{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T17:32:18Z","timestamp":1768325538337,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T00:00:00Z","timestamp":1610496000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T00:00:00Z","timestamp":1610496000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11276-020-02532-8","type":"journal-article","created":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T05:57:48Z","timestamp":1610603868000},"page":"1503-1514","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Intelligent energy-aware and secured QoS routing protocol with dynamic mobility estimation for wireless sensor networks"],"prefix":"10.1007","volume":"27","author":[{"given":"B.","family":"Dhanalakshmi","sequence":"first","affiliation":[]},{"given":"L.","family":"SaiRamesh","sequence":"additional","affiliation":[]},{"given":"K.","family":"Selvakumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,13]]},"reference":[{"issue":"2","key":"2532_CR1","first-page":"105","volume":"1","author":"GA Adel","year":"2010","unstructured":"Adel, G. A., Elrahim, H. A., Elsayed, S. E., Ramly, M. M., & Ibrahim. (2010). An Energy-Aware+ WSN Geographic Routing Protocol. Universal Journal of Computer Science and Engineering Technology, 1(2), 105\u2013111.","journal-title":"Universal Journal of Computer Science and Engineering Technology"},{"key":"2532_CR2","doi-asserted-by":"publisher","first-page":"445","DOI":"10.3390\/s90100445","volume":"9","author":"M Liu","year":"2009","unstructured":"Liu, M., Cao, J., Chen, G., & Wang, X. (2009). An Energy-Aware Routing Protocol in Wireless Sensor Networks. Journal of Sensors, 9, 445\u2013462.","journal-title":"Journal of Sensors"},{"issue":"5","key":"2532_CR3","first-page":"1281","volume":"9","author":"S Swapna Kumar","year":"2012","unstructured":"Swapna Kumar, S., Nanda Kumar, M., Sheeba, V. S., & Kashwan, K. R. (2012). Cluster-Based Routing Algorithm Using Dual Staged Fuzzy Logic in Wireless Sensor Networks. Journal of Information Computational Science, 9(5), 1281\u20131297.","journal-title":"Journal of Information Computational Science"},{"key":"2532_CR4","first-page":"4521","volume":"10","author":"J Yang","year":"2009","unstructured":"Yang, J., Zhao, W., Mai, Xu., & Baoguo, Xu. (2009). A Multipath Routing Protocol Based on Clustering and ACO for WSNs. International Journal of Computer Network and Information Security, 10, 4521\u20134540.","journal-title":"International Journal of Computer Network and Information Security"},{"key":"2532_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.ins.2019.05.040","volume":"497","author":"K Selvakumar","year":"2019","unstructured":"Selvakumar, K., Marimuthu Karuppiah, L., SaiRamesh, S. K., Islam, M. M., Hassan, G. F., & Choo, K. R. (2019). Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs. Information Sciences, 497, 77\u201390.","journal-title":"Information Sciences"},{"issue":"2","key":"2532_CR6","first-page":"179","volume":"6","author":"T Haider","year":"2009","unstructured":"Haider, T., & Yusuf, M. (2009). A fuzzy approach to energy-optimized routing for wireless sensor networks. The International Arab Journal of Information Technology, 6(2), 179\u2013188.","journal-title":"The International Arab Journal of Information Technology"},{"issue":"3","key":"2532_CR7","first-page":"767","volume":"7","author":"Ge Ran","year":"2010","unstructured":"Ran, Ge., Zhang, H., & Gong, S. (2010). Improving on LEACH protocol of wireless sensor networks using fuzzy logic. Journal of Information and Computational Science, 7(3), 767\u2013775.","journal-title":"Journal of Information and Computational Science"},{"issue":"4","key":"2532_CR8","doi-asserted-by":"publisher","first-page":"29","DOI":"10.5121\/ijasuc.2010.1403","volume":"1","author":"S Begum","year":"2010","unstructured":"Begum, S., Tara, N., & Sultana, S. (2010). Energy-efficient target coverage in wireless sensor networks based on modified Ant Colony Algorithm. International Journal of Ad Hoc, Sensor & Ubiquitous Computing, 1(4), 29\u201336.","journal-title":"International Journal of Ad Hoc, Sensor & Ubiquitous Computing"},{"issue":"1","key":"2532_CR9","first-page":"121","volume":"8","author":"M Nikravan","year":"2011","unstructured":"Nikravan, M., Jameii, S. M., & Kashani, M. H. (2011). An intelligent energy-efficient QoS-routing scheme for WSN. International Journal of Advanced Engineering Sciences and Technologies, 8(1), 121\u2013124.","journal-title":"International Journal of Advanced Engineering Sciences and Technologies"},{"issue":"6","key":"2532_CR10","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1002\/dac.673","volume":"17","author":"K Akkaya","year":"2004","unstructured":"Akkaya, K., & Younis, M. (2004). Energy-aware, delay-constrained routing in WSNs through Genetic Algorithm. International Journal of Communication Systems, 17(6), 663\u2013687.","journal-title":"International Journal of Communication Systems"},{"issue":"3","key":"2532_CR11","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.3233\/IFS-130803","volume":"26","author":"R Sethukkarasi","year":"2014","unstructured":"Sethukkarasi, R. (2014). Sannasi Ganapathy, Yogesh Palanichamy, Arputharaj Kannan, \u201cAn intelligent neuro-fuzzy temporal knowledge representation model for mining temporal patterns.