{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,15]],"date-time":"2025-02-15T05:21:35Z","timestamp":1739596895381,"version":"3.37.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T00:00:00Z","timestamp":1728518400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T00:00:00Z","timestamp":1728518400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s11276-024-03828-9","type":"journal-article","created":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T11:02:04Z","timestamp":1728558124000},"page":"1435-1448","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure cluster head selection in wireless sensor networks using fuzzy based generic algorithm"],"prefix":"10.1007","volume":"31","author":[{"given":"M.","family":"Dhipa","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nithya","family":"Sampath","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R.","family":"Seetha","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"D.","family":"Nageswari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,10,10]]},"reference":[{"issue":"10","key":"3828_CR1","doi-asserted-by":"publisher","first-page":"3834","DOI":"10.3837\/tiis.2021.10.019","volume":"15","author":"SS Mercy","year":"2021","unstructured":"Mercy, S. S., Mathana, J. M., & Jasmine, J. S. (2021). An energy-efficient optimal multi-dimensional location, key and trust management based secure routing protocol for wireless sensor network. KSII Transactions on Internet and Information Systems (TIIS), 15(10), 3834\u20133857. https:\/\/doi.org\/10.3837\/tiis.2021.10.019","journal-title":"KSII Transactions on Internet and Information Systems (TIIS)"},{"key":"3828_CR2","doi-asserted-by":"publisher","first-page":"11538","DOI":"10.1109\/ACCESS.2022.3144015","volume":"10","author":"Y Han","year":"2022","unstructured":"Han, Y., Hu, H., & Guo, Y. (2022). Energy-aware and trust-based secure routing protocol for wireless sensor networks using adaptive genetic algorithm. IEEE Access, 10, 11538\u201311550. https:\/\/doi.org\/10.1109\/ACCESS.2022.3144015","journal-title":"IEEE Access"},{"issue":"1","key":"3828_CR3","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/ACCESS.2022.3144015","volume":"116","author":"M Selvi","year":"2021","unstructured":"Selvi, M., Santhosh Kumar, S. V. N., Ganapathy, S., Ayyanar, A., Khanna Nehemiah, H., & Kannan, A. (2021). An energy efficient clustered gravitational and fuzzy based routing algorithm in WSNs. Wireless Personal Communications, 116(1), 61\u201390. https:\/\/doi.org\/10.1109\/ACCESS.2022.3144015","journal-title":"Wireless Personal Communications"},{"key":"3828_CR4","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.compeleceng.2017.06.020","volume":"66","author":"B Zhou","year":"2018","unstructured":"Zhou, B., Zhang, Q., Shi, Q., Yang, Q., Yang, P., & Yu, Y. (2018). Measuring web service security in the era of internet of things. Computers & Electrical Engineering, 66, 305\u2013315. https:\/\/doi.org\/10.1016\/j.compeleceng.2017.06.020","journal-title":"Computers & Electrical Engineering"},{"key":"3828_CR5","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.future.2017.04.039","volume":"83","author":"VA Memos","year":"2018","unstructured":"Memos, V. A., Psannis, K. E., Ishibashi, Y., Kim, B. G., & Gupta, B. B. (2018). An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework. Future Generation Computer Systems, 83, 619\u2013628. https:\/\/doi.org\/10.1016\/j.future.2017.04.039","journal-title":"Future Generation Computer Systems"},{"key":"3828_CR6","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.procs.2016.06.048","volume":"89","author":"C Kharkongor","year":"2016","unstructured":"Kharkongor, C., Chithralekha, T., & Varghese, R. (2016). A SDN controller with energy efficient routing in the Internet of Things (IoT). Procedia Computer Science, 89, 218\u2013227. https:\/\/doi.org\/10.1016\/j.procs.2016.06.048","journal-title":"Procedia Computer Science"},{"key":"3828_CR7","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.procir.2016.10.002","volume":"59","author":"S Tedeschi","year":"2017","unstructured":"Tedeschi, S., Mehnen, J., Tapoglou, N., & Roy, R. (2017). Secure IoT devices for the maintenance of machine tools. Procedia Cirp, 59, 150\u2013155. https:\/\/doi.org\/10.1016\/j.procir.2016.10.002","journal-title":"Procedia Cirp"},{"issue":"4","key":"3828_CR8","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.3390\/s21041021","volume":"21","author":"Z Nurlan","year":"2021","unstructured":"Nurlan, Z., Zhukabayeva, T., & Othman, M. (2021). EZ-SEP: Extended Z-SEP routing protocol with hierarchical clustering approach for wireless heterogeneous sensor network. Sensors, 21(4), 1021. https:\/\/doi.org\/10.3390\/s21041021","journal-title":"Sensors"},{"key":"3828_CR9","doi-asserted-by":"publisher","unstructured":"Nishikawa, Y., Sasamura, T., Ishizuka, Y., Sugimoto, S., Iwasaki, S., Wang, H., Fujishima, T., Fujimoto, T., Yamashita, K., Suzuki, T., & Kurihara, K. (2018). Design of stable wireless sensor network for slope monitoring. In 2018 IEEE Topical Conference on Wireless Sensors and Sensor Networks (WiSNet) 8\u201311. IEEE. https:\/\/doi.org\/10.1109\/WISNET.2018.8311550","DOI":"10.1109\/WISNET.2018.8311550"},{"issue":"5","key":"3828_CR10","doi-asserted-by":"publisher","first-page":"3553","DOI":"10.1007\/s11276-020-02271-w","volume":"26","author":"P Rodrigues","year":"2020","unstructured":"Rodrigues, P., & John, J. (2020). Joint trust: An approach for trust-aware routing in WSN. Wireless Networks, 26(5), 3553\u20133568. https:\/\/doi.org\/10.1007\/s11276-020-02271-w","journal-title":"Wireless Networks"},{"issue":"1","key":"3828_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-020-01884-1","volume":"2021","author":"W Fang","year":"2021","unstructured":"Fang, W., Zhang, W., Chen, W., Liu, J., Ni, Y., & Yang, Y. (2021). MSCR: Multidimensional secure clustered routing scheme in hierarchical wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2021(1), 1\u201320. https:\/\/doi.org\/10.1186\/s13638-020-01884-1","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"3","key":"3828_CR12","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1080\/0952813X.2021.1882002","volume":"34","author":"PS Khot","year":"2022","unstructured":"Khot, P. S., & Naik, U. L. (2022). Cellular automata-based optimised routing for secure data transmission in wireless sensor networks. Journal of Experimental & Theoretical Artificial Intelligence, 34(3), 431\u2013449. https:\/\/doi.org\/10.1080\/0952813X.2021.1882002","journal-title":"Journal of Experimental & Theoretical Artificial Intelligence"},{"issue":"1","key":"3828_CR13","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s11277-021-09398-9","volume":"128","author":"S Vijayalakshmi","year":"2023","unstructured":"Vijayalakshmi, S., Kavithaa, G., & Kousik, N. V. (2023). Improving data communication of wireless sensor network using energy efficient adaptive cluster-head selection algorithm for secure routing. Wireless Personal Communications, 128(1), 25\u201342. https:\/\/doi.org\/10.1007\/s11277-021-09398-9","journal-title":"Wireless Personal Communications"},{"key":"3828_CR14","doi-asserted-by":"publisher","first-page":"103037","DOI":"10.1016\/j.adhoc.2022.103037","volume":"140","author":"M Sindhuja","year":"2023","unstructured":"Sindhuja, M., Vidhya, S., Jayasri, B. S., & Shajin, F. H. (2023). Multi-objective cluster head using self-attention based progressive generative adversarial network for secured data aggregation. Ad Hoc Networks, 140, 103037. https:\/\/doi.org\/10.1016\/j.adhoc.2022.103037","journal-title":"Ad Hoc Networks"},{"key":"3828_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-022-00200-6","author":"R Das","year":"2023","unstructured":"Das, R., & Dwivedi, M. (2023). Cluster head selection and malicious node detection using large-scale energy-aware trust optimization algorithm for HWSN. Journal of Reliable Intelligent Environments. https:\/\/doi.org\/10.1007\/s40860-022-00200-6","journal-title":"Journal of Reliable Intelligent Environments"},{"key":"3828_CR16","doi-asserted-by":"publisher","first-page":"103079","DOI":"10.1016\/j.adhoc.2022.103079","volume":"141","author":"S Chaurasia","year":"2023","unstructured":"Chaurasia, S., Kumar, K., & Kumar, N. (2023). Mocraw: A meta-heuristic optimized cluster head selection-based routing algorithm for wsns. Ad Hoc Networks, 141, 103079. https:\/\/doi.org\/10.1016\/j.adhoc.2022.103079","journal-title":"Ad Hoc Networks"},{"issue":"3","key":"3828_CR17","doi-asserted-by":"publisher","first-page":"e4708","DOI":"10.1002\/ett.4708","volume":"34","author":"B Meenakshi","year":"2023","unstructured":"Meenakshi, B., & Karunkuzhali, D. (2023). Enhanced Elman spike neural network for cluster head-based energy aware routing in WSN. Transactions on Emerging Telecommunications Technologies, 34(3), e4708. https:\/\/doi.org\/10.1002\/ett.4708","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"1","key":"3828_CR18","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s11277-022-09601-5","volume":"128","author":"SG