{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T07:31:35Z","timestamp":1776843095358,"version":"3.51.2"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,3,16]],"date-time":"2025-03-16T00:00:00Z","timestamp":1742083200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,16]],"date-time":"2025-03-16T00:00:00Z","timestamp":1742083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s11276-025-03920-8","type":"journal-article","created":{"date-parts":[[2025,3,16]],"date-time":"2025-03-16T18:32:46Z","timestamp":1742149966000},"page":"3297-3313","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Multi-objective optimal 4-phase RPl routing technique using chimp sine cosine algorithm for IoT system"],"prefix":"10.1007","volume":"31","author":[{"given":"Shashidhar","family":"Gurav","sequence":"first","affiliation":[]},{"given":"Leena","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"N.","family":"Raghava Rao","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Funk","sequence":"additional","affiliation":[]},{"given":"Kalyani","family":"Dasari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,16]]},"reference":[{"issue":"3","key":"3920_CR1","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s12599-015-0383-3","volume":"57","author":"F Wortmann","year":"2015","unstructured":"Wortmann, F., & Fl\u00fcchter, K. (2015). Internet of things. Business & Information Systems Engineering, 57(3), 221\u2013224.","journal-title":"Business & Information Systems Engineering"},{"key":"3920_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2016\/2081902","volume":"2016","author":"M Carlos-Mancilla","year":"2016","unstructured":"Carlos-Mancilla, M., L\u00f3pez-Mellado, E., & Siller, M. (2016). Wireless sensor networks formation: approaches and techniques. Journal of Sensors, 2016, 1\u201318.","journal-title":"Journal of Sensors"},{"key":"3920_CR3","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s11518-021-5480-x","volume":"30","author":"U Gain","year":"2021","unstructured":"Gain, U. (February 2021). Applying frameworks for cognitive services in IIoT. Journal of Systems Science and Systems Engineering, 30, 59\u201384.","journal-title":"Journal of Systems Science and Systems Engineering"},{"issue":"7","key":"3920_CR4","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645\u20131660.","journal-title":"Future Generation Computer Systems"},{"key":"3920_CR5","unstructured":"El Emary, I.M. and Ramakrishnan, S. eds., \u201cWireless sensor networks: from theory to applications\u201d, CRC press, 2019."},{"key":"3920_CR6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139030960","volume-title":"Principles of wireless sensor networks","author":"MS Obaidat","year":"2014","unstructured":"Obaidat, M. S., & Misra, S. (2014). Principles of wireless sensor networks. Cambridge University Press."},{"issue":"10","key":"3920_CR7","doi-asserted-by":"publisher","first-page":"2364","DOI":"10.1109\/TCYB.2015.2443062","volume":"45","author":"X Liu","year":"2015","unstructured":"Liu, X. (2015). A deployment strategy for multiple types of requirements in wireless sensor networks. IEEE Transactions on Cybernetics, 45(10), 2364\u20132376.","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"2","key":"3920_CR8","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/s10766-018-0586-6","volume":"48","author":"FA Khan","year":"2020","unstructured":"Khan, F. A., Ahmad, A., & Imran, M. (2020). Energy optimization of PR-LEACH routing scheme using distance awareness in internet of things networks. International Journal of Parallel Programming, 48(2), 244\u2013263.","journal-title":"International Journal of Parallel Programming"},{"key":"3920_CR9","doi-asserted-by":"crossref","unstructured":"Levis, P., Clausen, T., Hui, J., Gnawali, O., Ko, J. (2011). The trickle algorithm. Internet Engineering Task Force, RFC6206.","DOI":"10.17487\/rfc6206"},{"key":"3920_CR10","doi-asserted-by":"crossref","unstructured":"Kharrufa, H., Al-Kashoash, H., Al-Nidawi, Y., Mosquera, M. Q., Kemp, A.H. (2017). Dynamic RPL for multi-hop routing in IoT applications. In Proceedings of 2017 13th annual conference on wireless on-demand network systems and services (WONS) (pp 100\u2013103).","DOI":"10.1109\/WONS.2017.7888753"},{"issue":"1","key":"3920_CR11","first-page":"43","volume":"2","author":"P Suma","year":"2019","unstructured":"Suma, P., Nagaraju, O., & Hussain, M. A. (2019). LA based optimal path selection for mobile adhoc network. Journal of Networking and Communication Systems, 2(1), 43\u201350.","journal-title":"Journal of Networking and Communication Systems"},{"key":"3920_CR12","unstructured":"Trakadas, P., Zahariadis, T. (2012). Design guidelines for routing metrics composition in LLN. Internet Engineering Task Force (IETF) draft."