{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T23:33:33Z","timestamp":1773272013785,"version":"3.50.1"},"reference-count":83,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T00:00:00Z","timestamp":1555027200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s11276-019-01988-7","type":"journal-article","created":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T14:03:17Z","timestamp":1555077797000},"page":"2697-2721","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["$$E^{2} SR^{2}$$\n                \n                  \n                    \n                      \n                        E\n                        2\n                      \n                      S\n                      \n                        R\n                        2\n                      \n                    \n                  \n                \n              : An acknowledgement-based mobile sink routing protocol with rechargeable sensors for wireless sensor networks"],"prefix":"10.1007","volume":"25","author":[{"given":"Bharat","family":"Bhushan","sequence":"first","affiliation":[]},{"given":"Gadadhar","family":"Sahoo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,12]]},"reference":[{"issue":"1","key":"1988_CR1","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/comst.2015.2412971","volume":"18","author":"I Khan","year":"2016","unstructured":"Khan, I., Belqasmi, F., Glitho, R., Crespi, N., Morrow, M., & Polakos, P. (2016). Wireless sensor network virtualization: A survey. IEEE Communications Surveys & Tutorials,\n                           18(1), 553\u2013576. \n                    https:\/\/doi.org\/10.1109\/comst.2015.2412971\n                    \n                  .","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"7","key":"1988_CR2","doi-asserted-by":"publisher","first-page":"1881","DOI":"10.1109\/tmc.2016.2607716","volume":"16","author":"A Mehrabi","year":"2017","unstructured":"Mehrabi, A., & Kim, K. (2017). General framework for network throughput maximization in sink-based energy harvesting wireless sensor networks. IEEE Transactions on Mobile Computing,\n                           16(7), 1881\u20131896. \n                    https:\/\/doi.org\/10.1109\/tmc.2016.2607716\n                    \n                  .","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"3","key":"1988_CR3","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1049\/iet-wss.2017.0106","volume":"8","author":"N Kumar","year":"2018","unstructured":"Kumar, N., & Dash, D. (2018). Mobile data sink-based time-constrained data collection from mobile sensors: A heuristic approach. IET Wireless Sensor Systems,\n                           8(3), 129\u2013135. \n                    https:\/\/doi.org\/10.1049\/iet-wss.2017.0106\n                    \n                  .","journal-title":"IET Wireless Sensor Systems"},{"key":"1988_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017-1552-8","author":"AW Khan","year":"2017","unstructured":"Khan, A. W., Bangash, J. I., Ahmed, A., & Abdullah, A. H. (2017). QDVGDD: Query-driven virtual grid based data dissemination for wireless sensor networks using single mobile sink. Wireless Networks. \n                    https:\/\/doi.org\/10.1007\/s11276-017-1552-8\n                    \n                  .","journal-title":"Wireless Networks"},{"issue":"2","key":"1988_CR5","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/jsen.2017.2773119","volume":"18","author":"W Wen","year":"2018","unstructured":"Wen, W., Zhao, S., Shang, C., & Chang, C. (2018). EAPC: Energy-aware path construction for data collection using mobile sink in wireless sensor networks. IEEE Sensors Journal,\n                           18(2), 890\u2013901. \n                    https:\/\/doi.org\/10.1109\/jsen.2017.2773119\n                    \n                  .","journal-title":"IEEE Sensors Journal"},{"issue":"1","key":"1988_CR6","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/tii.2015.2489160","volume":"12","author":"Z Zhou","year":"2016","unstructured":"Zhou, Z., Du, C., Shu, L., Hancke, G., Niu, J., & Ning, H. (2016). An energy-balanced heuristic for mobile sink scheduling in hybrid WSNs. IEEE Transactions on Industrial Informatics,\n                           12(1), 28\u201340. \n                    https:\/\/doi.org\/10.1109\/tii.2015.2489160\n                    \n                  .","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"2","key":"1988_CR7","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/tii.2014.2382335","volume":"12","author":"F Dobslaw","year":"2016","unstructured":"Dobslaw, F., Zhang, T., & Gidlund, M. (2016). End-to-end reliability-aware scheduling for wireless sensor networks. IEEE Transactions on Industrial Informatics,\n                           12(2), 758\u2013767. \n                    https:\/\/doi.org\/10.1109\/tii.2014.2382335\n                    \n                  .","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"1","key":"1988_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1993042.1993049","volume":"8","author":"MD Francesco","year":"2011","unstructured":"Francesco, M. D., Das, S. K., & Anastasi, G. (2011). Data collection in wireless sensor networks with mobile elements. ACM Transactions on Sensor Networks,\n                           