{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T11:44:11Z","timestamp":1774525451196,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,11,15]],"date-time":"2022-11-15T00:00:00Z","timestamp":1668470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,15]],"date-time":"2022-11-15T00:00:00Z","timestamp":1668470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s11276-022-03169-5","type":"journal-article","created":{"date-parts":[[2022,11,15]],"date-time":"2022-11-15T13:04:54Z","timestamp":1668517494000},"page":"969-983","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Securing communications between things against wormhole attacks using TOPSIS decision-making and hash-based cryptography techniques in the IoT ecosystem"],"prefix":"10.1007","volume":"29","author":[{"given":"Tayebeh","family":"Sahraneshin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7496-9063","authenticated-orcid":false,"given":"Razieh","family":"Malekhosseini","sequence":"additional","affiliation":[]},{"given":"Farhad","family":"Rad","sequence":"additional","affiliation":[]},{"given":"S. Hadi","family":"Yaghoubyan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,15]]},"reference":[{"key":"3169_CR1","doi-asserted-by":"crossref","unstructured":"Pishva, D. (2017). Internet of Things: Security and privacy issues and possible solution. In\u00a0Advanced Communication Technology (ICACT), 2017 19th International Conference on\u00a0(pp. 797\u2013808). IEEE.","DOI":"10.23919\/ICACT.2017.7890229"},{"issue":"2","key":"3169_CR2","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/JIOT.2014.2313981","volume":"1","author":"S Amendola","year":"2014","unstructured":"Amendola, S., Lodato, R., Manzari, S., Occhiuzzi, C., & Marrocco, G. (2014). RFID technology for IoT-based personal healthcare in smart spaces. IEEE Internet of Things Journal, 1(2), 144\u2013152.","journal-title":"IEEE Internet of Things Journal"},{"key":"3169_CR3","unstructured":"Gonzalez, F., Guo, D., Nowicki, A., & Zalewski, J. (2017). Senior lab projects for teaching the Internet of Things in a Software Engineering program.\u00a0Zeszyty Naukowe Wydzia\u0142u Elektrotechniki i Automatyki Politechniki Gda\u0144skiej."},{"issue":"5","key":"3169_CR4","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125\u20131142.","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"3169_CR5","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10796-014-9492-7","volume":"17","author":"S Li","year":"2015","unstructured":"Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: A survey. Information Systems Frontiers, 17(2), 243\u2013259.","journal-title":"Information Systems Frontiers"},{"key":"3169_CR6","doi-asserted-by":"crossref","unstructured":"Thomas, A., Kumar, T. G., & Mohan, A. K. (2018). Neighbor attack detection in internet of things. In\u00a0Advanced Computational and Communication Paradigms\u00a0(pp. 187\u2013196). Springer, Singapore.","DOI":"10.1007\/978-981-10-8237-5_18"},{"key":"3169_CR7","doi-asserted-by":"crossref","unstructured":"Deogirikar, J., & Vidhate, A. (2017). Security attacks in IoT: A survey. In\u00a02017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC)\u00a0(pp. 32\u201337). IEEE.","DOI":"10.1109\/I-SMAC.2017.8058363"},{"key":"3169_CR8","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2018","unstructured":"Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761\u2013768.","journal-title":"Future Generation Computer Systems"},{"key":"3169_CR9","doi-asserted-by":"crossref","unstructured":"Nguyen, T. D., Khan, J. Y., & Ngo, D. T. (2017). An effective energy-harvesting-aware routing algorithm for WSN-based IoT applications. In\u00a02017 IEEE International Conference on Communications (ICC)\u00a0(pp. 1\u20136). IEEE.","DOI":"10.1109\/ICC.2017.7996888"},{"issue":"S3","key":"3169_CR10","doi-asserted-by":"publisher","first-page":"100","DOI":"10.51983\/ajcst-2019.8.S3.2075","volume":"8","author":"V Neerugatti","year":"2019","unstructured":"Neerugatti, V., & Reddy, R. M. (2019). Acknowledgement based technique for detection of the wormhole attack in RPL based internet