{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T15:50:48Z","timestamp":1751385048873},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s11235-023-01087-1","type":"journal-article","created":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T09:02:15Z","timestamp":1704272535000},"page":"313-329","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An efficient node localization and failure node detection in the MANET environment"],"prefix":"10.1007","volume":"85","author":[{"given":"Kailash P.","family":"Dewangan","sequence":"first","affiliation":[]},{"given":"Padma","family":"Bonde","sequence":"additional","affiliation":[]},{"given":"Rohit","family":"Raja","sequence":"additional","affiliation":[]},{"given":"Jyotir Moy","family":"Chatterjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,3]]},"reference":[{"issue":"2","key":"1087_CR1","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1016\/j.compeleceng.2013.10.010","volume":"40","author":"A Boudries","year":"2014","unstructured":"Boudries, A., Aliouat, M., & Siarry, P. (2014). Detection and replacement of a failing node in the wireless sensors networks. Computers and Electrical Engineering, 40(2), 421\u2013432.","journal-title":"Computers and Electrical Engineering"},{"key":"1087_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.102021","author":"H Riasudheen","year":"2019","unstructured":"Riasudheen, H., Selvamani, K., Mukherjee, S., & Divyasree, I. R. (2019). An efficient energy-aware routing scheme for cloud-assisted MANETs in 5G. Ad Hoc Networks. https:\/\/doi.org\/10.1016\/j.adhoc.2019.102021","journal-title":"Ad Hoc Networks"},{"key":"1087_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.03.699","author":"SC Jalade","year":"2021","unstructured":"Jalade, S. C., & Patil, N. B. (2021). Optimization technique for fault recovery and fast data transmission in MANET. Materials Today Proceedings. https:\/\/doi.org\/10.1016\/j.matpr.2021.03.699","journal-title":"Materials Today Proceedings"},{"key":"1087_CR4","doi-asserted-by":"crossref","unstructured":"Benkaouha, H., Abdelli, A., Ben-Othman, J., & Mokdad, L. (2018). Failure detection in MANETs based on geographical repartition of nodes. In IEEE symposium on computers and communications (ISCC).","DOI":"10.1109\/ISCC.2018.8538666"},{"issue":"6","key":"1087_CR5","doi-asserted-by":"publisher","first-page":"748","DOI":"10.4236\/cs.2016.76064","volume":"7","author":"S Gopalakrishnan","year":"2016","unstructured":"Gopalakrishnan, S., & Mohan Kumar, P. (2016). Performance analysis of malicious node detection and elimination using clustering approach on MANET. Circuits and Systems, 7(6), 748\u2013758.","journal-title":"Circuits and Systems"},{"key":"1087_CR6","doi-asserted-by":"crossref","unstructured":"Yu, H., & Ahn, S. (2008). Node movement detection to overcome false route failures in mobile ad hoc networks. In International Conference on Information Science and Security.","DOI":"10.1109\/ICISS.2008.40"},{"key":"1087_CR7","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2014-205","author":"SK Subramaniyan","year":"2014","unstructured":"Subramaniyan, S. K., Johnson, W., & Subramaniyan, K. (2014). A distributed framework for detecting selfish nodes in MANET using record and trust based detection (RTBD) technique. EURASIP Journal on Wireless Communications and Networking. https:\/\/doi.org\/10.1186\/1687-1499-2014-205","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"2","key":"1087_CR8","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1109\/JSEN.2013.2284796","volume":"14","author":"RN Duche","year":"2014","unstructured":"Duche, R. N., & Sarwade, N. P. (2014). Sensor node failure detection based on roundtrip delay and paths in WSNs. IEEE Sensors Journal, 14(2), 455\u2013464.","journal-title":"IEEE Sensors Journal"},{"key":"1087_CR9","doi-asserted-by":"crossref","unstructured":"Singh, S. S., & Jinila, Y. B. (2016). Sensor node failure detection using checkpoint recovery algorithm. In Fifth international conference on recent trends in information