8(1), 1\u201331. \n                    https:\/\/doi.org\/10.1145\/1993042.1993049\n                    \n                  .","journal-title":"ACM Transactions on Sensor Networks"},{"key":"1988_CR9","doi-asserted-by":"publisher","unstructured":"Liang, W., Luo, J., & Xu, X. (2010). Prolonging network lifetime via a controlled mobile sink in wireless sensor networks. In 2010 IEEE global telecommunications conference GLOBECOM 2010. \n                    https:\/\/doi.org\/10.1109\/glocom.2010.5683095\n                    \n                  .","DOI":"10.1109\/glocom.2010.5683095"},{"issue":"2","key":"1988_CR10","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.comcom.2009.08.009","volume":"33","author":"J Rao","year":"2010","unstructured":"Rao, J., & Biswas, S. (2010). Network-assisted sink navigation for distributed data gathering: Stability and delay-energy trade-offs. Computer Communications,\n                           33(2), 160\u2013175. \n                    https:\/\/doi.org\/10.1016\/j.comcom.2009.08.009\n                    \n                  .","journal-title":"Computer Communications"},{"key":"1988_CR11","unstructured":"Grammalidis, N., Cetin, E., Dimitropoulos, K., Tsalakanidou, F., Kose, K., Gunay, O., et al. (2011). A multisensor network for the protection of cultural heritage. In 19th European signal processing conference (EUSIPCO2011), special session on signal processing for disaster management and prevention, 2011."},{"issue":"9","key":"1988_CR12","doi-asserted-by":"publisher","first-page":"1308","DOI":"10.1109\/tmc.2010.76","volume":"9","author":"Y Yun","year":"2010","unstructured":"Yun, Y., & Xia, Y. (2010). Maximizing the lifetime of wireless sensor networks with mobile sink in delay-tolerant applications. IEEE Transactions on Mobile Computing,\n                           9(9), 1308\u20131318. \n                    https:\/\/doi.org\/10.1109\/tmc.2010.76\n                    \n                  .","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"10","key":"1988_CR13","doi-asserted-by":"publisher","first-page":"1931","DOI":"10.1109\/tmc.2012.161","volume":"12","author":"S He","year":"2013","unstructured":"He, S., Chen, J., Jiang, F., Yau, D. K., Xing, G., & Sun, Y. (2013). Energy provisioning in wireless rechargeable sensor networks. IEEE Transactions on Mobile Computing,\n                           12(10), 1931\u20131942. \n                    https:\/\/doi.org\/10.1109\/tmc.2012.161\n                    \n                  .","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"4","key":"1988_CR14","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1109\/tnet.2010.2091280","volume":"19","author":"R Liu","year":"2011","unstructured":"Liu, R., Fan, K., Zheng, Z., & Sinha, P. (2011). Perpetual and fair data collection for environmental energy harvesting sensor networks. IEEE\/ACM Transactions on Networking,\n                           19(4), 947\u2013960. \n                    https:\/\/doi.org\/10.1109\/tnet.2010.2091280\n                    \n                  .","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"4","key":"1988_CR15","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1109\/tac.2011.2166310","volume":"57","author":"Z Mao","year":"2012","unstructured":"Mao, Z., Koksal, C. E., & Shroff, N. B. (2012). Near optimal power and rate control of multi-hop sensor networks with energy replenishment: Basic limitations with finite energy and data storage. IEEE Transactions on Automatic Control,\n                           57(4), 815\u2013829. \n                    https:\/\/doi.org\/10.1109\/tac.2011.2166310\n                    \n                  .","journal-title":"IEEE Transactions on Automatic Control"},{"key":"1988_CR16","doi-asserted-by":"publisher","unstructured":"Ren, X., Liang, W., & Xu, W. (2013). Use of a mobile sink for maximizing data collection in energy harvesting sensor networks. In 2013 42nd International conference on parallel processing. \n                    https:\/\/doi.org\/10.1109\/icpp.2013.53\n                    \n                  .","DOI":"10.1109\/icpp.2013.53"},{"key":"1988_CR17","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1109\/access.2016.2517321","volume":"4","author":"J Wu","year":"2016","unstructured":"Wu, J., Ota, K., Dong, M., & Li, C. (2016). A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access,\n                           4, 416\u2013424. \n                    https:\/\/doi.org\/10.1109\/access.2016.2517321\n                    \n                  .","journal-title":"IEEE Access"},{"issue":"1","key":"1988_CR18","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1109\/jsyst.2016.2535730","volume":"12","author":"C Pu","year":"2018","unstructured":"Pu, C., & Lim, S. (2018). A light-weight countermeasure to forwarding misbehavior in wireless sensor networks: Design, analysis, and evaluation. IEEE Systems Journal,\n                           12(1), 834\u2013842. \n                    https:\/\/doi.org\/10.1109\/jsyst.2016.2535730\n                    \n                  .","journal-title":"IEEE Systems Journal"},{"issue":"6","key":"1988_CR19","doi-asserted-by":"publisher","first-page":"3590","DOI":"10.1109\/jsen.2015.2395442","volume":"15","author":"C