{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T18:39:09Z","timestamp":1767897549540,"version":"3.49.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T00:00:00Z","timestamp":1676505600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T00:00:00Z","timestamp":1676505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11276-023-03249-0","type":"journal-article","created":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T16:02:31Z","timestamp":1676563351000},"page":"5211-5237","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["6G assisted federated learning for continuous monitoring in wireless sensor network using game theory"],"prefix":"10.1007","volume":"30","author":[{"given":"S.","family":"Phani Praveen","sequence":"first","affiliation":[]},{"given":"Mohammed Hasan","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Muhammad Aslam","family":"Jarwar","sequence":"additional","affiliation":[]},{"given":"Chander","family":"Prakash","sequence":"additional","affiliation":[]},{"given":"Chavva Ravi Kishore","family":"Reddy","sequence":"additional","affiliation":[]},{"given":"L.","family":"Malliga","sequence":"additional","affiliation":[]},{"given":"C.","family":"Chandru Vignesh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,16]]},"reference":[{"key":"3249_CR1","unstructured":"Peltonen, E., Bennis, M., Capobianco, M., Debbah, M., Ding, A., Gil-Casti\u00f1eira, F., Jurmu, M., Karvonen, T., Kelanti, M., Kliks, A., & Yang, T. (2020). 6G white paper on edge intelligence. arXiv preprint arXiv:2004.14850."},{"key":"3249_CR2","first-page":"1","volume-title":"Future trends in 5G and 6G: Challenges, architecture, and applications","author":"S Jadhav","year":"2021","unstructured":"Jadhav, S., & Jadhav, S. (2021). An organized study of congestion control approaches in wireless sensor networks. Future trends in 5G and 6G: Challenges, architecture, and applications (pp. 1\u201323). CRC Press."},{"key":"3249_CR3","first-page":"5920","volume":"9","author":"Y Hui","year":"2021","unstructured":"Hui, Y., Cheng, N., Huang, Y., Chen, R., Xiao, X., Li, C., & Mao, G. (2021). Personalized vehicular edge computing in 6G. IEEE Network, 9, 5920\u20135931.","journal-title":"IEEE Network"},{"key":"3249_CR4","doi-asserted-by":"crossref","unstructured":"Jaiswal, K., & Anand, V. (2021). A Grey-Wolf-based Optimized Clustering approach to improve QoS in wireless sensor networks for IoT applications. Peer-to-Peer Networking and Applications 1\u201320.","DOI":"10.1007\/s12083-021-01099-1"},{"issue":"4","key":"3249_CR5","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MVT.2020.3019650","volume":"15","author":"J Du","year":"2020","unstructured":"Du, J., Jiang, C., Wang, J., Ren, Y., & Debbah, M. (2020). Machine learning for 6G wireless networks: Carrying forward enhanced bandwidth, massive access, and ultrareliable\/low-latency service. IEEE Vehicular Technology Magazine, 15(4), 122\u2013134.","journal-title":"IEEE Vehicular Technology Magazine"},{"issue":"7","key":"3249_CR6","doi-asserted-by":"publisher","first-page":"690","DOI":"10.17485\/IJST\/v14i7.1258","volume":"14","author":"K Yadav","year":"2021","unstructured":"Yadav, K., & Saad, S. A. (2021). Game theory-based adaptive transmit power control algorithm for IoT wireless sensor networks. Indian Journal of Science and Technology, 14(7), 690\u2013697.","journal-title":"Indian Journal of Science and Technology"},{"issue":"9","key":"3249_CR7","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.cja.2021.04.025","volume":"35","author":"X Jiang","year":"2021","unstructured":"Jiang, X., Sheng, M., Zhao, N., Xing, C., Lu, W., & Wang, X. (2021). Green UAV communications for 6G: A survey. Chinese Journal of Aeronautics, 35(9), 19\u201334.","journal-title":"Chinese Journal of Aeronautics"},{"key":"3249_CR8","unstructured":"Zhou, M., Guan, Y., Hayajneh, M., Niu, K., & Abdallah, C. (2021). Game theory and machine learning in UAVs-assisted wireless communication networks: A survey. arXiv preprint arXiv:2108.03495."