{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T01:36:51Z","timestamp":1767922611758,"version":"3.49.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,4,21]],"date-time":"2023-04-21T00:00:00Z","timestamp":1682035200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,21]],"date-time":"2023-04-21T00:00:00Z","timestamp":1682035200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s11276-023-03322-8","type":"journal-article","created":{"date-parts":[[2023,4,21]],"date-time":"2023-04-21T20:18:40Z","timestamp":1682108320000},"page":"2591-2607","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Dynamic routing approach for enhancing source location privacy in wireless sensor networks"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8013-6140","authenticated-orcid":false,"given":"Gulshan","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Rajkumar Singh","family":"Rathore","sequence":"additional","affiliation":[]},{"given":"Kutub","family":"Thakur","sequence":"additional","affiliation":[]},{"given":"Ahmad","family":"Almadhor","sequence":"additional","affiliation":[]},{"given":"Sardar Asad Ali","family":"Biabani","sequence":"additional","affiliation":[]},{"given":"Subhash","family":"Chander","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,21]]},"reference":[{"key":"3322_CR1","first-page":"1","volume":"25","author":"MF Al-Mistarihi","year":"2019","unstructured":"Al-Mistarihi, M.F., Tanash, I.M., Yaseen, F.S., & Darabkh, K.A. (2019). Protecting source location privacy in a clustered wireless sensor networks against local eavesdroppers. Mobile Networks and Applications, 25, 1\u201313.","journal-title":"Mobile Networks and Applications"},{"key":"3322_CR2","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1016\/j.future.2017.08.044","volume":"82","author":"G Han","year":"2018","unstructured":"Han, G., Zhou, L., Wang, H., Zhang, W., & Chan, S. (2018). A source location protection protocol based on dynamic routing in wsns for the social internet of things. Future Generation Computer Systems, 82, 689\u2013697.","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"3322_CR3","doi-asserted-by":"publisher","first-page":"2739","DOI":"10.1109\/TVT.2019.2891127","volume":"68","author":"G Han","year":"2019","unstructured":"Han, G., Miao, X., Wang, H., Guizani, M., & Zhang, W. (2019). Cpslp: A cloud-based scheme for protecting source location privacy in wireless sensor networks using multi-sinks. IEEE Transactions on Vehicular Technology, 68(3), 2739\u20132750.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"3322_CR4","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1016\/j.future.2019.02.049","volume":"96","author":"Y He","year":"2019","unstructured":"He, Y., Han, G., Wang, H., Ansere, J. A., & Zhang, W. (2019). A sector-based random routing scheme for protecting the source location privacy in wsns for the internet of things. Future Generation Computer Systems, 96, 438\u2013448.","journal-title":"Future Generation Computer Systems"},{"issue":"5","key":"3322_CR5","doi-asserted-by":"publisher","first-page":"1037","DOI":"10.3390\/s19051037","volume":"19","author":"LC Mutalemwa","year":"2019","unstructured":"Mutalemwa, L. C., & Shin, S. (2019). Achieving source location privacy protection in monitoring wireless sensor networks through proxy node routing. Sensors, 19(5), 1037.","journal-title":"Sensors"},{"issue":"1","key":"3322_CR6","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s11277-018-6026-5","volume":"104","author":"B Chakraborty","year":"2019","unstructured":"Chakraborty, B., Verma, S., & Singh, K. P. (2019). Differentially private location privacy preservation in wireless sensor networks. Wireless Personal Communications, 104(1), 387\u2013406.","journal-title":"Wireless Personal Communications"},{"issue":"9","key":"3322_CR7","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.3390\/s19092050","volume":"19","author":"N Jan","year":"2019","unstructured":"Jan, N., Al-Bayatti, A. H., Alalwan, N., & Alzahrani, A. I. (2019). An enhanced source location privacy based on data dissemination in wireless sensor networks (delp). Sensors, 19(9), 2050.","journal-title":"Sensors"},{"key":"3322_CR8","doi-asserted-by":"crossref","unstructured":"Alolaiwy, M., Tanik, M., & Jololian, L. (2021). From