technology.","DOI":"10.1109\/ICRTIT.2016.7569585"},{"key":"1087_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.05.355","author":"P Satyanarayana","year":"2021","unstructured":"Satyanarayana, P., Mahalakshmi, T., Sivakami, R., Alahmari, S. A., Rajeyyagari, S., & Asadi, S. (2021). A new algorithm for detection of nodes failures and enhancement of network coverage and energy usage in wireless sensor networks. Materials Today Proceedings. https:\/\/doi.org\/10.1016\/j.matpr.2021.05.355","journal-title":"Materials Today Proceedings"},{"key":"1087_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2018.06.033","author":"J Ludena-Choez","year":"2017","unstructured":"Ludena-Choez, J., Choquehuanca-Zevallos, J. J., & Mayhua-Lopez, E. (2017). Sensor nodes fault detection for agricultural wireless sensor networks based on NMF. Computers and Electronics in Agriculture. https:\/\/doi.org\/10.1016\/j.compag.2018.06.033","journal-title":"Computers and Electronics in Agriculture"},{"key":"1087_CR12","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.1016\/j.procs.2018.04.266","volume":"131","author":"Y Feiyue","year":"2018","unstructured":"Feiyue, Y., Yang, T., Siqing, Z., Jianjian, D., Juan, X., & Yao, H. (2018). A faulty node detection algorithm based on spatial-temporal cooperation in wireless sensor networks. Procedia Computer Science, 131, 1089\u20131094.","journal-title":"Procedia Computer Science"},{"key":"1087_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, T., Zhao, Q., & Nakamoto, Y. (2017). Faulty sensor data detection in wireless sensor networks using logistical regression. In 37th international conference on distributed computing systems workshops.","DOI":"10.1109\/ICDCSW.2017.37"},{"key":"1087_CR14","doi-asserted-by":"crossref","unstructured":"Jadav, P., & Babu, V. K. (2017). Fuzzy logic based faulty node detection in wireless sensor network. In international conference on communication and signal processing.","DOI":"10.1109\/ICCSP.2017.8286384"},{"key":"1087_CR15","doi-asserted-by":"publisher","first-page":"101924","DOI":"10.1016\/j.adhoc.2019.101924","volume":"93","author":"RR Swain","year":"2019","unstructured":"Swain, R. R., Dash, T., & Khilar, P. M. (2019). A complete diagnosis of faulty sensor modules in a wireless sensor network. Ad Hoc Networks, 93, 101924.","journal-title":"Ad Hoc Networks"},{"key":"1087_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.simpat.2018.05.012","volume":"87","author":"HN Azar","year":"2018","unstructured":"Azar, H. N., & Malazi, H. T. (2018). Decentralized detection of hybrid faults in mobile sensor nodes. Simulation Modelling Practice and Theory, 87, 1\u201331.","journal-title":"Simulation Modelling Practice and Theory"},{"key":"1087_CR17","doi-asserted-by":"crossref","unstructured":"Shial, R. K., Gouda, B. S., Pattanaik, S. R., & Sethi, N. (2020). A centralized faulty node detection algorithm based on statistical analysis in WSN. In International conference on computer science, engineering and applications (ICCSEA).","DOI":"10.1109\/ICCSEA49143.2020.9132847"},{"key":"1087_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2018.11.009","volume":"127","author":"SK Ghalem","year":"2019","unstructured":"Ghalem, S. K., Kechar, B., Bounceur, A., & Euler, R. (2019). A probabilistic multivariate copula-based technique for faulty node diagnosis in wireless sensor networks. Journal of Network and Computer Applications, 127, 1\u201348.","journal-title":"Journal of Network and Computer Applications"},{"key":"1087_CR19","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2474371","author":"R Jin","year":"2015","unstructured":"Jin, R., Wang, B., Wei, W., Zhang, X., Chen, X., Bar-Shalom, Y., & Willett, P. (2015). Detecting node failures in mobile wireless networks a probabilistic approach. IEEE Transactions on Mobile Computing. https:\/\/doi.org\/10.1109\/TMC.2015.2474371","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"1087_CR20","doi-asserted-by":"publisher","unstructured":"Liu, Y., Xiao, Z., Fang, H., Yang, Y., & Yu, P. (2023). Self-organizing temporal-spatial failures awareness for access nodes under dynamic mobile