Qureshi","year":"2023","unstructured":"Qureshi, S. G., Shandilya, S. K., Satapathy, S. C., & Ficco, M. (2023). Nature-inspired decision support system for securing clusters of wireless sensor networks in advanced IoT environments. Wireless Personal Communications, 128(1), 67\u201388. https:\/\/doi.org\/10.1007\/s11277-022-09601-5","journal-title":"Wireless Personal Communications"},{"key":"3828_CR19","doi-asserted-by":"publisher","unstructured":"Satyanarayana, P., Maremalla, G.S.G., Phanindra, G., Devi, A.C.R., Lakshmi, K.A.R., & Sriramam, Y.S. (2023) Enhancement of network lifetime in wireless sensor networks using modified cluster head selection algorithm. In: 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS) (Vol. 1, pp. 364\u2013368). IEEE. https:\/\/doi.org\/10.1109\/ICACCS57279.2023.10112754","DOI":"10.1109\/ICACCS57279.2023.10112754"},{"key":"3828_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-09083-x","author":"V Kumar","year":"2021","unstructured":"Kumar, V., Jayapandian, N., & Balasubramanie, P. (2021). Improving routing data security in wireless sensor network using clustering range indicators essentials in SMDSRNGs method. Wireless Personal Communications. https:\/\/doi.org\/10.1007\/s11277-021-09083-x","journal-title":"Wireless Personal Communications"},{"issue":"01","key":"3828_CR21","first-page":"26","volume":"01","author":"MB Asha Stebi","year":"2023","unstructured":"Asha Stebi, M. B., & Jeyam, A. (2023). Estimation of household appliances and monitorization for impact reduction using electro chemical sensor. International Journal of System Design and Computing, 01(01), 26\u201334.","journal-title":"International Journal of System Design and Computing"},{"key":"3828_CR22","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2023.023515","author":"J Therase","year":"2023","unstructured":"Therase, J., Allwin, S., & Ahilan, A. (2023). Full duplex media access control protocol for multihop network computing. Computer Systems Science & Engineering. https:\/\/doi.org\/10.32604\/csse.2023.023515","journal-title":"Computer Systems Science & Engineering"},{"issue":"01","key":"3828_CR23","first-page":"1","volume":"01","author":"KB Shah","year":"2023","unstructured":"Shah, K. B., Visalakshi, S., & Panigrahi, R. (2023). Seven class solid waste management-hybrid features based deep neural network. International Journal of System Design and Computing, 01(01), 1\u201310.","journal-title":"International Journal of System Design and Computing"},{"key":"3828_CR24","doi-asserted-by":"publisher","first-page":"12333","DOI":"10.1007\/s00500-021-05927-7","volume":"25","author":"R Dhaya","year":"2021","unstructured":"Dhaya, R., Kanthavel, R., & Ahilan, A. (2021). Retracted article: Developing an energy-efficient ubiquitous agriculture mobile sensor network-based threshold built-in MAC routing protocol (TBMP). Soft Computing, 25, 12333\u201312342. https:\/\/doi.org\/10.1007\/s00500-021-05927-7","journal-title":"Soft Computing"},{"issue":"3","key":"3828_CR25","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.eij.2018.01.002","volume":"19","author":"S Kaur","year":"2018","unstructured":"Kaur, S., & Mahajan, R. (2018). Hybrid meta-heuristic optimization-based energy efficient protocol for wireless sensor networks. Egyptian Informatics Journal, 19(3), 145\u2013150. https:\/\/doi.org\/10.1016\/j.eij.2018.01.002","journal-title":"Egyptian Informatics Journal"},{"issue":"01","key":"3828_CR26","doi-asserted-by":"publisher","first-page":"2050044","DOI":"10.4015\/S1016237220500441","volume":"33","author":"A Alameen","year":"2021","unstructured":"Alameen, A., & Gupta, A. (2021). Optimization-driven deep recurrent neural network for intrusion detection and health risk assessment in wireless body sensor network. Biomedical Engineering: Applications, Basis and Communications, 33(01), 2050044. https:\/\/doi.org\/10.4015\/S1016237220500441","journal-title":"Biomedical Engineering: Applications, Basis and Communications"},{"issue":"23","key":"3828_CR27","doi-asserted-by":"publisher","first-page":"5281","DOI":"10.3390\/s19235281","volume":"19","author":"JG Lee","year":"2019","unstructured":"Lee, J. G., Chim, S., & Park, H. H. (2019). Energy-efficient cluster-head selection for wireless sensor networks using sampling-based spider monkey optimization. Sensors, 19(23), 5281. https:\/\/doi.org\/10.3390\/s19235281","journal-title":"Sensors"},{"key":"3828_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.04.003","author":"KN