cnns to adaptive filter design for digital image denoising using reinforcement q-learning. In: SoutheastCon 2021, IEEE, pp 1\u20138","DOI":"10.1109\/SoutheastCon45413.2021.9401873"},{"issue":"6","key":"3322_CR9","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1093\/comjnl\/bxr010","volume":"54","author":"A Jhumka","year":"2011","unstructured":"Jhumka, A., Leeke, M., & Shrestha, S. (2011). On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy. The Computer Journal, 54(6), 860\u2013874. https:\/\/doi.org\/10.1093\/comjnl\/bxr010","journal-title":"The Computer Journal"},{"key":"3322_CR10","doi-asserted-by":"crossref","unstructured":"Zhou, L., & Shan, Y. (2019). Multi-branch source location privacy protection scheme based on random walk in wsns. In: 2019 IEEE 4th International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), IEEE, pp 543\u2013547","DOI":"10.1109\/ICCCBDA.2019.8725631"},{"key":"3322_CR11","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.comnet.2018.11.005","volume":"148","author":"H Wang","year":"2019","unstructured":"Wang, H., Han, G., Zhou, L., Ansere, J. A., & Zhang, W. (2019). A source location privacy protection scheme based on ring-loop routing for the iot. Computer Networks, 148, 142\u2013150.","journal-title":"Computer Networks"},{"issue":"1","key":"3322_CR12","doi-asserted-by":"publisher","first-page":"70","DOI":"10.4018\/IJISP.2019010106","volume":"13","author":"R Kaur","year":"2019","unstructured":"Kaur, R., Verma, K., Jain, S. K., & Kesswani, N. (2019). Efficient routing protocol for location privacy preserving in internet of things. International Journal of Information Security and Privacy (IJISP), 13(1), 70\u201385.","journal-title":"International Journal of Information Security and Privacy (IJISP)"},{"key":"3322_CR13","doi-asserted-by":"crossref","unstructured":"Deng, J., Han, R., & Mishra, S. (2005). Countermeasures against traffic analysis attacks in wireless sensor networks. In: Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005. First International Conference on, IEEE, pp 113\u2013126","DOI":"10.1109\/SECURECOMM.2005.16"},{"key":"3322_CR14","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/4724852","author":"F Ishmanov","year":"2017","unstructured":"Ishmanov, F., & Bin\u00a0Zikria, Y. (2017). Trust mechanisms to secure routing in wireless sensor networks: Current state of the research and open research issues. Journal of Sensors. 10.1155\/2017\/4724852","journal-title":"International Journal of Information Security and Privacy (IJISP)"},{"key":"3322_CR15","doi-asserted-by":"publisher","first-page":"936","DOI":"10.1016\/j.procs.2015.07.486","volume":"57","author":"PK Roy","year":"2015","unstructured":"Roy, P. K., Singh, J. P., Kumar, P., & Singh, M. (2015). Source location privacy using fake source and phantom routing (fsapr) technique in wireless sensor networks. Procedia Computer Science, 57, 936\u2013941.","journal-title":"Procedia Computer Science"},{"key":"3322_CR16","doi-asserted-by":"crossref","unstructured":"Cremonini, M., Braghin, C., & Ardagna, C.A. (2013). Privacy on the internet. In: Computer and Information Security Handbook, Elsevier, pp 739\u2013753","DOI":"10.1016\/B978-0-12-394397-2.00042-8"},{"key":"3322_CR17","doi-asserted-by":"crossref","unstructured":"Mehta, K., Liu, D., & Wright, M. (2007). Location privacy in sensor networks against a global eavesdropper. In: Network Protocols, 2007. ICNP 2007. In: IEEE International Conference on, IEEE, pp 314\u2013323","DOI":"10.1109\/ICNP.2007.4375862"},{"key":"3322_CR18","doi-asserted-by":"crossref","unstructured":"Kamath, S., Meisner, E., & Isler, V. (2007). Triangulation based multi target tracking with mobile sensor networks. In: Robotics and Automation, 2007 IEEE International Conference on, IEEE, pp 3283\u20133288","DOI":"10.1109\/ROBOT.2007.363979"},{"key":"3322_CR19","doi-asserted-by":"crossref","unstructured":"Kamat, P., Zhang, Y., Trappe, W., & Ozturk, C. (2005). Enhancing source-location privacy in sensor network routing. In: Distributed Computing Systems, 2005. ICDCS 2005. Proceedings 25th IEEE International Conference on, IEEE, pp 