\u201d Journal of Intelligent and Fuzzy Systems, 26(3), 1167\u20131178.","journal-title":"Journal of Intelligent and Fuzzy Systems"},{"key":"2532_CR12","first-page":"742","volume":"9","author":"Z Faizal Khan","year":"2014","unstructured":"Faizal Khan, Z., & Kannan, A. (2014). Intelligent approach for segmenting CT lung images using fuzzy logic with bitplane. Journal of Electrical Engineering and Technology, 9, 742\u2013752.","journal-title":"Journal of Electrical Engineering and Technology"},{"issue":"1","key":"2532_CR13","doi-asserted-by":"publisher","first-page":"7","DOI":"10.7323\/ijaet\/v1_iss1_2","volume":"1","author":"A Sharma","year":"2011","unstructured":"Sharma, A., Shinghal, K., Srivastava, N., & Singh, R. (2011). Energy management for wireless sensor network nodes. International Journal of Advances in Engineering & Technology, 1(1), 7\u201313.","journal-title":"International Journal of Advances in Engineering & Technology"},{"issue":"3","key":"2532_CR14","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1016\/j.adhoc.2008.06.003","volume":"7","author":"G Anastasi","year":"2009","unstructured":"Anastasi, G., Conti, M., Francesco, D. M., & Passarella, A. (2009). Energy Conservation in WSNs: a Survey, Elsevier Science Publishers. Ad Hoc Networks, 7(3), 537\u2013568.","journal-title":"Ad Hoc Networks"},{"key":"2532_CR15","doi-asserted-by":"crossref","unstructured":"Ki Young Jang, Kyung Tae Kim, Hee Yong Youn, \u201cAn energy-efficient routing scheme for wireless sensor networks\u201d, International Conference on Computational Science and Its Applications, ICCSA 2007.","DOI":"10.1109\/ICCSA.2007.10"},{"issue":"3","key":"2532_CR16","doi-asserted-by":"publisher","first-page":"4781","DOI":"10.1007\/s11277-017-4417-7","volume":"96","author":"K Selvakumar","year":"2017","unstructured":"Selvakumar, K., Sairamesh, L., & Kannan, A. (2017). An intelligent energy-aware secured algorithm for routing in wireless sensor networks. Wireless Personal Communications, 96(3), 4781\u20134798.","journal-title":"Wireless Personal Communications"},{"key":"2532_CR17","first-page":"618","volume-title":"Intelligent Communication Technologies and Virtual Mobile Networks","author":"V Sathiyavathi","year":"2019","unstructured":"Sathiyavathi, V., Reshma, R., Saleema Parvin, S. B., SaiRamesh, L., & Ayyasamy, A. (2019). Dynamic Trust-Based Secure Multipath Routing for Mobile Ad-Hoc Networks. Intelligent Communication Technologies and Virtual Mobile Networks (pp. 618\u2013625). Cham: Springer."},{"issue":"8","key":"2532_CR18","doi-asserted-by":"publisher","first-page":"1488","DOI":"10.1109\/49.780354","volume":"17","author":"S Chen","year":"1999","unstructured":"Chen, S., & Nahrstedt, K. (1999). Distributed Quality-of-Service Routing in Ad Hoc Networks. IEEE Journal On Selected Areas in Communications, 17(8), 1488\u20131505.","journal-title":"IEEE Journal On Selected Areas in Communications"},{"key":"2532_CR19","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1049\/iet-com:20070424","volume":"2","author":"F Zabin","year":"2008","unstructured":"Zabin, F., Misra, S., Woungang, I., Rashvand, H. F., Ma, N.-W., & Ahsan Ali, M. (2008). REEP: data-centric, energy-efficient and reliable routing protocol for wireless sensor networks. IET Communications, 2, 995\u20131008.","journal-title":"IET Communications"},{"issue":"1","key":"2532_CR20","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1504\/IJOR.2019.099545","volume":"35","author":"K Selvakumar","year":"2019","unstructured":"Selvakumar, K., Sairamesh, L., & Kannan, A. (2019). Wise intrusion detection system using fuzzy rough set-based feature extraction and classification algorithms. International Journal of Operational Research, 35(1), 87\u2013107.","journal-title":"International Journal of Operational Research"},{"key":"2532_CR21","doi-asserted-by":"publisher","first-page":"24","DOI":"10.4018\/978-1-5225-1008-6.ch002","volume-title":"Handbook of Research on Fuzzy and Rough Set Theory in Organizational Decision Making","author":"S Kamalanathan","year":"2017","unstructured":"Kamalanathan, S., Lakshmanan, S. R., & Arputharaj, K. (2017). Fuzzy-clustering-based intelligent and secured energy-aware routing. Handbook of Research on Fuzzy and Rough Set Theory in Organizational Decision Making (pp. 24\u201337). United States: IGI Global."