Hsueh","year":"2015","unstructured":"Hsueh, C., Wen, C., & Ouyang, Y. (2015). A secure scheme against power exhausting attacks in hierarchical wireless sensor networks. IEEE Sensors Journal,\n                           15(6), 3590\u20133602. \n                    https:\/\/doi.org\/10.1109\/jsen.2015.2395442\n                    \n                  .","journal-title":"IEEE Sensors Journal"},{"issue":"2","key":"1988_CR20","doi-asserted-by":"publisher","first-page":"896","DOI":"10.1109\/tnet.2016.2607229","volume":"25","author":"L Tan","year":"2017","unstructured":"Tan, L., & Tang, S. (2017). Energy harvesting wireless sensor node with temporal death: Novel models and analyses. IEEE\/ACM Transactions on Networking,\n                           25(2), 896\u2013909. \n                    https:\/\/doi.org\/10.1109\/tnet.2016.2607229\n                    \n                  .","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"10","key":"1988_CR21","doi-asserted-by":"publisher","first-page":"3585","DOI":"10.1109\/jsen.2013.2267053","volume":"13","author":"B Cao","year":"2013","unstructured":"Cao, B., Ge, Y., Kim, C. W., Feng, G., Tan, H. P., & Li, Y. (2013). An experimental study for inter-user interference mitigation in wireless body sensor networks. IEEE Sensors Journal,\n                           13(10), 3585\u20133595. \n                    https:\/\/doi.org\/10.1109\/jsen.2013.2267053\n                    \n                  .","journal-title":"IEEE Sensors Journal"},{"key":"1988_CR22","doi-asserted-by":"publisher","unstructured":"Li, Y., Huang, Q., & Huang, W. (2011). A cooperative retransmission strategy for error-prone wireless networks. In 2011 Eighth international conference on wireless and optical communications networks. \n                    https:\/\/doi.org\/10.1109\/wocn.2011.5872934\n                    \n                  .","DOI":"10.1109\/wocn.2011.5872934"},{"key":"1988_CR23","doi-asserted-by":"publisher","unstructured":"Wang, L., Zhao, W., Li, Y., Qu, Y., Liu, Z., & Chen, Q. (2008). Sleep-supported and cone-based topology control method for wireless sensor networks. In 2008 IEEE international conference on networking, sensing and control. \n                    https:\/\/doi.org\/10.1109\/icnsc.2008.4525447\n                    \n                  .","DOI":"10.1109\/icnsc.2008.4525447"},{"issue":"3","key":"1988_CR24","doi-asserted-by":"publisher","first-page":"573","DOI":"10.3390\/en11030573","volume":"11","author":"V Sharma","year":"2018","unstructured":"Sharma, V., You, I., Pau, G., Collotta, M., Lim, J., & Kim, J. (2018). LoRaWAN-based energy-efficient surveillance by Drones for intelligent transportation systems. Energies,\n                           11(3), 573. \n                    https:\/\/doi.org\/10.3390\/en11030573\n                    \n                  .","journal-title":"Energies"},{"issue":"1","key":"1988_CR25","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1109\/tc.2011.207","volume":"62","author":"X Liu","year":"2013","unstructured":"Liu, X., Zhao, H., Yang, X., & Li, X. (2013). SinkTrail: A proactive data reporting protocol for wireless sensor networks. IEEE Transactions on Computers,\n                           62(1), 151\u2013162. \n                    https:\/\/doi.org\/10.1109\/tc.2011.207\n                    \n                  .","journal-title":"IEEE Transactions on Computers"},{"issue":"7","key":"1988_CR26","doi-asserted-by":"publisher","first-page":"2723","DOI":"10.1007\/s11276-017-1497-y","volume":"24","author":"A Hawbani","year":"2017","unstructured":"Hawbani, A., Wang, X., Kuhlani, H., Karmoshi, S., Ghoul, R., Sharabi, Y., et al. (2017). Sink-oriented tree based data dissemination protocol for mobile sinks wireless sensor networks. Wireless Networks,\n                           24(7), 2723\u20132734. \n                    https:\/\/doi.org\/10.1007\/s11276-017-1497-y\n                    \n                  .","journal-title":"Wireless Networks"},{"issue":"1\u20132","key":"1988_CR27","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s11276-004-4753-x","volume":"11","author":"H Luo","year":"2005","unstructured":"Luo, H., Ye, F., Cheng, J., Lu, S., & Zhang, L. (2005). TTDD: Two-tier data dissemination in large-scale wireless sensor networks. Wireless Networks,\n                           11(1\u20132), 161\u2013175. \n                    https:\/\/doi.org\/10.1007\/s11276-004-4753-x\n                    \n                  .","journal-title":"Wireless Networks"},{"key":"1988_CR28","doi-asserted-by":"publisher","unstructured":"Kweon, K., Ghim, H., Hong, J., & Yoon, H. (2009). Grid-based energy-efficient routing from multiple sources to multiple mobile sinks in wireless sensor networks. In 2009 4th International symposium on wireless pervasive computing. \n                    https:\/\/doi.org\/10.1109\/iswpc.2009.4800585\n                    \n                  .","DOI":"10.1109\/iswpc.2009.4800585"},{"key":"1988_CR29","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2012-17","author":"AT Erman","year":"2012","unstructured":"Erman, A. T., Dilo, A., & Havinga, P. (2012). A virtual infrastructure based on honeycomb tessellation for data dissemination in multi-sink mobile wireless sensor networks. EURASIP Journal on Wireless Communications and Networking. \n                    