},{"issue":"6","key":"3920_CR13","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1007\/s11276-012-0532-2","volume":"19","author":"P Karkazis","year":"2013","unstructured":"Karkazis, P., Trakadas, P., Leligou, H. C., Sarakis, L., Papaefstathiou, I., & Zahariadis, T. (2013). Evaluating routing metric composition approaches for QoS differentiation in low power and lossy networks. Wireless Networks, 19(6), 1269\u20131284.","journal-title":"Wireless Networks"},{"issue":"6","key":"3920_CR14","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1049\/iet-net.2018.5167","volume":"8","author":"IS Alsukayti","year":"2019","unstructured":"Alsukayti, I. S., & Alreshoodi, M. (2019). Toward an understanding of recent developments in RPL routing. IET Networks, 8(6), 356\u2013366.","journal-title":"IET Networks"},{"key":"3920_CR15","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/j.future.2024.05.032","volume":"159","author":"A Verma","year":"2024","unstructured":"Verma, A., Verma, S. K., Pandey, A. C., Grover, J., & Sharma, G. (2024). Li-MSD: A lightweight mitigation solution for DAO insider attack in RPL-based IoT. Future Generation Computer Systems, 159, 327\u2013339.","journal-title":"Future Generation Computer Systems"},{"key":"3920_CR16","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1016\/j.future.2021.07.013","volume":"125","author":"G Violettas","year":"2021","unstructured":"Violettas, G., Simoglou, G., Petridou, S., & Mamatas, L. (December 2021). A softwarized intrusion detection system for the RPL-based internet of things networks. Future Generation Computer Systems, 125, 698\u2013714.","journal-title":"Future Generation Computer Systems"},{"key":"3920_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.61185\/SMIJ.2023.55102","volume":"5","author":"S Saber","year":"2023","unstructured":"Saber, S., & Salem, S. (2023). High-performance technique for estimating the unknown parameters of photovoltaic cells and modules based on improved spider wasp optimizer. Sustainable Machine Intelligence Journal, 5, 1\u20132.","journal-title":"Sustainable Machine Intelligence Journal"},{"key":"3920_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.61185\/SMIJ.2023.44101","volume":"4","author":"S Salem","year":"2023","unstructured":"Salem, S. (2023). An improved binary quadratic interpolation optimization for 0\u20131 Knapsack problems. Sustainable Machine Intelligence Journal, 4, 1.","journal-title":"Sustainable Machine Intelligence Journal"},{"key":"3920_CR19","doi-asserted-by":"crossref","unstructured":"Punia, P., Raj, A., Kumar, P. (2024). An enhanced beluga whale optimization algorithm for engineering optimization problems. Journal of Systems Science and Systems Engineering.","DOI":"10.1007\/s11518-024-5608-x"},{"key":"3920_CR20","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/s11518-023-5585-5","volume":"33","author":"W Ba","year":"2023","unstructured":"Ba, W., Chen, B., & Li, Q. (2023). Comprehensive evaluation method for traffic flow data quality based on grey correlation analysis and particle swarm optimization. Journal of Systems Science and Systems Engineering, 33, 106\u2013128.","journal-title":"Journal of Systems Science and Systems Engineering"},{"key":"3920_CR21","doi-asserted-by":"crossref","unstructured":"Sousa, N., Sobral, J.V., Rodrigues, J.J., Rab\u00ealo, R.A. and Solic, P. (2017). ERAOF: A new RPL protocol objective function for Internet of Things applications. In Proceedings of 2017 2nd international multidisciplinary conference on computer and energy science (SpliTech) (pp. 1\u20135).","DOI":"10.1109\/SpliTech.2016.7555943"},{"issue":"5","key":"3920_CR22","doi-asserted-by":"publisher","first-page":"436","DOI":"10.17485\/IJST\/v17i5.2627","volume":"17","author":"PK Shashidhar","year":"2024","unstructured":"Shashidhar, P. K., Thanuja, T. C., & Kunabeva, R. (2024). Adaptive RPL routing optimization model for multimedia data transmission using IOT. Indian Journal of Science and Technology, 17(5), 436\u2013450.","journal-title":"Indian Journal of Science and Technology"},{"issue":"18","key":"3920_CR23","doi-asserted-by":"publisher","first-page":"10366","DOI":"10.3390\/app131810366","volume":"13","author":"M Rouissat","year":"2023","unstructured":"Rouissat, M., Belkheir, M., Alsukayti, I. S., & Mokaddem, A. (2023). a lightweight mitigation approach against a new inundation attack in RPL-based IoT networks. Applied Sciences, 13(18), 10366.","journal-title":"Applied Sciences"},{"issue":"8","key":"3920_CR24","doi-asserted-by":"publisher","first-page":"e4171","DOI":"10.1002\/ett.4171","volume":"32","author":"S Sennan","year":"2021","unstructured":"Sennan, S., Somula, R., Luhach, A. K., Deverajan, G. G., Alnumay, W., Jhanjhi, N. Z., Ghosh, U., & Sharma, P. (2021). Energy efficient optimal parent selection based routing protocol for Internet of Things using firefly optimization algorithm. Transactions on Emerging Telecommunications Technologies, 32(8), e4171.