599\u2013608","DOI":"10.1109\/ICDCS.2005.31"},{"key":"3322_CR20","doi-asserted-by":"crossref","unstructured":"Armenia, S., Morabito, G., & Palazzo, S. (2007). Analysis of location privacy\/energy efficiency tradeoffs in wireless sensor networks. In: International Conference on Research in Networking, Springer, pp 215\u2013226","DOI":"10.1007\/978-3-540-72606-7_19"},{"issue":"2","key":"3322_CR21","first-page":"125","volume":"17","author":"SW Lee","year":"2007","unstructured":"Lee, S. W., Park, Y. H., Son, J. H., Kang, Y., Choe, J. G., Moon, H. G., & Seo, S. W. (2007). Source-location privacy in wireless sensor networks. Journal of the Korea Institute of Information Security and Cryptology, 17(2), 125\u2013137.","journal-title":"Journal of the Korea Institute of Information Security and Cryptology"},{"key":"3322_CR22","doi-asserted-by":"crossref","unstructured":"Yao, J., & Wen, G. (2008). Preserving source-location privacy in energy-constrained wireless sensor networks. In: Distributed Computing Systems Workshops, 2008. ICDCS\u201908. 28th International Conference on, IEEE, pp 412\u2013416","DOI":"10.1109\/ICDCS.Workshops.2008.42"},{"issue":"2","key":"3322_CR23","first-page":"657","volume":"27","author":"JR Jiang","year":"2011","unstructured":"Jiang, J. R., Sheu, J. P., Tu, C., Wu, J. W., et al. (2011). An anonymous path routing (apr) protocol for wireless sensor networks. Journal of Information Science and Engineering, 27(2), 657\u2013680.","journal-title":"Journal of Information Science and Engineering"},{"key":"3322_CR24","doi-asserted-by":"crossref","unstructured":"Bahsi, H., & Levi, A. (2009). Energy efficient privacy preserved data gathering in wireless sensor networks having multiple sinks. In: 2009 2nd International Conference on Computer Science and its Applications, pp 1\u20138, 10.1109\/CSA.2009.5404315","DOI":"10.1109\/CSA.2009.5404315"},{"key":"3322_CR25","doi-asserted-by":"crossref","unstructured":"Tan, G., Li, W., & Song, J. (2014). Enhancing source location privacy in energy-constrained wireless sensor networks. In: Proceedings of international conference on computer science and information technology, Springer, pp 279\u2013289","DOI":"10.1007\/978-81-322-1759-6_34"},{"key":"3322_CR26","doi-asserted-by":"crossref","unstructured":"Luo, X., Ji, X., & Park, M.S. (2010). Location privacy against traffic analysis attacks in wireless sensor networks. In: Information Science and Applications (ICISA), 2010 International Conference on, IEEE, pp 1\u20136","DOI":"10.1109\/ICISA.2010.5480564"},{"key":"3322_CR27","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.pmcj.2013.06.002","volume":"13","author":"Y Xi","year":"2014","unstructured":"Xi, Y., Schwiebert, L., & Shi, W. (2014). Privacy preserving shortest path routing with an application to navigation. Pervasive and Mobile Computing, 13, 142\u2013149.","journal-title":"Pervasive and Mobile Computing"},{"key":"3322_CR28","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.cose.2018.03.002","volume":"77","author":"B Chakraborty","year":"2018","unstructured":"Chakraborty, B., Verma, S., & Singh, K. P. (2018). Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks. Computers & Security, 77, 36\u201348.","journal-title":"Computers & Security"},{"issue":"5","key":"3322_CR29","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1504\/IJES.2021.120257","volume":"14","author":"K Kou","year":"2021","unstructured":"Kou, K., Liu, Z., Ye, H., Li, Z., & Liu, W. (2021). A location privacy protection algorithm based on differential privacy in sensor network. International Journal of Embedded Systems, 14(5), 432\u2013442.","journal-title":"International Journal of Embedded Systems"},{"issue":"7","key":"3322_CR30","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1109\/TPDS.2011.260","volume":"23","author":"Y Li","year":"2012","unstructured":"Li, Y., Ren, J., & Wu, J. (2012). Quantitative measurement and design of source-location privacy schemes for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(7), 1302\u20131311.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"2","key":"3322_CR31","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1109\/TMC.2011.32","volume":"11","author":"K Mehta","year":"2012","unstructured":"Mehta, K., Liu, D., & Wright, M. (2012). Protecting location privacy in sensor networks against a global eavesdropper. IEEE Transactions on Mobile Computing, 11(2), 320\u2013336.