{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:35:46Z","timestamp":1774161346779,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,9,23]],"date-time":"2016-09-23T00:00:00Z","timestamp":1474588800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Policy-guided (Industry - Academy - Research Cooperative) Project","award":["BY2016030-16"],"award-info":[{"award-number":["BY2016030-16"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s11277-016-3755-1","type":"journal-article","created":{"date-parts":[[2016,9,23]],"date-time":"2016-09-23T08:52:46Z","timestamp":1474620766000},"page":"1911-1925","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Routing Technology in Wireless Sensor Network Based on Ant Colony Optimization Algorithm"],"prefix":"10.1007","volume":"95","author":[{"given":"Zheng","family":"Enxing","sequence":"first","affiliation":[]},{"given":"Liu","family":"Ranran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,23]]},"reference":[{"issue":"4","key":"3755_CR1","first-page":"1290","volume":"19","author":"C Jiming","year":"2006","unstructured":"Jiming, C., Ruizhong, L., & Youxian, S. (2006). Communication system of WSN. Chinese Journal of Sensors and Actuators, 19(4), 1290\u20131295.","journal-title":"Chinese Journal of Sensors and Actuators"},{"key":"3755_CR2","unstructured":"Rongquan, W., & Liqun, Q. (2006). Summary of WSN. Pervasive Computing and New Software Technology\u2014Third Yangtze River Delta Computer Technology Forum."},{"issue":"04","key":"3755_CR3","first-page":"24","volume":"18","author":"L Dongxin","year":"2005","unstructured":"Dongxin, L., Wenlong, X., & Licun, W. (2005). Wireless sensor network. Industrial Control Computer, 18(04), 24\u201326.","journal-title":"Industrial Control Computer"},{"issue":"4","key":"3755_CR4","first-page":"621","volume":"43","author":"D Fang","year":"2009","unstructured":"Fang, D., & Peiliang, Q. (2009). Random routing protocol for wireless sensor network. Journal of Zhejiang University (Engineering Edition), 43(4), 621\u2013625.","journal-title":"Journal of Zhejiang University (Engineering Edition)"},{"issue":"6","key":"3755_CR5","first-page":"9","volume":"21","author":"K Wei","year":"2005","unstructured":"Wei, K. (2005). Key technology and research difficulty of WSN. Telecommunication Science, 21(6), 9\u201312.","journal-title":"Telecommunication Science"},{"issue":"5","key":"3755_CR6","first-page":"1077","volume":"18","author":"L Jianzhong","year":"2007","unstructured":"Jianzhong, L. (2007). Preface of wireless sensor network. Journal of Software, 18(5), 1077\u20131079.","journal-title":"Journal of Software"},{"issue":"1","key":"3755_CR7","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1360\/crad20050121","volume":"42","author":"C Li","year":"2005","unstructured":"Li, C., Hailing, J., Yong, M., et al. (2005). Research progress of wireless sensor network. Computer Research and Development, 42(1), 163\u2013174.","journal-title":"Computer Research and Development"},{"issue":"1","key":"3755_CR8","first-page":"11","volume":"45","author":"L Jianzhong","year":"2008","unstructured":"Jianzhong, L., & Hong, G. (2008). Research progress of wireless sensor network. Computer Research and Development, 45(1), 11\u201315.","journal-title":"Computer Research and Development"},{"key":"3755_CR9","first-page":"74","volume":"7","author":"W Guangbin","year":"2004","unstructured":"Guangbin, W., & Changyin, L. (2004). Energy efficiency of wireless sensor network. Journal of Transducer Technology, 7, 74\u201376.","journal-title":"Journal of Transducer Technology"},{"key":"3755_CR10","volume-title":"Principle and application of ant colony algorithm","author":"D Haibin","year":"2005","unstructured":"Haibin, D. (2005). Principle and application of ant colony algorithm. Beijing: Science Press."},{"key":"3755_CR11","volume-title":"Intelligent ant colony algorithm and its application","author":"Q Wu","year":"2004","unstructured":"Wu, Q., & Wang, L. (2004). Intelligent ant colony algorithm and its application. Shanghai: Shanghai Scientific and Technological Education Publishing House."},{"key":"3755_CR12","unstructured":"Liu, Z., Kwiat kowska, M. Z., & Constantinou, C. (2004). A swarm intelligence routing algorithm for manets. In Proceedings of the IASTED international conference on communications internet and information technology, St. Thomas, USA."