{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T15:28:05Z","timestamp":1768318085827,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s11227-022-04533-0","type":"journal-article","created":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T20:34:33Z","timestamp":1652733273000},"page":"17132-17149","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A secret sharing-based scheme for secure and energy efficient data transfer in sensor-based IoT"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2182-4255","authenticated-orcid":false,"given":"Anubhav","family":"Shivhare","sequence":"first","affiliation":[]},{"given":"Manish Kumar","family":"Maurya","sequence":"additional","affiliation":[]},{"given":"Jafar","family":"Sarif","sequence":"additional","affiliation":[]},{"given":"Manish","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,16]]},"reference":[{"issue":"4","key":"4533_CR1","doi-asserted-by":"publisher","first-page":"4854","DOI":"10.1109\/JSYST.2020.2967838","volume":"14","author":"A Shivhare","year":"2020","unstructured":"Shivhare A, Singh VK, Kumar M (2020) Anticomplementary triangles for efficient coverage in sensor network-based IoT. IEEE Syst J 14(4):4854","journal-title":"IEEE Syst J"},{"key":"4533_CR2","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.ijcip.2019.01.001","volume":"25","author":"K Kimani","year":"2019","unstructured":"Kimani K, Oduol V, Langat K (2019) Cyber security challenges for IoT-based smart grid networks. Int J Crit Infrastruct Prot 25:36","journal-title":"Int J Crit Infrastruct Prot"},{"key":"4533_CR3","doi-asserted-by":"publisher","first-page":"86448","DOI":"10.1109\/ACCESS.2020.2992441","volume":"8","author":"A Kirimtat","year":"2020","unstructured":"Kirimtat A, Krejcar O, Kertesz A, Tasgetiren MF (2020) Future trends and current state of smart city concepts: a survey. IEEE access 8:86448","journal-title":"IEEE access"},{"issue":"10","key":"4533_CR4","doi-asserted-by":"publisher","first-page":"5187","DOI":"10.1007\/s11227-018-2524-1","volume":"74","author":"F Al-Turjman","year":"2018","unstructured":"Al-Turjman F, Alturjman S (2018) Confidential smart-sensing framework in the IoT era. J Supercomput 74(10):5187","journal-title":"J Supercomput"},{"issue":"2","key":"4533_CR5","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1109\/COMST.2020.2973314","volume":"22","author":"YA Qadri","year":"2020","unstructured":"Qadri YA, Nauman A, Zikria YB, Vasilakos AV, Kim SW (2020) The future of healthcare internet of things: a survey of emerging technologies. IEEE Commun Surv Tutorials 22(2):1121","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"8","key":"4533_CR6","doi-asserted-by":"publisher","first-page":"5849","DOI":"10.1007\/s11227-019-03013-2","volume":"76","author":"S Satpathy","year":"2020","unstructured":"Satpathy S, Mohan P, Das S, Debbarma S (2020) A new healthcare diagnosis system using an IoT-based fuzzy classifier with FPGA. J Supercomput 76(8):5849","journal-title":"J Supercomput"},{"issue":"6","key":"4533_CR7","doi-asserted-by":"publisher","first-page":"4270","DOI":"10.1109\/TII.2020.3005252","volume":"17","author":"G Rathee","year":"2020","unstructured":"Rathee G, Garg S, Kaddoum G, Choi BJ (2020) Decision-making model for securing IoT devices in smart industries. IEEE Trans Industr Inf 17(6):4270","journal-title":"IEEE Trans Industr Inf"},{"issue":"5","key":"4533_CR8","doi-asserted-by":"publisher","first-page":"8182","DOI":"10.1109\/JIOT.2019.2935189","volume":"6","author":"F Meneghello","year":"2019","unstructured":"Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: Internet of threats? a survey of practical security vulnerabilities in real IoT devices,. IEEE Int Things J 6(5):8182","journal-title":"IEEE Int Things J"},{"key":"4533_CR9","doi-asserted-by":"crossref","unstructured":"Sharma M, Tandon A, Narayan S, Bhushan B (2017) Classification and analysis of security attacks in WSNs and IEEE 802.15. 