https:\/\/doi.org\/10.1186\/1687-1499-2012-17\n                    \n                  .","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"1988_CR30","doi-asserted-by":"publisher","unstructured":"Lin, C., Chou, P., & Chou, C. (2006). HCDD. In Proceeding of the 2006 international conference on communications and mobile computing\u2014IWCMC 06. \n                    https:\/\/doi.org\/10.1145\/1143549.1143787\n                    \n                  .","DOI":"10.1145\/1143549.1143787"},{"key":"1988_CR31","doi-asserted-by":"publisher","unstructured":"Lu, J., & Valois, F. (2007). On the data dissemination in WSNs. In Third IEEE international conference on wireless and mobile computing, networking and communications (WiMob 2007). \n                    https:\/\/doi.org\/10.1109\/wimob.2007.4390852\n                    \n                  .","DOI":"10.1109\/wimob.2007.4390852"},{"key":"1988_CR32","doi-asserted-by":"publisher","unstructured":"Li, Y., Xiong, S., Chen, Q., & Fang, F. (2007). Grid-based directed diffusion for wireless sensor networks. In 2007 Second international conference on communications and networking in China. \n                    https:\/\/doi.org\/10.1109\/chinacom.2007.4469508\n                    \n                  .","DOI":"10.1109\/chinacom.2007.4469508"},{"key":"1988_CR33","doi-asserted-by":"publisher","unstructured":"Xing, G., Wang, T., Xie, Z., & Jia, W. (2007). Rendezvous planning in mobility-assisted wireless sensor networks. In 28th IEEE international real-time systems symposium (RTSS 2007). \n                    https:\/\/doi.org\/10.1109\/rtss.2007.44\n                    \n                  .","DOI":"10.1109\/rtss.2007.44"},{"issue":"8","key":"1988_CR34","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1016\/j.comcom.2010.01.003","volume":"33","author":"M Vecchio","year":"2010","unstructured":"Vecchio, M., Viana, A. C., Ziviani, A., & Friedman, R. (2010). DEEP: Density-based proactive data dissemination protocol for wireless sensor networks with uncontrolled sink mobility. Computer Communications,\n                           33(8), 929\u2013939. \n                    https:\/\/doi.org\/10.1016\/j.comcom.2010.01.003\n                    \n                  .","journal-title":"Computer Communications"},{"issue":"9","key":"1988_CR35","doi-asserted-by":"publisher","first-page":"1864","DOI":"10.1109\/lcomm.2013.072913.131354","volume":"17","author":"H Mo","year":"2013","unstructured":"Mo, H., Lee, E., Park, S., & Kim, S. (2013). Virtual line-based data dissemination for mobile sink groups in wireless sensor networks. IEEE Communications Letters,\n                           17(9), 1864\u20131867. \n                    https:\/\/doi.org\/10.1109\/lcomm.2013.072913.131354\n                    \n                  .","journal-title":"IEEE Communications Letters"},{"key":"1988_CR36","doi-asserted-by":"publisher","unstructured":"Hu, L., Li, Y., Chen, Q., Liu, J., & Long, K. (2007). A new energy-aware routing protocol for wireless sensor networks. In 2007 International conference on wireless communications, networking and mobile computing. \n                    https:\/\/doi.org\/10.1109\/wicom.2007.609\n                    \n                  .","DOI":"10.1109\/wicom.2007.609"},{"key":"1988_CR37","doi-asserted-by":"publisher","unstructured":"Collotta, M., Bello, L. L., Toscano, E., & Mirabella, O. (2010). Dynamic load balancing techniques for flexible wireless industrial networks. In IECON 2010\u201436th annual conference on IEEE Industrial Electronics Society. \n                    https:\/\/doi.org\/10.1109\/iecon.2010.5675489\n                    \n                  .","DOI":"10.1109\/iecon.2010.5675489"},{"key":"1988_CR38","unstructured":"Hu, J., Jin, Y., & Dou, L. (2008). A time-based cluster-head selection algorithm for LEACH. In IEEE Symposium on computers and communications, 2008, pp. 1172\u20131176."},{"key":"1988_CR39","doi-asserted-by":"publisher","unstructured":"Li, Y., Yu, N., Zhang, W., Zhao, W., You, X., & Daneshmand, M. (2011). Enhancing the performance of LEACH protocol in wireless sensor networks. In 2011 IEEE conference on computer communications workshops (INFOCOM WKSHPS). \n                    https:\/\/doi.org\/10.1109\/infcomw.2011.5928813\n                    \n                  .","DOI":"10.1109\/infcomw.2011.5928813"},{"key":"1988_CR40","doi-asserted-by":"publisher","unstructured":"Collotta, M., Pau, G., Salerno, V. M., & Scata, G. (2012). A distributed load balancing approach for industrial IEEE 802.11 wireless networks. In Proceedings of 2012 IEEE 17th international conference on emerging technologies & factory automation (ETFA 2012). \n                    https:\/\/doi.org\/10.1109\/etfa.2012.6489583\n                    \n                  .","DOI":"10.1109\/etfa.2012.6489583"},{"issue":"7","key":"1988_CR41","doi-asserted-by":"publisher","first-page":"3110","DOI":"10.1109\/tvt.2013.2256475","volume":"62","author":"Y Li","year":"2013","unstructured":"Li, Y., Zhang, Z., Wang, C., Zhao, W., & Chen, H. (2013). Blind cooperative communications for multihop ad hoc wireless networks. IEEE Transactions on Vehicular Technology,\n                           62(7), 3110\u20133122. \n                    https:\/\/doi.org\/10.1109\/tvt.2013.2256475\n                    \n                  .","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"6","key":"1988_CR42","doi-asserted-by":"publisher","first-page":"2551","DOI":"10.1109\/tvt.2014.2342236","volume":"64","author":"Y Li","year":"2015","unstructured":"Li, Y., Zhu, X., Liao, C., Wang, C., & Cao, B. (2015). Energy efficiency maximization by jointly optimizing the positions and serving range of relay stations in cellular networks. IEEE Transactions on Vehicular Technology,\n                           64(6), 2551\u20132560. \n                    https:\/\/doi.org\/10.1109\/tvt.2014.2342236\n                    \n                  .","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"1988_CR43","doi-asserted-by":"publisher","unstructured":"Collotta, M., Scata, G., Tirrito, S., Ferrero, R., & Rebaudengo, M. (2014). A parallel fuzzy scheme to improve power consumption management in Wireless Sensor Networks. In Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA). \n                    https:\/\/doi.org\/10.1109\/etfa.2014.7005363\n                    \n                  .","DOI":"10.1109\/etfa.2014.7005363"},{"issue":"12","key":"1988_CR44","doi-asserted-by":"publisher","first-page":"2988","DOI":"10.1109\/jsac.2015.2481203","volume":"33","author":"M Collotta","year":"2015","unstructured":"Collotta, M., & Pau, G. (2015). A novel energy management approach for smart homes using bluetooth low energy. IEEE Journal on Selected Areas in Communications,\n                           33(12), 2988\u20132996. \n                    https:\/\/doi.org\/10.1109\/jsac.2015.2481203\n                    \n                  .","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"1988_CR45","doi-asserted-by":"publisher","unstructured":"Li, Y., Li, Y., Cao, B., Daneshmand, M., & Zhang, W. (2015). Cooperative spectrum sharing with energy-save in cognitive radio networks. In 2015 IEEE global communications conference (GLOBECOM). \n                    https:\/\/doi.org\/10.1109\/glocom.2015.7417201\n                    \n                  .","DOI":"10.1109\/glocom.2015.7417201"},{"key":"1988_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/3418284","volume":"2017","author":"M Collotta","year":"2017","unstructured":"Collotta, M., Pau, G., & Bobovich, A. V. (2017). A fuzzy data fusion solution to enhance the QoS and the energy consumption in Wireless Sensor Networks. Wireless Communications and Mobile Computing,\n                           2017, 1\u201310. \n                    https:\/\/doi.org\/10.1155\/2017\/3418284\n                    \n                  .","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"3","key":"1988_CR47","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1145\/1167935.1167936","volume":"2","author":"A Chakrabarti","year":"2006","unstructured":"Chakrabarti, A., Sabharwal, A., & Aazhang, B. (2006). Communication power optimization in a sensor network with a path-constrained mobile observer. ACM Transactions on Sensor Networks (TOSN),\n                           2(3), 297\u2013324.","journal-title":"ACM Transactions on Sensor Networks (TOSN)"},{"issue":"4","key":"1988_CR48","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1109\/tmc.2010.193","volume":"10","author":"S Gao","year":"2011","unstructured":"Gao, S., Zhang, H., & Das, S. K. (2011). Efficient data collection in wireless sensor networks with path-constrained mobile sinks. IEEE Transactions on Mobile Computing,\n                           10(4), 592\u2013608. \n                    https:\/\/doi.org\/10.1109\/tmc.2010.193\n                    \n                  .","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"1988_CR49","unstructured":"Guo, S., & Yang, Y. (2012). A distributed optimal framework for mobile data gathering with concurrent data uploading in wireless sensor networks. In Proceedings of IEEE INFOCOM (pp. 1305\u20131313). IEEE."},{"issue":"4","key":"1988_CR50","doi-asserted-by":"publisher","first-page":"1325","DOI":"10.1109\/TNET.2013.2273830","volume":"22","author":"S Chen","year":"2014","unstructured":"Chen, S., Sinha, P., Shroff, N. B., & Joo, C. (2014). A simple asymptotically optimal energy allocation and routing scheme in rechargeable sensor networks. IEEE\/ACM Transactions on Networking,\n                           22(4), 1325\u20131336.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"1","key":"1988_CR51","first-page":"1","volume":"99","author":"S Guo","year":"2014","unstructured":"Guo, S., Wang, C., & Yang, Y. (2014). Joint mobile data gathering and energy provisioning in wireless rechargeable sensor networks. IEEE Transactions on Mobile Computing,\n                           99(1), 1.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"12","key":"1988_CR52","doi-asserted-by":"publisher","first-page":"2689","DOI":"10.1109\/TMC.2014.2307335","volume":"13","author":"M Zhao","year":"2014","unstructured":"Zhao, M., Li, J., & Yang, Y. (2014). A framework of joint mobile energy replenishmentanddatagatheringinwirelessrechargeablesensornetworks. IEEE Transactions on Mobile Computing,\n                           13(12), 2689\u20132705.