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"3322_CR32","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.pmcj.2012.10.002","volume":"11","author":"M Raj","year":"2014","unstructured":"Raj, M., Li, N., Liu, D., Wright, M., & Das, S. K. (2014). Using data mules to preserve source location privacy in wireless sensor networks. Pervasive and Mobile Computing, 11, 244\u2013260.","journal-title":"Pervasive and Mobile Computing"},{"issue":"4","key":"3322_CR33","doi-asserted-by":"publisher","first-page":"834245","DOI":"10.1155\/2013\/834245","volume":"9","author":"J Ren","year":"2013","unstructured":"Ren, J., Zhang, Y., & Liu, K. (2013). An energy-efficient cyclic diversionary routing strategy against global eavesdroppers in wireless sensor networks. International Journal of Distributed Sensor Networks, 9(4), 834245.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"3322_CR34","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.jpdc.2015.04.003","volume":"81","author":"J Long","year":"2015","unstructured":"Long, J., Liu, A., Dong, M., & Li, Z. (2015). An energy-efficient and sink-location privacy enhanced scheme for wsns through ring based routing. Journal of parallel and Distributed computing, 81, 47\u201365.","journal-title":"Journal of parallel and Distributed computing"},{"issue":"3","key":"3322_CR35","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s12083-012-0130-1","volume":"7","author":"A Liu","year":"2014","unstructured":"Liu, A., Zhang, D., Zhang, P., Cui, G., & Chen, Z. (2014). On mitigating hotspots to maximize network lifetime in multi-hop wireless sensor network with guaranteed transport delay and reliability. Peer-to-peer Networking and Applications, 7(3), 255\u2013273.","journal-title":"Peer-to-peer Networking and Applications"},{"issue":"9","key":"3322_CR36","doi-asserted-by":"publisher","first-page":"1512","DOI":"10.1016\/j.comnet.2009.02.002","volume":"53","author":"H Wang","year":"2009","unstructured":"Wang, H., Sheng, B., & Li, Q. (2009). Privacy-aware routing in sensor networks. Computer Networks, 53(9), 1512\u20131529.","journal-title":"Computer Networks"},{"key":"3322_CR37","doi-asserted-by":"crossref","unstructured":"Wei, F., Zhang, X., Xiao, H., & Men, A. (2012). A modified wireless token ring protocol for wireless sensor network. In: Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on, IEEE, pp 795\u2013799","DOI":"10.1109\/CECNet.2012.6201768"},{"issue":"14","key":"3322_CR38","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1002\/wcm.1205","volume":"12","author":"J Chen","year":"2012","unstructured":"Chen, J., Du, X., & Fang, B. (2012). An efficient anonymous communication protocol for wireless sensor networks. Wireless Communications and Mobile Computing, 12(14), 1302\u20131312.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"3322_CR39","doi-asserted-by":"crossref","unstructured":"Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., & Naor, M. (2006). Our data, ourselves: Privacy via distributed noise generation. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp 486\u2013503","DOI":"10.1007\/11761679_29"},{"key":"3322_CR40","doi-asserted-by":"crossref","unstructured":"Luo, G., Zhang, Z., Zhang, Z., Liu, Y., & Wang, L. (2020). A smart privacy-preserving learning method by fake gradients to protect users items in recommender systems. Complexity 2020","DOI":"10.1155\/2020\/6683834"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03322-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-023-03322-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03322-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T12:11:56Z","timestamp":1690287116000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-023-03322-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,21]]},"references-count":40,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["3322"],"URL":"https:\/\/doi.org\/10.1007\/s11276-023-03322-8","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,21]]},"assertion":[{"value":"9 March 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 April 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}