},{"key":"3249_CR9","doi-asserted-by":"crossref","unstructured":"Mao, B., Tang, F., Yuichi, K., & Kato, N. (2021). AI-based service management for 6G green communications. arXiv preprint arXiv:2101.01588.","DOI":"10.1109\/COMST.2021.3130901"},{"issue":"5","key":"3249_CR10","doi-asserted-by":"publisher","first-page":"718","DOI":"10.3390\/sym11050718","volume":"11","author":"J Wang","year":"2019","unstructured":"Wang, J., Zhengpeng, Y., Gillbanks, J., Sanders, T. M., & Zou, N. (2019). A power control algorithm based on chicken game theory in multi-hop networks. Symmetry, 11(5), 718.","journal-title":"Symmetry"},{"key":"3249_CR11","unstructured":"Habachi, O., Meghdadi, V., Sabir, E., & Cancel, J. P. Ubiquitous networking."},{"issue":"2","key":"3249_CR12","doi-asserted-by":"publisher","first-page":"89","DOI":"10.3390\/info11020089","volume":"11","author":"V Basnayake","year":"2020","unstructured":"Basnayake, V., Jayakody, D. N. K., Sharma, V., Sharma, N., Muthuchidambaranathan, P., & Mabed, H. (2020). A new green perspective of non-orthogonal multiple access (noma) for 5g. Information, 11(2), 89.","journal-title":"Information"},{"key":"3249_CR13","doi-asserted-by":"crossref","unstructured":"Liu, R., Liu, A., Qu, Z., & Xiong, N. N. (2021). A UAV-enabled intelligent connected transportation system with 6g communications for internet of vehicles. IEEE Transactions on Intelligent Transportation Systems.","DOI":"10.1109\/TITS.2021.3122567"},{"key":"3249_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/9931677","volume":"2021","author":"KA Eldrandaly","year":"2021","unstructured":"Eldrandaly, K. A., Abdel-Fatah, L., Abdel-Basset, M., El-hoseny, M., & Abdel-Aziz, N. M. (2021). Green communication for sixth-generation intent-based networks: An architecture based on hybrid computational intelligence algorithm. Wireless Communications and Mobile Computing, 2021, 1\u201313.","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"5","key":"3249_CR15","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/MWC.001.1900516","volume":"27","author":"G Gui","year":"2020","unstructured":"Gui, G., Liu, M., Tang, F., Kato, N., & Adachi, F. (2020). 6G: Opening new horizons for integration of comfort, security, and intelligence. IEEE Wireless Communications, 27(5), 126\u2013132.","journal-title":"IEEE Wireless Communications"},{"key":"3249_CR16","unstructured":"Santhoshkumar, M. S., Sivaparthipan, M. C., Prabakar, D. D., & Karthik, D. S. (2013). Secure encryption technique with keying based virtual energy for wireless sensor networks. International Journal of Advance Research in Computer Science and Management Studies, 1(5)."},{"key":"3249_CR17","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.future.2021.09.038","volume":"128","author":"J Wan","year":"2022","unstructured":"Wan, J., & Chen, J. (2022). AHP-based relay selection strategy for energy harvesting wireless sensor networks. Future Generation Computer Systems, 128, 36\u201344.","journal-title":"Future Generation Computer Systems"},{"key":"3249_CR18","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.comcom.2020.07.035","volume":"161","author":"K Sheth","year":"2020","unstructured":"Sheth, K., Patel, K., Shah, H., Tanwar, S., Gupta, R., & Kumar, N. (2020). A taxonomy of AI techniques for 6G communication networks. Computer Communications, 161, 279\u2013303.","journal-title":"Computer Communications"},{"issue":"19","key":"3249_CR19","doi-asserted-by":"publisher","first-page":"2377","DOI":"10.3390\/electronics10192377","volume":"10","author":"MZ Khan","year":"2021","unstructured":"Khan, M. Z., Alhazmi, O. H., Javed, M. A., Ghandorh, H., & Aloufi, K. S. (2021). Reliable internet of things: Challenges and future trends. Electronics, 10(19), 2377.","journal-title":"Electronics"},{"key":"3249_CR20","first-page":"1","volume":"2021","author":"Y Yang","year":"2021","unstructured":"Yang, Y., Wei, X., Xu, R., Peng, L., Cheng, S., & Ge, L. (2021). Channel access-based joint optimization of AoI and SINR under attack: Game theory and distributed approach. Wireless Communications and Mobile Computing, 2021, 1\u201310.