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"2","key":"1988_CR53","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1109\/tii.2014.2306327","volume":"10","author":"A Castagnetti","year":"2014","unstructured":"Castagnetti, A., Pegatoquet, A., Le, T. N., & Auguin, M. (2014). A joint duty-cycle and transmission power management for energy harvesting WSN. IEEE Transactions on Industrial Informatics,\n                           10(2), 928\u2013936. \n                    https:\/\/doi.org\/10.1109\/tii.2014.2306327\n                    \n                  .","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"1","key":"1988_CR54","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s11276-015-1150-6","volume":"23","author":"MH Anisi","year":"2015","unstructured":"Anisi, M. H., Abdul-Salaam, G., Idris, M. Y., Wahab, A. W., & Ahmedy, I. (2015). Energy harvesting and battery power based routing in wireless sensor networks. Wireless Networks,\n                           23(1), 249\u2013266. \n                    https:\/\/doi.org\/10.1007\/s11276-015-1150-6\n                    \n                  .","journal-title":"Wireless Networks"},{"issue":"2","key":"1988_CR55","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/s11276-016-1360-6","volume":"24","author":"T Lu","year":"2016","unstructured":"Lu, T., Liu, G., & Chang, S. (2016). Energy-efficient data sensing and routing in unreliable energy-harvesting wireless sensor network. Wireless Networks,\n                           24(2), 611\u2013625. \n                    https:\/\/doi.org\/10.1007\/s11276-016-1360-6\n                    \n                  .","journal-title":"Wireless Networks"},{"issue":"2","key":"1988_CR56","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1109\/tgcn.2018.2789783","volume":"2","author":"H Shafieirad","year":"2018","unstructured":"Shafieirad, H., Adve, R. S., & Shahbazpanahi, S. (2018). Max-SNR opportunistic routing for large-scale energy harvesting sensor networks. IEEE Transactions on Green Communications and Networking,\n                           2(2), 506\u2013516. \n                    https:\/\/doi.org\/10.1109\/tgcn.2018.2789783\n                    \n                  .","journal-title":"IEEE Transactions on Green Communications and Networking"},{"key":"1988_CR57","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1701-8","author":"A Bengheni","year":"2018","unstructured":"Bengheni, A., Didi, F., & Bambrik, I. (2018). EEM-EHWSN: Enhanced energy management scheme in energy harvesting wireless sensor networks. Wireless Networks. \n                    https:\/\/doi.org\/10.1007\/s11276-018-1701-8\n                    \n                  .","journal-title":"Wireless Networks"},{"key":"1988_CR58","doi-asserted-by":"crossref","unstructured":"Ren, X., Liang, W., & Xu, W. (2013). Use of a mobile sink for maximizing data collection in energy harvesting sensor networks. In Proceedings of ICPP (pp. 439\u2013448). IEEE.","DOI":"10.1109\/ICPP.2013.53"},{"key":"1988_CR59","first-page":"1","volume":"64","author":"X Ren","year":"2014","unstructured":"Ren, X., Xu, W., & Liang, W. (2014). Data collection maximization in renewable sensor networks via time-slot scheduling. IEEE Transactions on Computing,\n                           64, 1.","journal-title":"IEEE Transactions on Computing"},{"key":"1988_CR60","doi-asserted-by":"publisher","unstructured":"Hamida, E. B., & Chelius, G. (2008). A line-based data dissemination protocol for wireless sensor networks with mobile sink. In 2008 IEEE international conference on communications. \n                    https:\/\/doi.org\/10.1109\/icc.2008.420\n                    \n                  .","DOI":"10.1109\/icc.2008.420"},{"key":"1988_CR61","doi-asserted-by":"publisher","unstructured":"Shin, J., Kim, J., Park, K., & Park, D. (2005). Railroad. In Proceedings of the 2nd ACM international workshop on performance evaluation of wireless ad hoc, sensor, and ubiquitous networks\u2014PE-WASUN 05. \n                    https:\/\/doi.org\/10.1145\/1089803.1089982\n                    \n                  .","DOI":"10.1145\/1089803.1089982"},{"issue":"9","key":"1988_CR62","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1109\/tmc.2014.2366776","volume":"14","author":"C Tunca","year":"2015","unstructured":"Tunca, C., Isik, S., Donmez, M. Y., & Ersoy, C. (2015). Ring routing: An energy-efficient routing protocol for Wireless Sensor Networks with a mobile sink. IEEE Transactions on Mobile Computing,\n                           14(9), 1947\u20131960. \n                    https:\/\/doi.org\/10.1109\/tmc.2014.2366776\n                    \n                  .","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"4","key":"1988_CR63","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/mnet.2004.1316758","volume":"18","author":"D Niculescu","year":"2004","unstructured":"Niculescu, D. (2004). Positioning in ad hoc sensor networks. IEEE Network,\n                           18(4), 24\u201329. \n                    https:\/\/doi.org\/10.1109\/mnet.2004.1316758\n                    \n                  .","journal-title":"IEEE Network"},{"key":"1988_CR64","doi-asserted-by":"publisher","unstructured":"Gopakumar, A., & Jacob, L. (2008). Localization in wireless sensor networks using particle swarm optimization. In IET conference on wireless, mobile and multimedia networks. \n                    https:\/\/doi.org\/10.1049\/cp:20080185\n                    \n                  .","DOI":"10.1049\/cp:20080185"},{"issue":"5","key":"1988_CR65","doi-asserted-by":"publisher","first-page":"1116","DOI":"10.1109\/tmc.2015.2456895","volume":"15","author":"TN Pham","year":"2016","unstructured":"Pham, T. N., & Yeo, C. K. (2016). Detecting colluding blackhole and greyhole attacks in delay tolerant networks. IEEE Transactions on Mobile Computing,\n                           15(5), 1116\u20131129. \n                    https:\/\/doi.org\/10.1109\/tmc.2015.2456895\n                    \n                  .","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"1","key":"1988_CR66","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/jsyst.2013.2296197","volume":"9","author":"J Chang","year":"2015","unstructured":"Chang, J., Tsou, P., Woungang, I., Chao, H., & Lai, C. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Systems Journal,\n                           9(1), 65\u201375. \n                    https:\/\/doi.org\/10.1109\/jsyst.2013.2296197\n                    \n                  .","journal-title":"IEEE Systems Journal"},{"issue":"8","key":"1988_CR67","doi-asserted-by":"publisher","first-page":"2174","DOI":"10.1109\/tmc.2016.2622707","volume":"16","author":"N Schweitzer","year":"2017","unstructured":"Schweitzer, N., Stulman, A., Margalit, R. D., & Shabtai, A. (2017). Contradiction based gray-hole attack minimization for ad-hoc networks. IEEE Transactions on Mobile Computing,\n                           16(8), 2174\u20132183. \n                    https:\/\/doi.org\/10.1109\/tmc.2016.2622707\n                    \n                  .","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"4","key":"1988_CR68","doi-asserted-by":"publisher","first-page":"2498","DOI":"10.1109\/tsg.2016.2614327","volume":"9","author":"S Pal","year":"2018","unstructured":"Pal, S., Sikdar, B., & Chow, J. H. (2018). An online mechanism for detection of gray-hole attacks on PMU data. IEEE Transactions on Smart Grid,\n                           9(4), 2498\u20132507. \n                    https:\/\/doi.org\/10.1109\/tsg.2016.2614327\n                    \n                  .","journal-title":"IEEE Transactions on Smart Grid"},{"issue":"5","key":"1988_CR69","doi-asserted-by":"publisher","first-page":"2418","DOI":"10.1109\/tvt.2010.2044904","volume":"59","author":"Y Chen","year":"2010","unstructured":"Chen, Y., Yang, J., Trappe, W., & Martin, R. P. (2010). Detecting and localizing identity-based attacks in Wireless and Sensor Networks. IEEE Transactions on Vehicular Technology,\n                           59(5), 2418\u20132434. \n                    https:\/\/doi.org\/10.1109\/tvt.2010.2044904\n                    \n                  .","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"1988_CR70","doi-asserted-by":"publisher","first-page":"24012","DOI":"10.1109\/access.2017.2768499","volume":"5","author":"C Sun","year":"2017","unstructured":"Sun, C., Liu, J., Xu, X., & Ma, J. (2017). A privacy-preserving mutual authentication resisting DoS attacks in VANETs. IEEE Access,\n                           5, 24012\u201324022. \n                    https:\/\/doi.org\/10.1109\/access.2017.2768499\n                    \n                  .","journal-title":"IEEE Access"},{"issue":"3","key":"1988_CR71","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1109\/tmc.2015.2424430","volume":"15","author":"A Mehrabi","year":"2016","unstructured":"Mehrabi, A., & Kim, K. (2016). Maximizing data collection throughput on a path in energy harvesting sensor networks using a mobile sink. IEEE Transactions on Mobile Computing,\n                           15(3), 690\u2013704. \n                    https:\/\/doi.org\/10.1109\/tmc.2015.2424430\n                    \n                  .","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"6","key":"1988_CR72","doi-asserted-by":"publisher","first-page":"1932","DOI":"10.1109\/jsen.2014.2306429","volume":"14","author":"C Wang","year":"2014","unstructured":"Wang, C., Shih, J., Pan, B., & Wu, T. (2014). A network lifetime enhancement method for sink relocation and its analysis in Wireless Sensor Networks. IEEE Sensors Journal,\n                           14(6), 1932\u20131943. \n                    https:\/\/doi.org\/10.1109\/jsen.2014.2306429\n                    \n                  .","journal-title":"IEEE Sensors Journal"},{"key":"1988_CR73","doi-asserted-by":"publisher","unstructured":"Vadivazhagu, P., & Selvam, P. (2015). Network lifetime enhancement method for sink relocation and packet drop detection in wireless sensor networks. In 2015 International conference on communications and signal processing (ICCSP). \n                    https:\/\/doi.org\/10.1109\/iccsp.2015.7322534\n                    \n                  .","DOI":"10.1109\/iccsp.2015.7322534"},{"issue":"5","key":"1988_CR74","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1109\/tmc.2007.1036","volume":"6","author":"K Liu","year":"2007","unstructured":"Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing,\n                           6(5), 536\u2013550. \n                    https:\/\/doi.org\/10.1109\/tmc.2007.1036\n                    \n                  .","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"4","key":"1988_CR75","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1109\/tnet.2011.2171990","volume":"20","author":"Y