Dattatraya","year":"2019","unstructured":"Dattatraya, K. N., & Rao, K. R. (2019). Hybrid based cluster head selection for maximizing network lifetime and energy efficiency in WSN. Journal of King Saud University-Computer and Information Sciences. https:\/\/doi.org\/10.1016\/j.jksuci.2019.04.003","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"issue":"2","key":"3828_CR29","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1049\/iet-wss.2018.5008","volume":"9","author":"A Shankar","year":"2019","unstructured":"Shankar, A., Jaisankar, N., Khan, M. S., Patan, R., & Balamurugan, B. (2019). Hybrid model for security-aware cluster head selection in wireless sensor networks. IET Wireless Sensor Systems, 9(2), 68\u201376. https:\/\/doi.org\/10.1049\/iet-wss.2018.5008","journal-title":"IET Wireless Sensor Systems"},{"key":"3828_CR30","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.apm.2020.06.039","volume":"88","author":"Z Ding","year":"2020","unstructured":"Ding, Z., Fu, K., Deng, W., Li, J., & Zhongrong, L. (2020). A modified Artificial Bee Colony algorithm for structural damage identification under varying temperature based on a novel objective function. Applied Mathematical Modelling, 88, 122\u2013141. https:\/\/doi.org\/10.1016\/j.apm.2020.06.039","journal-title":"Applied Mathematical Modelling"},{"key":"3828_CR31","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5528584","author":"RS Rathore","year":"2021","unstructured":"Rathore, R. S., Sangwan, S., Kaiwartya, O., & Aggarwal, G. (2021). Green communication for next-generation wireless systems: Optimization strategies, challenges, solutions, and future aspects. Wireless Communications and Mobile Computing. https:\/\/doi.org\/10.1155\/2021\/5528584","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"5","key":"3828_CR32","doi-asserted-by":"publisher","first-page":"2743","DOI":"10.1007\/s42835-021-00778-6","volume":"16","author":"UM Ramisetty","year":"2021","unstructured":"Ramisetty, U. M., Chennupati, S. K., & Gundavarapu, V. N. K. (2021). Design of training sequences for multi user\u2014MIMO with accurate channel estimation considering channel reliability under perfect channel state information using cuckoo optimization. Journal of Electrical Engineering & Technology, 16(5), 2743\u20132756. https:\/\/doi.org\/10.1007\/s42835-021-00778-6","journal-title":"Journal of Electrical Engineering & Technology"},{"key":"3828_CR33","first-page":"268","volume":"34","author":"V Biswa","year":"2021","unstructured":"Biswa, V., Ali, R., Pradhan, D. K., Boro, N., Baro, T., Das, D., Subba, R., Das, P., & Das, S. (2021). Indian journal of hill farming. Indian Journal of Hill Farming, 34, 268\u2013275.","journal-title":"Indian Journal of Hill Farming"},{"key":"3828_CR34","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6939868","author":"X Zhao","year":"2022","unstructured":"Zhao, X., Zhong, W., & Navaei, Y. D. (2022). A novel energy-aware routing in wireless sensor network using clustering based on combination of multiobjective genetic and cuckoo search algorithm. Wireless Communications and Mobile Computing. https:\/\/doi.org\/10.1155\/2022\/6939868","journal-title":"Wireless Communications and Mobile Computing"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-024-03828-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-024-03828-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-024-03828-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T21:46:13Z","timestamp":1739569573000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-024-03828-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,10]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["3828"],"URL":"https:\/\/doi.org\/10.1007\/s11276-024-03828-9","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2024,10,10]]},"assertion":[{"value":"6 February 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This paper has no conflict of interest for publishing.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"My research guide reviewed and ethically approved this manuscript for publishing in this Journal.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}},{"value":"I certify that I have explained the nature and purpose of this study to the above-named individual, and I have discussed the potential benefits of this study participation. The questions the individual had about this study have been answered, and we will always be available to address future questions.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}