},{"key":"3755_CR13","unstructured":"Liu, Z., Kwiat kowska, M. Z., & Constantinou, C. (2005). A biologically inspired congestion control routing algorithm for MANETs. In Third IEEE international conference on pervasive computing and communications workshops (pp. 226\u2013231)."},{"key":"3755_CR14","doi-asserted-by":"crossref","unstructured":"Hussein, O., & Saadawi, T. (2003). Ant routing algorithm for mobile ad-hoc networks (ARAMA). In Proceedings of the 2003 IEEE international conference on performance, computing, and communications conference (pp. 281\u2013290).","DOI":"10.1109\/PCCC.2003.1203709"},{"issue":"11","key":"3755_CR15","doi-asserted-by":"crossref","first-page":"1946","DOI":"10.1360\/jos161946","volume":"16","author":"Q Zhang","year":"2005","unstructured":"Zhang, Q., Xie, Z., Ling, B., Sun, W., & Bole, S. (2005). Maximum lifetime data collection algorithm for wireless sensor networks. Journal of Software, 16(11), 1946\u20131957.","journal-title":"Journal of Software"},{"issue":"21","key":"3755_CR16","first-page":"4","volume":"41","author":"M Yajie","year":"2005","unstructured":"Yajie, M., Dasheng, Z., Yuming, W., & Jianhua, H. (2005). Sensor network life extension algorithm based on power control. Computer Engineering and Applications, 41(21), 4\u20137.","journal-title":"Computer Engineering and Applications"},{"key":"3755_CR17","first-page":"26","volume":"2","author":"L Jianrong","year":"2005","unstructured":"Jianrong, L., & Yangli, W. (2005). Scalability implementation algorithm for wireless sensor networks. Electronic Science and Technology, 2, 26\u201329.","journal-title":"Electronic Science and Technology"},{"issue":"11","key":"3755_CR18","first-page":"22","volume":"54","author":"A Datta","year":"2005","unstructured":"Datta, A. (2005). A fault-tolerant protocol for energy efficient permutation routing in wireless networks. IEEE Transactions on Communications, 54(11), 22\u201331.","journal-title":"IEEE Transactions on Communications"},{"key":"3755_CR19","doi-asserted-by":"crossref","unstructured":"Farivar, R., Fazeli, M., & Miremadi, S. G. (2005). Directed flooding: Fault-tolerant routing protocol for wireless sensor networks. In Proceedings of the 2005 systems communications (ICWOS).","DOI":"10.1109\/ICW.2005.41"},{"key":"3755_CR20","doi-asserted-by":"crossref","unstructured":"Hussein, O., & Saadawi, T. (2003). Ant routing algorithm for mobile ad-hoc networks (ARAMA). In Proceedings of the 2003 IEEE international conference on performance, computing, and communications conference (pp. 281\u2013290).","DOI":"10.1109\/PCCC.2003.1203709"},{"issue":"1","key":"3755_CR21","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s11277-016-3344-3","volume":"90","author":"X Fan","year":"2016","unstructured":"Fan, X., Du, F., & Wei, W. (2016). A geography-based void-bypassing routing protocol for wireless sensor network. Wireless Personal Communications, 90(1), 259\u2013280. doi:\n                        10.1007\/s11277-016-3344-3\n                        \n                    .","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"3755_CR22","doi-asserted-by":"publisher","first-page":"1391","DOI":"10.1007\/s11277-016-3327-4","volume":"89","author":"F Li","year":"2016","unstructured":"Li, F., Han, Y., & Jin, C. (2016). Practical signcryption for secure communication of wireless sensor networks. Wireless Personal Communications, 89(4), 1391\u20131412. doi:\n                        10.1007\/s11277-016-3327-4\n                        \n                    .","journal-title":"Wireless Personal Communications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-016-3755-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3755-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3755-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T09:24:54Z","timestamp":1501493094000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-016-3755-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,23]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["3755"],"URL":"https:\/\/doi.org\/10.1007\/s11277-016-3755-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,23]]}}}