{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T22:35:07Z","timestamp":1761863707508},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,5,25]],"date-time":"2017-05-25T00:00:00Z","timestamp":1495670400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s11277-017-4417-7","type":"journal-article","created":{"date-parts":[[2017,5,25]],"date-time":"2017-05-25T03:58:04Z","timestamp":1495684684000},"page":"4781-4798","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["An Intelligent Energy Aware Secured Algorithm for Routing in Wireless Sensor Networks"],"prefix":"10.1007","volume":"96","author":[{"given":"K.","family":"Selvakumar","sequence":"first","affiliation":[]},{"given":"L.","family":"Sairamesh","sequence":"additional","affiliation":[]},{"given":"A.","family":"Kannan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,25]]},"reference":[{"key":"4417_CR1","doi-asserted-by":"crossref","first-page":"3255","DOI":"10.1109\/TVT.2012.2205284","volume":"61\u20137","author":"A Liu","year":"2012","unstructured":"Liu, A., Zheng, Z., Zhang, C., Chen, Z., & Shen, X. (2012). Secure and energy-efficient disjoint multipath routing for WSNs. IEEE Transactions on Vehicular Technology, 61\u20137, 3255\u20133265.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"4417_CR2","doi-asserted-by":"crossref","first-page":"3111","DOI":"10.1109\/TCOMM.2011.082911.100280A","volume":"59\u201311","author":"B Maham","year":"2011","unstructured":"Maham, B., Hj\u00f8rungnes, A., & Narasimhan, R. (2011). Energy-efficient space-time coded cooperation in outage-restricted multihop wireless networks. IEEE Transactions on Communications, 59\u201311, 3111\u20133121.","journal-title":"IEEE Transactions on Communications"},{"key":"4417_CR3","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1109\/TMC.2010.36","volume":"9\u20137","author":"T Shu","year":"2010","unstructured":"Shu, T., Krunz, M., & Liu, S. (2010). Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Transactions on Mobile Computing, 9\u20137, 941\u2013954.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"4417_CR4","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/TNET.2010.2089803","volume":"19\u20132","author":"M Elhawary","year":"2011","unstructured":"Elhawary, M., & Haas, Z. J. (2011). Energy-efficient protocol for cooperative networks. IEEE\/ACM Transactions on Networking, 19\u20132, 561\u2013574.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"4417_CR5","doi-asserted-by":"crossref","first-page":"1546","DOI":"10.1109\/TMC.2010.259","volume":"10\u201311","author":"J Zhu","year":"2011","unstructured":"Zhu, J., & Wang, X. (2011). Model and protocol for energy-efficient routing over mobile ad hoc networks. IEEE Transactions on Mobile Computing, 10\u201311, 1546\u20131557.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"4417_CR6","first-page":"1","volume":"3\u20135","author":"S Jerusha","year":"2012","unstructured":"Jerusha, S., Kulothungan, K., & Kannan, A. (2012). Location aware cluster based routing in wireless sensor networks. International Journal of Computer & Communication Technology, 3\u20135, 1\u20136.","journal-title":"International Journal of Computer & Communication Technology"},{"key":"4417_CR7","doi-asserted-by":"crossref","first-page":"1360","DOI":"10.1016\/j.camwa.2012.01.038","volume":"65","author":"P Vijayakumar","year":"2013","unstructured":"Vijayakumar, P., Bose, S., & Kannan, A. (2013). Centralized key distribution protocol using the greatest common divisor method. Computers & Mathematics with Applications, 65, 1360\u20131368.","journal-title":"Computers & Mathematics with Applications"},{"key":"4417_CR8","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1016\/j.comcom.2007.04.006","volume":"30\u20139","author":"S Guo","year":"2007","unstructured":"Guo, S., & Yang, O. (2007). Energy-aware multicasting in wireless ad hoc networks: A survey and discussion. Computer Communications, 30\u20139, 2129\u20132148.","journal-title":"Computer Communications"},{"key":"4417_CR9","doi-asserted-by":"crossref","first-page":"1463","DOI":"10.1109\/TKDE.2011.76","volume":"24\u20138","author":"Y-C Fan","year":"2012","unstructured":"Fan, Y.-C., & Chen, A. L. P. (2012). Energy efficient schemes for accuracy-guaranteed sensor data aggregation using scalable counting. IEEE Transactions on Knowledge and Data Engineering, 24\u20138, 1463\u20131477.