{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:41:29Z","timestamp":1760028089982},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T00:00:00Z","timestamp":1450224000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1007\/s11276-015-1141-7","type":"journal-article","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T09:26:28Z","timestamp":1450257988000},"page":"267-277","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Fault detection and recovery scheme for routing and lifetime enhancement in WSN"],"prefix":"10.1007","volume":"23","author":[{"given":"M.","family":"Yuvaraja","sequence":"first","affiliation":[]},{"given":"M.","family":"Sabrigiriraj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,16]]},"reference":[{"issue":"6","key":"1141_CR1","doi-asserted-by":"crossref","first-page":"1932","DOI":"10.1109\/JSEN.2014.2306429","volume":"14","author":"CF Wang","year":"2014","unstructured":"Wang, C. F., Shih, J. D., Pan, B. H., & Wu, T. Y. (2014). A network lifetime enhancement method for sink relocation and its analysis in wireless sensor networks. IEEE Sensors Journal, 14(6), 1932\u20131943.","journal-title":"IEEE Sensors Journal"},{"key":"1141_CR2","doi-asserted-by":"crossref","unstructured":"Wang, H., Zhang, X., & Khokhar, A. (2007). Efficient \u201cvoid\u201d handling in contention-based geographic routing for wireless sensor networks. In IEEE global telecommunications conference GLOBECOM.","DOI":"10.1109\/GLOCOM.2007.129"},{"issue":"7","key":"1141_CR3","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1109\/MCOM.2013.6553686","volume":"51","author":"K Han","year":"2013","unstructured":"Han, K., et al. (2013). Algorithm design for data communications in duty-cycled wireless sensor networks: A survey. IEEE Communications Magazine, 51(7), 107\u2013113.","journal-title":"IEEE Communications Magazine"},{"key":"1141_CR4","doi-asserted-by":"crossref","unstructured":"Yao, Y., et al. (2013). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. In MASS (pp. 182\u2013190).","DOI":"10.1109\/MASS.2013.44"},{"issue":"6","key":"1141_CR5","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/MWC.2013.6704479","volume":"20","author":"Z Sheng","year":"2013","unstructured":"Sheng, Z., et al. (2013). A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities. Wireless Communications, IEEE., 20(6), 91\u201398.","journal-title":"Wireless Communications, IEEE."},{"key":"1141_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, K., Wang, C., & Wang, C. (2008). A secure routing protocol for cluster-based wireless sensor networks using group key management. In 4th International conference on wireless communications, networking and mobile computing, WiCOM.","DOI":"10.1109\/WiCom.2008.889"},{"key":"1141_CR7","unstructured":"Kang, K. D., Liu, K., & Abu-Ghazaleh, N. (2006). Securing geographic routing in wireless sensor networks. In 9th Annual cyber security conference on information assurance."},{"key":"1141_CR8","doi-asserted-by":"crossref","unstructured":"Yu, P., Jia, S., & Xi-yuan, P. (2011). A self detection technique in fault management in WSN. In IEEE instrumentation and measurement technology conference (I2MTC).","DOI":"10.1109\/IMTC.2011.5944171"},{"key":"1141_CR9","doi-asserted-by":"crossref","unstructured":"Wei, L., et al. (2010). SecCloud: Bridging secure storage and computation in cloud. In ICDCS Workshops (pp. 52\u201361).","DOI":"10.1109\/ICDCSW.2010.36"},{"key":"1141_CR10","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z Yan","year":"2014","unstructured":"Yan, Z., et al. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120\u2013134.","journal-title":"Journal of Network and Computer Applications"},{"issue":"8","key":"1141_CR11","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing, Q., et al. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481\u20132501.","journal-title":"Wireless Networks"},{"issue":"6","key":"1141_CR12","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1109\/TITB.2012.2206115","volume":"16","author":"Z Zhang","year":"2012","unstructured":"Zhang, Z., et al. (2012). ECG-cryptography and authentication in body area networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1070\u20131078.","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"issue":"1","key":"1141_CR13","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s11042-012-1054-8","volume":"67","author":"Y Zhang","year":"2013","unstructured":"Zhang, Y., et al. (2013). A real-time dynamic key management for hierarchical wireless multimedia sensor network. Multimedia tools and applications, 67(1), 97\u2013117.","journal-title":"Multimedia tools and applications"},{"issue":"3","key":"1141_CR14","first-page":"45","volume":"11","author":"X Xu","year":"2015","unstructured":"Xu, X., et al. (2015). Hierarchical data aggregation using compressive sensing (HDACS) in WSNs. ACM Transactions on Sensor Networks (TOSN)., 11(3), 45.","journal-title":"ACM Transactions on Sensor Networks (TOSN)."