4 standards: A survey, In 2017 3rd international conference on advances in computing, communication & automation (ICACCA)(Fall) (IEEE), pp. 1\u20135","DOI":"10.1109\/ICACCAF.2017.8344727"},{"key":"4533_CR10","unstructured":"Marigowda C, Thriveni J, Gowrishankar S, Venugopal K (2018) An efficient secure algorithms to mitigate DoS, replay and jamming attacks in wireless sensor network, In: Proceedings of the world congress on engineering and computer science, vol.\u00a01"},{"issue":"2","key":"4533_CR11","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1109\/JSYST.2015.2422736","volume":"11","author":"J Choi","year":"2015","unstructured":"Choi J, Bang J, Kim L, Ahn M, Kwon T (2015) Location-based key management strong against insider threats in wireless sensor networks. IEEE Syst J 11(2):494","journal-title":"IEEE Syst J"},{"issue":"5","key":"4533_CR12","doi-asserted-by":"publisher","first-page":"3948","DOI":"10.1109\/JIOT.2019.2959094","volume":"7","author":"L Zhou","year":"2019","unstructured":"Zhou L, Ge C, Hu S, Su C (2019) Energy-efficient and privacy-preserving data aggregation algorithm for wireless sensor networks. IEEE Int Things J 7(5):3948","journal-title":"IEEE Int Things J"},{"key":"4533_CR13","doi-asserted-by":"crossref","unstructured":"Jose J, Princy M, Jose J (2013) PEPPDA: Power efficient privacy preserving data aggregation for wireless sensor networks, In: 2013 IEEE international conference on emerging trends in computing, communication and nanotechnology (ICECCN) (IEEE), pp. 330\u2013336","DOI":"10.1109\/ICE-CCN.2013.6528518"},{"issue":"1","key":"4533_CR14","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/962925","volume":"10","author":"Q Zhou","year":"2014","unstructured":"Zhou Q, Yang G, He L (2014) An efficient secure data aggregation based on homomorphic primitives in wireless sensor networks. Int J Distrib Sens Netw 10(1):962925","journal-title":"Int J Distrib Sens Netw"},{"issue":"2","key":"4533_CR15","first-page":"1","volume":"16","author":"M Elshrkawey","year":"2021","unstructured":"Elshrkawey M, Al-Mahdi H (2021) Sda-sm: an efficient secure data aggregation scheme using separate mac across wireless sensor networks, International Journal of Computers. Commun Control 16(2):1","journal-title":"Commun Control"},{"key":"4533_CR16","doi-asserted-by":"crossref","unstructured":"Alghamdi WY, Wu H, Kanhere SS (2017) Reliable and secure end-to-end data aggregation using secret sharing in wsns, In 2017 IEEE wireless communications and networking conference (WCNC) (IEEE), pp 1\u20136","DOI":"10.1109\/WCNC.2017.7925558"},{"key":"4533_CR17","doi-asserted-by":"publisher","first-page":"103118","DOI":"10.1016\/j.jnca.2021.103118","volume":"190","author":"MS Yousefpoor","year":"2021","unstructured":"Yousefpoor MS, Yousefpoor E, Barati H, Barati A, Movaghar A, Hosseinzadeh M (2021) Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: a comprehensive review. J Netw Comput Appl 190:103118","journal-title":"J Netw Comput Appl"},{"key":"4533_CR18","doi-asserted-by":"crossref","unstructured":"Boneh D, Gentry C, Lynn B, Shacham H (2003) Aggregate and verifiably encrypted signatures from bilinear maps, In: International conference on the theory and applications of cryptographic techniques (Springer, 2003), pp 416\u2013432","DOI":"10.1007\/3-540-39200-9_26"},{"key":"4533_CR19","doi-asserted-by":"crossref","unstructured":"Kumar V, Madria S (2013) Pip: Privacy and integrity preserving data aggregation in wireless sensor networks, In: 2013 IEEE 32nd International Symposium on Reliable Distributed Systems (IEEE), pp 10\u201319","DOI":"10.1109\/SRDS.2013.10"},{"issue":"2","key":"4533_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3293537","volume":"15","author":"W Alghamdi","year":"2019","unstructured":"Alghamdi W, Rezvani M, Wu H, Kanhere SS (2019) Routing-aware and malicious node detection in a concealed data aggregation for WSNs. ACM Trans Sensor Netw(TOSN) 15(2):1","journal-title":"ACM Trans Sensor Netw(TOSN)"},{"issue":"5","key":"4533_CR21","doi-asserted-by":"publisher","first-page":"8714","DOI":"10.1109\/JIOT.2019.2923261","volume":"6","author":"W