CR40","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-019-0179-4","author":"J Wang","year":"2019","unstructured":"Wang J, Gu X, Liu W, Sangaiah AK, Kim HJ (2019) An empower hamilton loop based data collection algorithm with mobile agent for WSNs. Hum -Centric Comput Inf Sci 9:18. https:\/\/doi.org\/10.1186\/s13673-019-0179-4"},{"key":"12157_CR41","doi-asserted-by":"publisher","first-page":"695","DOI":"10.32604\/cmc.2020.08674","volume":"62","author":"J Wang","year":"2020","unstructured":"Wang J, Gao Y, Zhou C, Simon Sherratt R, Wang L (2020) Optimal coverage multi-path scheduling scheme with multiple mobile sinks for WSNs. Comput Mater Contin 62:695\u2013711. https:\/\/doi.org\/10.32604\/cmc.2020.08674","journal-title":"Comput Mater Contin"},{"key":"12157_CR42","doi-asserted-by":"publisher","first-page":"102115","DOI":"10.1016\/j.adhoc.2020.102115","volume":"102","author":"W Xu","year":"2020","unstructured":"Xu W, Zhang X, Yao L, Xue W, Wei B (2020) A multi-view CNN-based acoustic classification system for automatic animal species identification. Ad Hoc Networks 102:102115. https:\/\/doi.org\/10.1016\/j.adhoc.2020.102115","journal-title":"Ad Hoc Networks"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12157-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12157-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12157-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T11:32:55Z","timestamp":1648553575000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12157-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,17]]},"references-count":42,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["12157"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12157-y","relation":{"references":[{"id-type":"uri","id":"","asserted-by":"subject"}]},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,17]]},"assertion":[{"value":"11 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}