},{"key":"1141_CR15","doi-asserted-by":"crossref","unstructured":"Xiang, L., et al. (2011). Compressed data aggregation for energy efficient wireless sensor networks. In SECON (pp. 46\u201354).","DOI":"10.1109\/SAHCN.2011.5984932"},{"key":"1141_CR16","doi-asserted-by":"crossref","unstructured":"Campana, T., & O\u2019Hare, G. M. (2013). Intellectus: multi-hop fault detection methodology. In International conference on selected topics in mobile and wireless networking (MoWNeT).","DOI":"10.1109\/ICSensT.2013.6727621"},{"issue":"8","key":"1141_CR17","doi-asserted-by":"crossref","first-page":"2188","DOI":"10.1109\/TPDS.2014.2345257","volume":"26","author":"X-Y Liu","year":"2015","unstructured":"Liu, X.-Y., et al. (2015). CDC: Compressive data collection for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2188\u20132197.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"4","key":"1141_CR18","doi-asserted-by":"crossref","first-page":"1234","DOI":"10.1109\/TNET.2009.2039492","volume":"18","author":"ZM Fadlullah","year":"2010","unstructured":"Fadlullah, Z. M., et al. (2010). DTRAB: combating against attacks on encrypted protocols through traffic-feature analysis. IEEE\/ACM Transactions on Networking (TON), 18(4), 1234\u20131247.","journal-title":"IEEE\/ACM Transactions on Networking (TON)"},{"issue":"4","key":"1141_CR19","doi-asserted-by":"crossref","first-page":"1996","DOI":"10.1109\/COMST.2014.2320099","volume":"16","author":"M Abu Alsheikh","year":"2014","unstructured":"Abu Alsheikh, M., Lin, S., Niyato, D., & Tan, H. P. (2014). Machine learning in wireless sensor networks: Algorithms, strategies, and applications. Communications Surveys and Tutorials, IEEE, 16(4), 1996\u20132018.","journal-title":"Communications Surveys and Tutorials, IEEE"},{"issue":"4","key":"1141_CR20","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1109\/TITB.2012.2194788","volume":"16","author":"D He","year":"2012","unstructured":"He, D., et al. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623\u2013632.","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"issue":"10","key":"1141_CR21","doi-asserted-by":"crossref","first-page":"1538","DOI":"10.1109\/TMC.2011.190","volume":"11","author":"Y Xiao","year":"2012","unstructured":"Xiao, Y., et al. (2012). Tight performance bounds of multihop fair access for MAC protocols in wireless sensor networks and underwater sensor networks. IEEE Transactions on Mobile Computing, 11(10), 1538\u20131554.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"6","key":"1141_CR22","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1016\/j.comcom.2010.10.003","volume":"34","author":"G Wei","year":"2011","unstructured":"Wei, G., et al. (2011). Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman filter. Computer Communications, 34(6), 793\u2013802.","journal-title":"Computer Communications"},{"key":"1141_CR23","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/j.ins.2013.04.028","volume":"258","author":"L Wei","year":"2014","unstructured":"Wei, L., et al. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371\u2013386.","journal-title":"Information Sciences"},{"key":"1141_CR24","doi-asserted-by":"crossref","unstructured":"Rehena, Z., Mukherjee, R., Roy, S., & Mukherjee, N. (2014). Detection of node failure in wireless sensor networks. Applications and innovations in mobile computing (AIMoC).","DOI":"10.1109\/AIMOC.2014.6785531"},{"issue":"6","key":"1141_CR25","doi-asserted-by":"crossref","first-page":"1164","DOI":"10.1109\/TITB.2012.2199996","volume":"16","author":"Daojing He","year":"2012","unstructured":"He, Daojing, et al. (2012). A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1164\u20131175.","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"key":"1141_CR26","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.comnet.2013.08.020","volume":"58","author":"Haomin Yang","year":"2014","unstructured":"Yang, Haomin, et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29\u201338.","journal-title":"Computer Networks"},{"key":"1141_CR27","unstructured":"Yan, Z., et al. (XXXX). A security and trust framework for virtualized networks and software\u2010defined networking. In Security and communication networks."