edge networks. In 2023 IEEE international symposium on broadband multimedia systems and broadcasting (BMSB), pp. 1\u20136. https:\/\/doi.org\/10.1109\/BMSB58369.2023.10211150","DOI":"10.1109\/BMSB58369.2023.10211150"},{"key":"1087_CR21","doi-asserted-by":"publisher","unstructured":"Montecchiari, L., Trotta, A., Bononi, L., Di Felice, M., & Natalizio, E. (2023). Autonomic faulty node replacement in UAV-Assisted wireless sensor networks: A test-bed. In 2023 IEEE 20th consumer communications & networking conference (CCNC), pp. 1155\u20131158. https:\/\/doi.org\/10.1109\/CCNC51644.2023.10059801","DOI":"10.1109\/CCNC51644.2023.10059801"},{"key":"1087_CR22","doi-asserted-by":"publisher","unstructured":"Dhivya, K., Premkumar, K., Balasaranya, K., & Dhanalakshmi, S. (2023). Untrustworthy Mobile node isolation by belief factor in autonomous mobile network. In 2023 2nd International conference on edge computing and applications (ICECAA), pp. 177\u2013181. https:\/\/doi.org\/10.1109\/ICECAA58104.2023.10212372","DOI":"10.1109\/ICECAA58104.2023.10212372"},{"key":"1087_CR23","doi-asserted-by":"publisher","unstructured":"JayaPratha, S., Asanambigai, V., & Mugunthan, S. R. (2022). Transient failures detection in data transfer for wireless sensors based communication using stochastic gradient descent with momentum. pp. 483\u2013487. https:\/\/doi.org\/10.1109\/icssit53264.2022.9716547","DOI":"10.1109\/icssit53264.2022.9716547"},{"key":"1087_CR24","doi-asserted-by":"publisher","first-page":"61046","DOI":"10.1109\/access.2022.3181742","volume":"10","author":"N Berjab","year":"2022","unstructured":"Berjab, N., Le, H. H., & Yokota, H. (2022). Recovering missing data via top-k repeated patterns for fuzzy-based abnormal node detection in sensor networks. IEEE Access, 10, 61046\u201361064. https:\/\/doi.org\/10.1109\/access.2022.3181742","journal-title":"IEEE Access"},{"key":"1087_CR25","doi-asserted-by":"publisher","unstructured":"Suma, S., & Harsoor, B. (2022). Detection of malicious activity for mobile nodes to avoid congestion in wireless sensor network. In Proceedings of IEEE 2022 4th international conference on advances in electronics, computers and communications, ICAECC 2022. https:\/\/doi.org\/10.1109\/ICAECC54045.2022.9716673","DOI":"10.1109\/ICAECC54045.2022.9716673"},{"issue":"5","key":"1087_CR26","doi-asserted-by":"publisher","first-page":"4722","DOI":"10.1109\/JSEN.2022.3146853","volume":"22","author":"G Kaur","year":"2022","unstructured":"Kaur, G., & Chanak, P. (2022). An energy aware intelligent fault detection scheme for IoT-enabled WSNs. IEEE Sensors Journal, 22(5), 4722\u20134731. https:\/\/doi.org\/10.1109\/JSEN.2022.3146853","journal-title":"IEEE Sensors Journal"},{"key":"1087_CR27","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1007\/s11277-023-10171-3","volume":"129","author":"V Gupta","year":"2023","unstructured":"Gupta, V., Bonde, P., Raja, R., et al. (2023). Comparison of cumulative power consumption with signal strength variations in new generation wireless networks. Wireless Personal Communications, 129, 1025\u20131048. https:\/\/doi.org\/10.1007\/s11277-023-10171-3","journal-title":"Wireless Personal Communications"},{"key":"1087_CR28","doi-asserted-by":"publisher","unstructured":"Rani, K. S. K., & Vijayalakshmi, R. (2021). Experimental evaluations of malicious node detection on wireless sensor network environment. In Proceedings: 5th International Conference on Intelligent Computing and Control Systems, ICICCS 2021, Iciccs, pp. 185\u2013191. https:\/\/doi.org\/10.1109\/ICICCS51141.2021.9432131","DOI":"10.1109\/ICICCS51141.2021.9432131"},{"key":"1087_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.12.034","author":"R Palanikumar","year":"2019","unstructured":"Palanikumar, R., & Ramasamy, K. (2019). Software defined network based self-diagnosing faulty node detection scheme for surveillance applications\u201d. Computer Communications. https:\/\/doi.org\/10.1016\/j.comcom.2019.12.034","journal-title":"Computer Communications"},{"key":"1087_CR30","doi-asserted-by":"publisher","unstructured":"Dewangan, K. P., & Bonde, P. (2018). Application