Shi","year":"2012","unstructured":"Shi, Y., & Hou, Y. T. (2012). Some fundamental results on base station movement problem for wireless sensor networks. IEEE\/ACM Transactions on Networking,\n                           20(4), 1054\u20131067. \n                    https:\/\/doi.org\/10.1109\/tnet.2011.2171990\n                    \n                  .","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"2","key":"1988_CR76","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1109\/tcst.2013.2262999","volume":"22","author":"L Orihuela","year":"2014","unstructured":"Orihuela, L., Gomez-Estern, F., & Rubio, F. R. (2014). Scheduled communication in sensor networks. IEEE Transactions on Control Systems Technology,\n                           22(2), 801\u2013808. \n                    https:\/\/doi.org\/10.1109\/tcst.2013.2262999\n                    \n                  .","journal-title":"IEEE Transactions on Control Systems Technology"},{"key":"1988_CR77","doi-asserted-by":"publisher","first-page":"9348","DOI":"10.1109\/access.2017.2703847","volume":"5","author":"J Liu","year":"2017","unstructured":"Liu, J., Xiong, K., Fan, P., & Zhong, Z. (2017). RF energy harvesting wireless powered sensor networks for smart cities. IEEE Access,\n                           5, 9348\u20139358. \n                    https:\/\/doi.org\/10.1109\/access.2017.2703847\n                    \n                  .","journal-title":"IEEE Access"},{"issue":"1","key":"1988_CR78","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s11276-016-1320-1","volume":"24","author":"S Saha","year":"2016","unstructured":"Saha, S., Nandi, S., Verma, R., Sengupta, S., Singh, K., Sinha, V., et al. (2016). Design of efficient lightweight strategies to combat DoS attack in delay tolerant network routing. Wireless Networks,\n                           24(1), 173\u2013194. \n                    https:\/\/doi.org\/10.1007\/s11276-016-1320-1\n                    \n                  .","journal-title":"Wireless Networks"},{"issue":"7","key":"1988_CR79","doi-asserted-by":"publisher","first-page":"2259","DOI":"10.1007\/s11276-015-1098-6","volume":"22","author":"V Heydari","year":"2015","unstructured":"Heydari, V., & Yoo, S. (2015). E2EACK: An end-to-end acknowledgment-based scheme against collusion black hole and slander attacks in MANETs. Wireless Networks,\n                           22(7), 2259\u20132273. \n                    https:\/\/doi.org\/10.1007\/s11276-015-1098-6\n                    \n                  .","journal-title":"Wireless Networks"},{"issue":"12","key":"1988_CR80","doi-asserted-by":"publisher","first-page":"2109","DOI":"10.1109\/lcomm.2014.2367109","volume":"18","author":"VA Kumar","year":"2014","unstructured":"Kumar, V. A., & Das, D. (2014). Data enriched SACK: A novel acknowledgement generation scheme for secure SCTP. IEEE Communications Letters,\n                           18(12), 2109\u20132112. \n                    https:\/\/doi.org\/10.1109\/lcomm.2014.2367109\n                    \n                  .","journal-title":"IEEE Communications Letters"},{"key":"1988_CR81","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017-1621-z","author":"C Pu","year":"2017","unstructured":"Pu, C., Lim, S., Chae, J., & Jung, B. (2017). Active detection in mitigating routing misbehavior for MANETs. Wireless Networks. \n                    https:\/\/doi.org\/10.1007\/s11276-017-1621-z\n                    \n                  .","journal-title":"Wireless Networks"},{"issue":"6","key":"1988_CR82","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1109\/jcn.2016.000128","volume":"18","author":"A Anand","year":"2016","unstructured":"Anand, A., Aggarwal, H., & Rani, R. (2016). Partially distributed dynamic model for secure and reliable routing in mobile ad hoc networks. Journal of Communications and Networks,\n                           18(6), 938\u2013947. \n                    https:\/\/doi.org\/10.1109\/jcn.2016.000128\n                    \n                  .","journal-title":"Journal of Communications and Networks"},{"key":"1988_CR83","doi-asserted-by":"publisher","first-page":"25295","DOI":"10.1109\/access.2017.2769090","volume":"5","author":"D Yin","year":"2017","unstructured":"Yin, D., Shen, Y., & Liu, C. (2017). Attribute couplet attacks and privacy preservation in social networks. IEEE Access,\n                           5, 25295\u201325305. \n                    https:\/\/doi.org\/10.1109\/access.2017.2769090\n                    \n                  .","journal-title":"IEEE Access"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-019-01988-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-019-01988-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-019-01988-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T23:18:22Z","timestamp":1586560702000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-019-01988-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,12]]},"references-count":83,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["1988"],"URL":"https:\/\/doi.org\/10.1007\/s11276-019-01988-7","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,12]]},"assertion":[{"value":"12 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}