of things networks. Asian Journal of Computer Science and Technology, 8(S3), 100\u2013104.","journal-title":"Asian Journal of Computer Science and Technology"},{"key":"3169_CR11","doi-asserted-by":"publisher","first-page":"101849","DOI":"10.1016\/j.cose.2020.101849","volume":"94","author":"P Kaliyar","year":"2020","unstructured":"Kaliyar, P., Jaballah, W. B., Conti, M., & Lal, C. (2020). LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks. Computers & Security, 94, 101849.","journal-title":"Computers & Security"},{"key":"3169_CR12","doi-asserted-by":"crossref","unstructured":"Ambili, K. N., & Jose, J. (2020). Trust based intrusion detection system to detect insider attacks in IoT systems. In Information Science and Applications (pp. 631\u2013638). Springer, Singapore.","DOI":"10.1007\/978-981-15-1465-4_62"},{"key":"3169_CR13","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.promfg.2019.02.292","volume":"32","author":"S Deshmukh-Bhosale","year":"2019","unstructured":"Deshmukh-Bhosale, S., & Sonavane, S. S. (2019). A real-time intrusion detection system for wormhole attack in the RPL based Internet of Things. Procedia Manufacturing, 32, 840\u2013847.","journal-title":"Procedia Manufacturing"},{"key":"3169_CR14","doi-asserted-by":"publisher","first-page":"1313","DOI":"10.1007\/s10586-017-1622-9","volume":"22","author":"DC Mehetre","year":"2018","unstructured":"Mehetre, D. C., Roslin, S. E., & Wagh, S. J. (2018). Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. Cluster Computing, 22, 1313\u20131328.","journal-title":"Cluster Computing"},{"issue":"6","key":"3169_CR15","doi-asserted-by":"publisher","first-page":"1926","DOI":"10.3390\/s18061926","volume":"18","author":"ZY Ai","year":"2018","unstructured":"Ai, Z. Y., Zhou, Y. T., & Song, F. (2018). A smart collaborative routing protocol for reliable data diffusion in IoT scenarios. Sensors, 18(6), 1926.","journal-title":"Sensors"},{"key":"3169_CR16","doi-asserted-by":"crossref","unstructured":"Perazzo, P., Vallati, C., Varano, D., Anastasi, G., & Dini, G. (2018). Implementation of a wormhole attack against a rpl network: Challenges and effects. In\u00a02018 14th Annual Conference on Wireless On-demand Network Systems and Services (WONS)\u00a0(pp. 95\u2013102). IEEE.","DOI":"10.23919\/WONS.2018.8311669"},{"key":"3169_CR17","doi-asserted-by":"crossref","unstructured":"Wani, A., & Revathi, S. (2017). Analyzing threats of iot networks using sdn based intrusion detection system (sdiot-ids). In\u00a0International Conference on Next Generation Computing Technologies\u00a0(pp. 536\u2013542). Springer, Singapore.","DOI":"10.1007\/978-981-10-8660-1_41"},{"key":"3169_CR18","doi-asserted-by":"crossref","unstructured":"Acharjya, D. P., & Ahmed, N. S. S. (2017). Recognizing Attacks in Wireless Sensor Network in View of Internet of Things. In\u00a0Internet of Things: Novel Advances and Envisioned Applications\u00a0(pp. 149\u2013172). Springer, Cham.","DOI":"10.1007\/978-3-319-53472-5_7"},{"key":"3169_CR19","first-page":"2558","volume":"51","author":"C Iwendi","year":"2020","unstructured":"Iwendi, C., Maddikunta, P. K. R., Gadekallu, T. R., Lakshmanna, K., Bashir, A. K., & Piran, M. J. (2020). A metaheuristic optimization approach for energy efficiency in the IoT networks. Software: Practice and Experience, 51, 2558\u20132571.","journal-title":"Software: Practice and Experience"},{"key":"3169_CR20","doi-asserted-by":"publisher","first-page":"20413","DOI":"10.1109\/ACCESS.2019.2963723","volume":"8","author":"M Zhu","year":"2020","unstructured":"Zhu, M., Chang, L., Wang, N., & You, I. (2020). A smart collaborative routing protocol for delay sensitive applications in industrial IoT. IEEE Access, 8, 20413\u201320427.","journal-title":"IEEE Access"},{"key":"3169_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, X. J., Qu, Z. Y., & Zhang, M. L. (2017). A high efficient self-organizing network protocol for large scale aware nodes in internet of things.