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"3249_CR21","doi-asserted-by":"publisher","first-page":"147029","DOI":"10.1109\/ACCESS.2020.3015289","volume":"8","author":"LU Khan","year":"2020","unstructured":"Khan, L. U., Yaqoob, I., Imran, M., Han, Z., & Hong, C. S. (2020). 6G wireless systems: A vision, architectural elements, and future directions. IEEE Access, 8, 147029\u2013147044.","journal-title":"IEEE Access"},{"issue":"6","key":"3249_CR22","doi-asserted-by":"publisher","first-page":"6401","DOI":"10.1109\/TVT.2020.2985704","volume":"69","author":"H Liang","year":"2020","unstructured":"Liang, H., Zhao, X., & Li, Z. (2020). Optimal energy cooperation policy in fusion center-based sustainable wireless sensor networks. IEEE Transactions on Vehicular Technology, 69(6), 6401\u20136414.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"3249_CR23","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/COMST.2021.3131332","volume":"24","author":"H Guo","year":"2021","unstructured":"Guo, H., Li, J., Liu, J., Tian, N., & Kato, N. (2021). A survey on space-air-ground-sea integrated network security in 6G. IEEE Communications Surveys & Tutorials, 24, 53\u201387.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"3249_CR24","doi-asserted-by":"crossref","unstructured":"Reddy, V. M., Neelima, K., & Naresh, G. (2021). Efficient energy management systems in UAV\u2010based IoT networks. In Unmanned aerial vehicles for internet of things (IoT) concepts, techniques, and applications (pp. 159\u2013172).","DOI":"10.1002\/9781119769170.ch9"},{"key":"3249_CR25","doi-asserted-by":"crossref","unstructured":"Balan, E. V., Priyan, M. K., Nath, C. G., & Devi, G. U. (2014). Efficient energy scheme for the wireless sensor network application. In 2014 IEEE International Conference on Computational Intelligence and Computing Research (pp. 1\u20135). IEEE.","DOI":"10.1109\/ICCIC.2014.7238472"},{"key":"3249_CR26","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.comcom.2021.01.003","volume":"168","author":"Z Qadir","year":"2021","unstructured":"Qadir, Z., Ullah, F., Munawar, H. S., & Al-Turjman, F. (2021). Addressing disasters in smart cities through UAVs path planning and 5G communications: A systematic review. Computer Communications, 168, 114\u2013135.","journal-title":"Computer Communications"},{"key":"3249_CR27","doi-asserted-by":"publisher","first-page":"101532","DOI":"10.1016\/j.phycom.2021.101532","volume":"51","author":"TQ Duong","year":"2021","unstructured":"Duong, T. Q., Kim, K. J., Kaleem, Z., Bui, M. P., & Vo, N. S. (2021). UAV caching in 6G networks: A Survey on models, techniques, and applications. Physical Communication, 51, 101532.","journal-title":"Physical Communication"},{"issue":"2","key":"3249_CR28","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1109\/COMST.2021.3059896","volume":"23","author":"Y Xu","year":"2021","unstructured":"Xu, Y., Gui, G., Gacanin, H., & Adachi, F. (2021). A survey on resource allocation for 5G heterogeneous networks: Current research, future trends, and challenges. IEEE Communications Surveys & Tutorials, 23(2), 668\u2013695.","journal-title":"IEEE Communications Surveys & Tutorials"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03249-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-023-03249-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03249-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T16:26:25Z","timestamp":1722615985000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-023-03249-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,16]]},"references-count":28,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["3249"],"URL":"https:\/\/doi.org\/10.1007\/s11276-023-03249-0","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,16]]},"assertion":[{"value":"13 January 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors do not have any conflicts.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}