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"4417_CR10","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1109\/SURV.2012.062612.00084","volume":"15\u20132","author":"NA Pantazis","year":"2013","unstructured":"Pantazis, N. A., Nikolidakis, S. A., & Vergados, D. D. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 15\u20132, 551\u2013591.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"4417_CR11","doi-asserted-by":"crossref","first-page":"1078","DOI":"10.1016\/j.comcom.2012.09.002","volume":"36","author":"H Xia","year":"2013","unstructured":"Xia, H., Jia, Z., Lei, J., Li, X., & Sha, E. H.-M. (2013). Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Computer Communications, 36, 1078\u20131093.","journal-title":"Computer Communications"},{"key":"4417_CR12","first-page":"305","volume":"24\u20132","author":"YL Sun","year":"2006","unstructured":"Sun, Y. L., Yu, W., Han, Z., & Liu, K. J. R. (2006). Information theoretic framework of trust modeling evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24\u20132, 305\u2013319.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"4417_CR13","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1049\/iet-ifs.2009.0140","volume":"4\u20134","author":"X Li","year":"2010","unstructured":"Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET-Information Security, 4\u20134, 212\u2013223.","journal-title":"IET-Information Security"},{"key":"4417_CR14","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1049\/iet-wss.2011.0042","volume":"1\u20134","author":"H Xia","year":"2011","unstructured":"Xia, H., Jia, Z., Ju, L., & Zhu, Y. (2011). Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory. IET Wireless Sensor Systems, 1\u20134, 248\u2013266.","journal-title":"IET Wireless Sensor Systems"},{"key":"4417_CR15","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-0450-1","volume-title":"Pattern recognition with fuzzy objective function algorithms","author":"JC Bezdek","year":"1981","unstructured":"Bezdek, J. C. (1981). Pattern recognition with fuzzy objective function algorithms. New York, MA: Plenum Press."},{"key":"4417_CR16","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1109\/TFUZZ.2004.840099","volume":"13\u20134","author":"NR Pal","year":"2005","unstructured":"Pal, N. R., Pal, K., Keller, J. M., & Bezdek, J. C. (2005). Possibilistic fuzzy c-means clustering algorithm. IEEE Transactions on Fuzzy Systems, 13\u20134, 517\u2013530.","journal-title":"IEEE Transactions on Fuzzy Systems"},{"key":"4417_CR17","first-page":"179","volume":"6\u20132","author":"T Haider","year":"2009","unstructured":"Haider, T., & Yusuf, M. (2009). A fuzzy approach to energy optimized routing for wireless sensor networks. The International Arab Journal of Information Technology, 6\u20132, 179\u2013188.","journal-title":"The International Arab Journal of Information Technology"},{"key":"4417_CR18","doi-asserted-by":"crossref","first-page":"143","DOI":"10.3906\/elk-1202-83","volume":"22","author":"A Erdem","year":"2014","unstructured":"Erdem, A., & Gundem, T. I. (2014). M-FDBSCAN: A multicore density-based uncertain data clustering algorithm. Turkish Journal of Electrical Engineering & Computer Sciences, 22, 143\u2013154.","journal-title":"Turkish Journal of Electrical Engineering & Computer Sciences"},{"key":"4417_CR19","first-page":"611","volume":"23\u20135","author":"K Hussain","year":"2013","unstructured":"Hussain, K., Abdullah, A. H., Awan, K. M., Ahsan, F., & Hussain, A. (2013). Cluster head election schemes for WSN and MANET: A survey. World Applied Sciences Journal, 23\u20135, 611\u2013620.","journal-title":"World Applied Sciences Journal"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4417-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4417-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4417-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,19]],"date-time":"2017-09-19T13:43:19Z","timestamp":1505828599000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4417-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,25]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["4417"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4417-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,25]]}}}