{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T11:09:20Z","timestamp":1772276960209,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T00:00:00Z","timestamp":1766966400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T00:00:00Z","timestamp":1766966400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s11276-025-04071-6","type":"journal-article","created":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T05:51:15Z","timestamp":1766987475000},"page":"607-621","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Trust-aware router placement and privacy-preserving data aggregation for IoT-enabled wireless mesh communication networks"],"prefix":"10.1007","volume":"32","author":[{"given":"M.","family":"Kamesh","sequence":"first","affiliation":[]},{"given":"N.","family":"Gobalakrishnan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,29]]},"reference":[{"issue":"4","key":"4071_CR1","doi-asserted-by":"publisher","first-page":"1635","DOI":"10.1007\/s12530-024-09583-8","volume":"15","author":"Y Chai","year":"2024","unstructured":"Chai, Y., Zeng, X.-J., & Liu, Z. (2024). The future of wireless mesh network in next-generation communication: A perspective overview. Evolving Systems, 15(4), 1635\u20131648. https:\/\/doi.org\/10.1007\/s12530-024-09583-8","journal-title":"Evolving Systems"},{"key":"4071_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2025.110832","volume":"257","author":"H Dui","year":"2025","unstructured":"Dui, H., Zhai, J., & Fu, X. (2025). Attack strategies and reliability analysis of Wireless Mesh Networks considering cascading failures. Reliability Engineering & System Safety, 257, Article 110832. https:\/\/doi.org\/10.1016\/j.ress.2025.110832","journal-title":"Reliability Engineering & System Safety"},{"key":"4071_CR3","doi-asserted-by":"publisher","first-page":"83195","DOI":"10.1109\/ACCESS.2025.3569077","volume":"13","author":"A Seng","year":"2025","unstructured":"Seng, A., Trick, U., Lehmann, A., & Ghita, B. (2025). A concept for network slicing in wireless mesh networks. IEEE Access, 13, 83195\u201383218. https:\/\/doi.org\/10.1109\/ACCESS.2025.3569077","journal-title":"IEEE Access"},{"key":"4071_CR4","doi-asserted-by":"publisher","unstructured":"Fu, R., Zou, A., Chen, C., Guan, X., & Ma, Y. (2025). Mesh network scheduling based on cyber-physical sensitivity for wireless control systems. In\u00a02025 IEEE 31st real-time and embedded technology and applications symposium (RTAS)\u00a0(pp. 123-136). IEEE. https:\/\/doi.org\/10.1109\/RTAS65571.2025.00023.","DOI":"10.1109\/RTAS65571.2025.00023"},{"issue":"7","key":"4071_CR5","doi-asserted-by":"publisher","first-page":"5283","DOI":"10.1007\/s00521-022-06941-y","volume":"34","author":"SM Taleb","year":"2022","unstructured":"Taleb, S. M., Meraihi, Y., Gabis, A. B., Mirjalili, S., & Ramdane-Cherif, A. (2022). Nodes placement in wireless mesh networks using optimization approaches: A survey. Neural Computing and Applications, 34(7), 5283\u20135319. https:\/\/doi.org\/10.1007\/s00521-022-06941-y","journal-title":"Neural Computing and Applications"},{"key":"4071_CR6","doi-asserted-by":"publisher","first-page":"64807","DOI":"10.1109\/ACCESS.2024.3394907","volume":"12","author":"AP Tchinda","year":"2024","unstructured":"Tchinda, A. P., Shala, B., Lehmann, A., Ghita, B., Walker, D., & Trick, U. (2024). Energy-efficient placement of virtual network functions in a wireless mesh network. IEEE Access, 12, 64807\u201364822. https:\/\/doi.org\/10.1109\/ACCESS.2024.3394907","journal-title":"IEEE Access"},{"key":"4071_CR7","doi-asserted-by":"crossref","unstructured":"Turlykozhayeva, D., Temesheva, S., Ussipov, N., Bolysbay, A., Akhmetali, A., Akhtanov, S., & Tang, X. (2024). Experimental performance comparison of proactive routing protocols in wireless mesh network using Raspberry Pi 4. In\u00a0Telecom\u00a0(Vol. 5, No. 