},{"key":"2532_CR22","doi-asserted-by":"publisher","first-page":"876","DOI":"10.3844\/ajassp.2007.874.879","volume":"4","author":"AM Murad","year":"2007","unstructured":"Murad, A. M., & Al-Mahadeen, B. (2007). Adding quality of service extensions to the enhanced associativity based routing protocol for Mobile Ad Hoc Networks (MANET). American Journal of Applied Sciences, 4, 876\u2013881.","journal-title":"American Journal of Applied Sciences"},{"issue":"9","key":"2532_CR23","doi-asserted-by":"publisher","first-page":"1322","DOI":"10.4304\/jcp.5.9.1322-1334","volume":"5","author":"S Yussof","year":"2010","unstructured":"Yussof, S., & See, O. H. (2010). A Robust GA-based QoS Routing Algorithm for Solving Multi-constrained Path Problem. Journal of Computers, 5(9), 1322\u20131334.","journal-title":"Journal of Computers"},{"issue":"8","key":"2532_CR24","doi-asserted-by":"publisher","first-page":"1454","DOI":"10.1109\/49.779926","volume":"17","author":"P Sinha","year":"1999","unstructured":"Sinha, P., Sivakumar, R., & Bharghavan, V. (1999). CEDAR: A core extraction distributed ad hoc routing algorithm. IEEE Journal on Selected Areas in Communications, 17(8), 1454\u20131465.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2532_CR25","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1504\/IJISCM.2009.032754","volume":"4","author":"M Senthilkumar","year":"2009","unstructured":"Senthilkumar, M., Somasundaram, S., & Amuthakkannan, R. (2009). Power-aware multiple QoS constraints routing protocol with mobility prediction for MANET. The International Journal of Information Systems and Change Management, 4, 156\u2013170.","journal-title":"The International Journal of Information Systems and Change Management"},{"key":"2532_CR26","doi-asserted-by":"crossref","unstructured":"Lian, J., L. Li and X. Zhu, \"A multiple QoS constraints routing protocol based on mobile predicting in ad hoc network\", Proceedings of IEEE International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, pp: 1608\u20131611, 2007.","DOI":"10.1109\/WICOM.2007.405"},{"key":"2532_CR27","doi-asserted-by":"crossref","unstructured":"Vinitha, A., and M. S. S. Rukmini. \"Secure and energy-aware multi-hop routing protocol in WSN using taylor-based hybrid optimization algorithm.\"\u00a0Journal of King Saud University-Computer and Information Sciences\u00a0(2019).","DOI":"10.1016\/j.jksuci.2019.11.009"},{"issue":"4","key":"2532_CR28","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1007\/s11277-019-06155-x","volume":"105","author":"M Selvi","year":"2019","unstructured":"Selvi, M., Thangaramya, K., Ganapathy, S., Kanagasabai Kulothungan, H., Nehemiah, K., & Kannan, A. (2019). An energy-aware trust-based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communications, 105(4), 1475\u20131490.","journal-title":"Wireless Personal Communications"},{"key":"2532_CR29","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s12083-018-0654-0","volume":"12","author":"A Zahedi","year":"2019","unstructured":"Zahedi, A., & Parma, F. (2019). An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-to-Peer Netw. Appl., 12, 167\u2013176.","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"2532_CR30","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1007\/s12083-018-0688-3","volume":"12","author":"V Kavidha","year":"2019","unstructured":"Kavidha, V., & Ananthakumaran, S. (2019). Novel energy-efficient secure routing protocol for wireless sensor networks with mobile sink. Peer-to-Peer Network Application, 12, 881\u2013892.","journal-title":"Peer-to-Peer Network Application"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02532-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-020-02532-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02532-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T05:36:09Z","timestamp":1620452169000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-020-02532-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,13]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["2532"],"URL":"https:\/\/doi.org\/10.1007\/s11276-020-02532-8","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,13]]},"assertion":[{"value":"24 December 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}