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"2","key":"3920_CR25","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1049\/iet-net.2019.0152","volume":"9","author":"S Hoghooghi","year":"2020","unstructured":"Hoghooghi, S., & Javidan, R. (2020). Proposing a new method for improving RPL to support mobility in the Internet of things. IET Networks, 9(2), 48\u201355.","journal-title":"IET Networks"},{"key":"3920_CR26","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1080\/23335777.2021.1933194","volume":"9","author":"B Rakesh","year":"2021","unstructured":"Rakesh, B. (2021). Novel authentication and secure trust based RPL routing in mobile sink supported Internet of Things. Cyber-Physical Systems, 9, 43\u201376.","journal-title":"Cyber-Physical Systems"},{"key":"3920_CR27","doi-asserted-by":"publisher","first-page":"103622","DOI":"10.1016\/j.csi.2022.103622","volume":"82","author":"A Seyfollahi","year":"2022","unstructured":"Seyfollahi, A., Moodi, M., & Ghaffari, A. (2022). MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications. Computer Standards & Interfaces, 82, 103622.","journal-title":"Computer Standards & Interfaces"},{"key":"3920_CR28","doi-asserted-by":"publisher","first-page":"58836","DOI":"10.1109\/ACCESS.2024.3391918","volume":"12","author":"S Remya","year":"2024","unstructured":"Remya, S., Pillai, M. J., Arjun, C., Ramasubbareddy, S., & Cho, Y. (2024). Enhancing security in LLNs using a hybrid trust-based intrusion detection system for RPL. IEEE Access, 12, 58836\u201358850.","journal-title":"IEEE Access"},{"key":"3920_CR29","doi-asserted-by":"crossref","unstructured":"Nguyen, T.D., Khan, J.Y., Ngo, D.T. (2017). An effective energy-harvesting-aware routing algorithm for WSN-based IoT applications. In Proceedings of IEEE international conference on communications (ICC) (pp. 1\u20136).","DOI":"10.1109\/ICC.2017.7996888"},{"issue":"4","key":"3920_CR30","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1007\/s12083-016-0441-8","volume":"10","author":"AK Yadav","year":"2017","unstructured":"Yadav, A. K., & Tripathi, S. (2017). QMRPRNS: Design of QoS multicast routing protocol using reliable node selection scheme for MANETs. Peer-to-Peer Networking and Applications, 10(4), 897.","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"3","key":"3920_CR31","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1007\/s11276-015-1010-4","volume":"22","author":"M Salehi","year":"2016","unstructured":"Salehi, M., Boukerche, A., Darehshoorzadeh, A., & Mammeri, A. (2016). Towards a novel trust-based opportunistic routing protocol for wireless networks. Wireless Networks, 22(3), 927\u2013943.","journal-title":"Wireless Networks"},{"key":"3920_CR32","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.pmcj.2013.06.004","volume":"13","author":"B Wang","year":"2014","unstructured":"Wang, B., Chen, X., & Chang, W. (2014). A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive and Mobile Computing, 13, 164\u2013180.","journal-title":"Pervasive and Mobile Computing"},{"issue":"4","key":"3920_CR33","doi-asserted-by":"publisher","first-page":"211","DOI":"10.3991\/ijoe.v14i04.8590","volume":"14","author":"J Zhu","year":"2018","unstructured":"Zhu, J. (2018). Wireless sensor network technology based on security trust evaluation model. International Journal of Online Engineering, 14(4), 211\u2013226.","journal-title":"International Journal of Online Engineering"},{"key":"3920_CR34","doi-asserted-by":"publisher","first-page":"113338","DOI":"10.1016\/j.eswa.2020.113338","volume":"149","author":"M Khishe","year":"2020","unstructured":"Khishe, M., & Mosavi, M. R. (2020). Chimp optimization algorithm. Expert Systems with Applications, 149, 113338.","journal-title":"Expert Systems with Applications"},{"key":"3920_CR35","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.knosys.2015.12.022","volume":"96","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili, S. (2016). SCA: A sine cosine algorithm for solving optimization problems. Knowledge-based Systems, 96, 120\u2013133.","journal-title":"Knowledge-based Systems"},{"key":"3920_CR36","doi-asserted-by":"crossref","unstructured":"Kassab, A. S., Seddik, K. G., Elezabi, A., Soltan, A. (2020). Realistic wireless smart-meter network optimization using composite RPL metric. In Proceedings of 8th international conference on smart grid (pp 109\u2013114).","DOI":"10.1109\/icSmartGrid49881.2020.9144938"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-03920-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-025-03920-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-03920-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T02:20:55Z","timestamp":1745288455000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-025-03920-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,16]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["3920"],"URL":"https:\/\/doi.org\/10.1007\/s11276-025-03920-8","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,16]]},"assertion":[{"value":"27 November 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}