4, pp. 1008-1020). MDPI. [Online]. Available: https:\/\/www.mdpi.com\/2673-4001\/5\/4\/51.","DOI":"10.3390\/telecom5040051"},{"key":"4071_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.112159","volume":"166","author":"G D\u2019Angelo","year":"2024","unstructured":"D\u2019Angelo, G., & Palmieri, F. (2024). A hound-inspired pre-hybridized genetic approach for router placement in wireless mesh networks. Applied Soft Computing, 166, Article 112159. https:\/\/doi.org\/10.1016\/j.asoc.2024.112159","journal-title":"Applied Soft Computing"},{"issue":"6","key":"4071_CR9","doi-asserted-by":"publisher","first-page":"6636","DOI":"10.1109\/TDSC.2025.3588717","volume":"22","author":"Y Sun","year":"2025","unstructured":"Sun, Y., et al. (2025). PPDR: A privacy-preserving dual reputation management scheme in vehicle platoon. IEEE Transactions on Dependable and Secure Computing, 22(6), 6636\u20136652. https:\/\/doi.org\/10.1109\/TDSC.2025.3588717","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"2","key":"4071_CR10","doi-asserted-by":"publisher","first-page":"1877","DOI":"10.1109\/TVT.2023.3340723","volume":"74","author":"Z Liu","year":"2025","unstructured":"Liu, Z., et al. (2025). PPRU: A privacy-preserving reputation updating scheme for cloud-assisted vehicular networks. IEEE Transactions on Vehicular Technology, 74(2), 1877\u20131892. https:\/\/doi.org\/10.1109\/TVT.2023.3340723","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"4071_CR11","doi-asserted-by":"publisher","unstructured":"Qian, X. (2025). DMKESR: dynamic multi-parameter key exchange enhanced secure routing for wireless mesh networks.\u00a0Journal of The Institution of Engineers (India): Series B, 1-12. https:\/\/doi.org\/10.1007\/s40031-025-01223-2.","DOI":"10.1007\/s40031-025-01223-2"},{"key":"4071_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2025.103093","volume":"140","author":"S Tlili","year":"2025","unstructured":"Tlili, S., Mnasri, S., & Val, T. (2025). Edge-computing-enabled hybrid and multi-objective geographic routing for mesh IoT networks: An IMOGWO-based approach. Simulation Modelling Practice and Theory, 140, Article 103093. https:\/\/doi.org\/10.1016\/j.simpat.2025.103093","journal-title":"Simulation Modelling Practice and Theory"},{"key":"4071_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2025.111566","volume":"271","author":"L Lei","year":"2025","unstructured":"Lei, L., & Wang, X. (2025). Scaling laws of average end-to-end delay in multi-tier wireless mesh networks. Computer Networks, 271, Article 111566. https:\/\/doi.org\/10.1016\/j.comnet.2025.111566","journal-title":"Computer Networks"},{"key":"4071_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101288","volume":"27","author":"S Sakamoto","year":"2024","unstructured":"Sakamoto, S. (2024). Implementation of a Cuckoo Search intelligent simulation system for node placement problem in Wireless Mesh Networks: Performance evaluation for tuning hyperparameters Pa and \u03b3. Internet of Things, 27, Article 101288. https:\/\/doi.org\/10.1016\/j.iot.2024.101288","journal-title":"Internet of Things"},{"issue":"1","key":"4071_CR15","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s12652-021-03283-w","volume":"14","author":"NA Nouri","year":"2023","unstructured":"Nouri, N. A., Aliouat, Z., Naouri, A., & Hassak, S. A. (2023). Accelerated PSO algorithm applied to clients coverage and routers connectivity in wireless mesh networks. Journal of Ambient Intelligence and Humanized Computing, 14(1), 207\u2013221. https:\/\/doi.org\/10.1007\/s12652-021-03283-w","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"15","key":"4071_CR16","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6960","volume":"34","author":"A Singh","year":"2022","unstructured":"Singh, A., Prakash, S., & Singh, S. (2022). Optimization of reinforcement routing for