\u00a0DEStech Transactions on Engineering and Technology Research, (amma).","DOI":"10.12783\/dtetr\/amma2017\/13374"},{"key":"3169_CR22","first-page":"140","volume":"3","author":"M Vellanki","year":"2016","unstructured":"Vellanki, M., Kandukuri, S. P. R., & Razaque, A. (2016). Node level energy efficiency protocol for Internet of Things. Journal of Theoretical and Computational Science, 3, 140.","journal-title":"Journal of Theoretical and Computational Science"},{"issue":"1C2","key":"3169_CR23","first-page":"1122","volume":"8","author":"JA Alzubi","year":"2019","unstructured":"Alzubi, J. A., Alzubi, O. A., Suseendran, G., & Akila, D. (2019). A novel Chaotic map encryption methodology for image cryptography and secret Communication with steganography. Int J Recent Technol Eng, 8(1C2), 1122\u20131128.","journal-title":"Int J Recent Technol Eng"},{"issue":"11","key":"3169_CR24","doi-asserted-by":"publisher","first-page":"8566","DOI":"10.1007\/s11227-020-03144-x","volume":"76","author":"OA Alzubi","year":"2020","unstructured":"Alzubi, O. A., Alzubi, J. A., Dorgham, O., & Alsayyed, M. (2020). Cryptosystem design based on Hermitian curves for IoT security. The Journal of Supercomputing, 76(11), 8566\u20138589.","journal-title":"The Journal of Supercomputing"},{"issue":"4","key":"3169_CR25","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4234","volume":"33","author":"R Fotohi","year":"2020","unstructured":"Fotohi, R., Firoozi Bari, S., & Yusefi, M. (2020). Securing wireless sensor networks against denial-of-sleep attacks using RSA cryptography algorithm and interlock protocol. International Journal of Communication Systems, 33(4), e4234.","journal-title":"International Journal of Communication Systems"},{"issue":"4","key":"3169_CR26","doi-asserted-by":"publisher","first-page":"3011","DOI":"10.1007\/s10586-021-03309-0","volume":"24","author":"H Aldabbas","year":"2021","unstructured":"Aldabbas, H., & Amin, R. (2021). A novel mechanism to handle address spoofing attacks in SDN based IoT. Cluster Computing, 24(4), 3011\u20133026.","journal-title":"Cluster Computing"},{"key":"3169_CR27","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.comnet.2016.04.012","volume":"107","author":"MA Senouci","year":"2016","unstructured":"Senouci, M. A., Mushtaq, M. S., Hoceini, S., & Mellouk, A. (2016). TOPSIS-based dynamic approach for mobile network interface selection. Computer Networks, 107, 304\u2013314.","journal-title":"Computer Networks"},{"key":"3169_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100267","volume":"26","author":"R Fotohi","year":"2020","unstructured":"Fotohi, R., Nazemi, E., & Aliee, F. S. (2020). An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks. Vehicular Communications, 26, 100267.","journal-title":"Vehicular Communications"},{"key":"3169_CR29","doi-asserted-by":"crossref","unstructured":"Canedo, J., & Skjellum, A. (2016). Using machine learning to secure IoT systems. In 2016 14th Annual Conference on Privacy, Security and Trust (PST) (pp. 219\u2013222). IEEE.","DOI":"10.1109\/PST.2016.7906930"},{"issue":"9","key":"3169_CR30","doi-asserted-by":"publisher","first-page":"7081","DOI":"10.1007\/s11227-019-03137-5","volume":"76","author":"K Mabodi","year":"2020","unstructured":"Mabodi, K., Yusefi, M., Zandiyan, S., Irankhah, L., & Fotohi, R. (2020). Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. The Journal of Supercomputing, 76(9), 7081\u20137106.","journal-title":"The Journal of Supercomputing"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-03169-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-022-03169-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-03169-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,2]],"date-time":"2023-02-02T14:41:46Z","timestamp":1675348906000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-022-03169-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,15]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["3169"],"URL":"https:\/\/doi.org\/10.1007\/s11276-022-03169-5","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,15]]},"assertion":[{"value":"21 September 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All of the authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}