},{"key":"1141_CR28","unstructured":"Yin, X., et al. (XXXX). Keep all mobile users\u2032 whereabouts secure: A radio frequency identification protocol anti\u2010tracking. In 5G international journal of communication systems."},{"issue":"1","key":"1141_CR29","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1109\/TVT.2012.2212734","volume":"62","author":"AA Abbasi","year":"2013","unstructured":"Abbasi, A. A., Younis, M. F., & Baroudi, U. A. (2013). Recovering from a node failure in wireless sensor-actor networks with minimal topology changes. IEEE Transactions on Vehicular Technology, 62(1), 256\u2013271.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"1141_CR30","unstructured":"Network Simulator: http:\/\/\/ www.isi.edu\/nsnam\/ns ."},{"key":"1141_CR31","doi-asserted-by":"crossref","unstructured":"Afsar, M. M. (2014). Maximizing the reliability of clustered sensor networks by a fault-tolerant service. In IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).","DOI":"10.1109\/CCECE.2014.6901138"},{"key":"1141_CR32","doi-asserted-by":"crossref","unstructured":"Szczytowski, P., Khelil, A., & Suri, N. (2012). DKM: Distributed k-connectivity maintenance in wireless sensor networks. In 9th Annual conference on wireless on-demand network systems and services (WONS).","DOI":"10.1109\/WONS.2012.6152244"},{"key":"1141_CR33","doi-asserted-by":"crossref","unstructured":"Da Silva, R. I., Macedo, D. F., & Nogueira, J. M. S. (2012). Fault tolerance in spatial query processing for wireless sensor networks. In IEEE Network Operations and Management Symposium (NOMS).","DOI":"10.1109\/NOMS.2012.6211887"},{"issue":"5","key":"1141_CR34","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1016\/j.jpdc.2009.12.004","volume":"70","author":"S Lee","year":"2010","unstructured":"Lee, S., & Younis, M. (2010). Recovery from multiple simultaneous failures in wireless sensor networks using minimum Steiner tree. Journal of Parallel and Distributed Computing, 70(5), 525\u2013536.","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"1141_CR35","unstructured":"Guan, Z., Gao, Z., Yang, Y., Li, Y., & Qiu, X. (2010). A distributed fault recovery method in clustering-based wireless sensor networks. In Proceedings of AIAI2010 (pp. 269\u2013273)."},{"issue":"4","key":"1141_CR36","doi-asserted-by":"crossref","first-page":"1835","DOI":"10.1109\/TVT.2011.2131158","volume":"60","author":"F Senel","year":"2011","unstructured":"Senel, F., Younis, M. F., & Akkaya, K. (2011). Bio-inspired relay node placement heuristics for repairing damaged wireless sensor networks. IEEE Transactions on Vehicular Technology, 60(4), 1835\u20131848.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"2","key":"1141_CR37","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1109\/TC.2009.120","volume":"59","author":"K Akkaya","year":"2010","unstructured":"Akkaya, K., Senel, F., Thimmapuram, A., & Uludag, S. (2010). Distributed recovery from network partitioning in movable sensor\/actor networks via controlled mobility. IEEE Transactions on Computers, 59(2), 258\u2013271.","journal-title":"IEEE Transactions on Computers"},{"issue":"5","key":"1141_CR38","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1109\/TMC.2009.161","volume":"9","author":"X Han","year":"2010","unstructured":"Han, X., Cao, X., Lloyd, E. L., & Shen, C. C. (2010). Fault-tolerant relay node placement in heterogeneous wireless sensor networks. IEEE Transactions on Mobile Computing, 9(5), 643\u2013656.","journal-title":"IEEE Transactions on Mobile Computing"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-015-1141-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-015-1141-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-015-1141-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-015-1141-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T13:04:12Z","timestamp":1559394252000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-015-1141-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,16]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["1141"],"URL":"https:\/\/doi.org\/10.1007\/s11276-015-1141-7","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,16]]}}}