Tang","year":"2019","unstructured":"Tang W, Ren J, Deng K, Zhang Y (2019) Secure data aggregation of lightweight E-healthcare IoT devices with fair incentives. IEEE Internet Things J 6(5):8714","journal-title":"IEEE Internet Things J"},{"key":"4533_CR22","doi-asserted-by":"publisher","first-page":"79980","DOI":"10.1109\/ACCESS.2019.2922971","volume":"7","author":"K Haseeb","year":"2019","unstructured":"Haseeb K, Islam N, Almogren A, Din IU, Almajed HN, Guizani N (2019) Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs. IEEE Access 7:79980","journal-title":"IEEE Access"},{"issue":"2","key":"4533_CR23","first-page":"840","volume":"167","author":"LJ Pang","year":"2005","unstructured":"Pang LJ, Wang YM (2005) A new (t, n) multi-secret sharing scheme based on Shamir\u2019s secret sharing. Appl Math Comput 167(2):840","journal-title":"Appl Math Comput"},{"key":"4533_CR24","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.asoc.2019.02.014","volume":"78","author":"Y Saez","year":"2019","unstructured":"Saez Y, Estebanez C, Quintana D, Isasi P (2019) Evolutionary hash functions for specific domains. Appl Soft Comput 78:58","journal-title":"Appl Soft Comput"},{"key":"4533_CR25","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.procs.2017.10.072","volume":"116","author":"ZE Rasjid","year":"2017","unstructured":"Rasjid ZE, Soewito B, Witjaksono G, Abdurachman E (2017) Evolutionary hash functions for specific domains. Procedia Comput Sci 116:381","journal-title":"Procedia Comput Sci"},{"key":"4533_CR26","doi-asserted-by":"crossref","unstructured":"Su Y, Gao Y, Kavehei O, Ranasinghe DC (2019) Hash functions and benchmarks for resource constrained passive devices: A preliminary study, In 2019 IEEE international conference on pervasive computing and communications workshops (PerCom Workshops) (IEEE), pp. 1020\u20131025","DOI":"10.1109\/PERCOMW.2019.8730835"},{"issue":"5","key":"4533_CR27","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1049\/iet-wss.2017.0099","volume":"8","author":"TM Behera","year":"2018","unstructured":"Behera TM, Samal UC, Mohapatra SK (2018) Energy-efficient modified LEACH protocol for IoT application. IET Wireless Sensor Syst 8(5):223","journal-title":"IET Wireless Sensor Syst"},{"issue":"10","key":"4533_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LSENS.2020.3025360","volume":"4","author":"AP Behera","year":"2020","unstructured":"Behera AP, Singh A, Verma S, Kumar M (2020) Manifold learning with localized procrustes analysis based WSN localization. IEEE Sensors Lett 4(10):1","journal-title":"IEEE Sensors Lett"},{"key":"4533_CR29","doi-asserted-by":"crossref","unstructured":"Mohar SS, Goyal S, Kaur R (2022) Localization of sensor nodes in wireless sensor networks using bat optimization algorithm with enhanced exploration and exploitation characteristics, J Supercomput, pp 1\u201349","DOI":"10.1007\/s11227-022-04320-x"},{"key":"4533_CR30","doi-asserted-by":"crossref","unstructured":"Yousefpoor E, Barati H, Barati A (2021) A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks, Peer-to-Peer Networking and Applications 14(4):1917","DOI":"10.1007\/s12083-021-01116-3"},{"key":"4533_CR31","doi-asserted-by":"crossref","unstructured":"Cheng Q, Hsu C, Harn L (2020) Lightweight noninteractive membership authentication and group key establishment for WSNs, Mathematical Problems in Engineering","DOI":"10.1155\/2020\/1452546"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04533-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-022-04533-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04533-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,4]],"date-time":"2022-10-04T10:20:00Z","timestamp":1664878800000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-022-04533-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":31,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["4533"],"URL":"https:\/\/doi.org\/10.1007\/s11227-022-04533-0","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"8 April 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}