wireless mesh network using machine learning and high-performance computing. Concurrency and Computation: Practice & Experience, 34(15), Article e6960. https:\/\/doi.org\/10.1002\/cpe.6960","journal-title":"Concurrency and Computation: Practice & Experience"},{"issue":"1","key":"4071_CR17","doi-asserted-by":"publisher","DOI":"10.1049\/cmu2.70011","volume":"19","author":"DA Turlykozhayeva","year":"2025","unstructured":"Turlykozhayeva, D. A., Akhtanov, S. N., Zhanabaev, Z. Z., Ussipov, N. M., & Akhmetali, A. (2025). A routing algorithm for wireless mesh network based on information entropy theory. IET Communications, 19(1), Article e70011. https:\/\/doi.org\/10.1049\/cmu2.70011","journal-title":"IET Communications"},{"issue":"1","key":"4071_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s44227-025-00061-4","volume":"13","author":"S Mahajan","year":"2025","unstructured":"Mahajan, S., Srideviponmalar, P., Harikrishnan, R., & Kotecha, K. (2025). Reinforcement learning based congestion control technique for wireless mesh networks. International Journal of Networked and Distributed Computing, 13(1), Article 20. https:\/\/doi.org\/10.1007\/s44227-025-00061-4","journal-title":"International Journal of Networked and Distributed Computing"},{"issue":"23","key":"4071_CR19","doi-asserted-by":"publisher","first-page":"24492","DOI":"10.1109\/JIOT.2022.3189081","volume":"9","author":"C He","year":"2022","unstructured":"He, C., Wang, R., Wu, D., Tan, Z., & Dai, N. (2022). Energy-aware virtual network migration for Internet of Things over fiber wireless broadband access network. IEEE Internet of Things Journal, 9(23), 24492\u201324505. https:\/\/doi.org\/10.1109\/JIOT.2022.3189081","journal-title":"IEEE Internet of Things Journal"},{"issue":"11","key":"4071_CR20","doi-asserted-by":"publisher","first-page":"8853","DOI":"10.1007\/s00521-022-06908-z","volume":"34","author":"A Layeb","year":"2022","unstructured":"Layeb, A. (2022). Tangent search algorithm for solving optimization problems. Neural Computing and Applications, 34(11), 8853\u20138884. https:\/\/doi.org\/10.1007\/s00521-022-06908-z","journal-title":"Neural Computing and Applications"},{"issue":"7","key":"4071_CR21","doi-asserted-by":"publisher","first-page":"5599","DOI":"10.1109\/JIOT.2020.3031486","volume":"8","author":"F Wei","year":"2021","unstructured":"Wei, F., Vijayakumar, P., Kumar, N., Zhang, R., & Cheng, Q. (2021). Privacy-preserving implicit authentication protocol using cosine similarity for Internet of Things. IEEE Internet of Things Journal, 8(7), 5599\u20135606. https:\/\/doi.org\/10.1109\/JIOT.2020.3031486","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"4071_CR22","doi-asserted-by":"publisher","first-page":"3723","DOI":"10.1007\/s11760-024-03036-0","volume":"18","author":"MK Morampudi","year":"2024","unstructured":"Morampudi, M. K., Gonthina, N., Bojjagani, S., Sharma, N. K., & Veeraiah, D. (2024). Reliable and privacy-preserving multi-instance iris verification using Paillier homomorphic encryption and one-digit checksum. Signal, Image and Video Processing, 18(4), 3723\u20133735. https:\/\/doi.org\/10.1007\/s11760-024-03036-0","journal-title":"Signal, Image and Video Processing"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-04071-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-025-04071-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-04071-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T06:55:46Z","timestamp":1772261746000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-025-04071-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,29]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["4071"],"URL":"https:\/\/doi.org\/10.1007\/s11276-025-04071-6","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,29]]},"assertion":[{"value":"29 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}