of RPGM model in wireless ad-hoc network (April 29, 2018). In Proceedings of 3rd international conference on internet of things and connected technologies (ICIoTCT), 2018 held at malaviya national institute of technology, Jaipur (India) on March 26\u201327, 2018, https:\/\/ssrn.com\/abstract=3170519\u00a0or\u00a0https:\/\/doi.org\/10.2139\/ssrn.3170519","DOI":"10.2139\/ssrn.3170519"},{"key":"1087_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.09.040","author":"PCI Banerjee","year":"2015","unstructured":"Banerjee, P. C. I. (2015). Fuzzy rule-based faulty node classification and management scheme for large scale wireless sensor networks. Expert Systems with Applications. https:\/\/doi.org\/10.1016\/j.eswa.2015.09.040","journal-title":"Expert Systems with Applications"},{"key":"1087_CR32","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.swevo.2013.05.004","volume":"13","author":"A Mahapatro","year":"2013","unstructured":"Mahapatro, A., & Khilar, P. M. (2013). Detection and diagnosis of node failure in wireless sensor networks: A multiobjective optimization approach. Swarm and Evolutionary Computation, 13, 74\u201384.","journal-title":"Swarm and Evolutionary Computation"},{"issue":"3","key":"1087_CR33","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1109\/LCOMM.2013.020413.122463","volume":"17","author":"A Prasetiadi","year":"2013","unstructured":"Prasetiadi, A., & Kim, D.-S. (2013). Faulty node detection in distributed systems using BCH code. IEEE Communications Letters, 17(3), 620\u2013623.","journal-title":"IEEE Communications Letters"},{"key":"1087_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1483-8_31","volume-title":"Advanced computing and intelligent engineering. Advances in intelligent systems and computing","author":"KP Dewangan","year":"2020","unstructured":"Dewangan, K. P., Bonde, P., & Raja, R. (2020). Application of group mobility model for ad hoc network. In B. Pati, C. Panigrahi, R. Buyya, & K. C. Li (Eds.), Advanced computing and intelligent engineering. Advances in intelligent systems and computing.  (Vol. 1089). Springer. https:\/\/doi.org\/10.1007\/978-981-15-1483-8_31"},{"key":"1087_CR35","doi-asserted-by":"publisher","unstructured":"Latiff, N. A., Tsimenidis, C. C., & Sharif, B. S. (2007). Performance comparison of optimization algorithms for clustering in wireless sensor networks. In 2007 IEEE international conference on mobile adhoc and sensor systems, MASS, pp. 5\u20138. https:\/\/doi.org\/10.1109\/MOBHOC.2007.4428638","DOI":"10.1109\/MOBHOC.2007.4428638"},{"key":"1087_CR36","doi-asserted-by":"publisher","unstructured":"Varshney, A. K., Mehra, P., Muhuri, P. K., & Danish Lohani, Q. M. (2020). Interval-valued fuzzy c-means algorithm and interval-valued density-based fuzzy c-means algorithm. In IEEE international conference on fuzzy systems. https:\/\/doi.org\/10.1109\/FUZZ48607.2020.9177602","DOI":"10.1109\/FUZZ48607.2020.9177602"},{"key":"1087_CR37","doi-asserted-by":"publisher","unstructured":"Patel, P., Sivaiah, B., & Patel, R. (2022). Approaches for finding optimal number of clusters using K-means and agglomerative Hierarchical clustering techniques. In 2022 international conference on intelligent controller and computing for smart power (ICICCSP), pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICICCSP53532.2022.9862439.","DOI":"10.1109\/ICICCSP53532.2022.9862439"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-023-01087-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-023-01087-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-023-01087-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,10]],"date-time":"2024-02-10T04:29:42Z","timestamp":1707539382000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-023-01087-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,3]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["1087"],"URL":"https:\/\/doi.org\/10.1007\/s11235-023-01087-1","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,3]]},"assertion":[{"value":"28 November 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}