{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T00:25:40Z","timestamp":1774743940849,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11277-019-06788-y","type":"journal-article","created":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T17:03:49Z","timestamp":1570035829000},"page":"1637-1658","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":122,"title":["QoS Aware Trust Based Routing Algorithm for Wireless Sensor Networks"],"prefix":"10.1007","volume":"110","author":[{"given":"Thangaramya","family":"Kalidoss","sequence":"first","affiliation":[]},{"given":"Logambigai","family":"Rajasekaran","sequence":"additional","affiliation":[]},{"given":"Kulothungan","family":"Kanagasabai","sequence":"additional","affiliation":[]},{"given":"Ganapathy","family":"Sannasi","sequence":"additional","affiliation":[]},{"given":"Arputharaj","family":"Kannan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,1]]},"reference":[{"issue":"3","key":"6788_CR1","first-page":"1444","volume":"26","author":"S Munuswamy","year":"2018","unstructured":"Munuswamy, S., Saravanakumar, J. M., Sannasi, G., Harichandran, K. N., & Arputharaj, K. (2018). Virtual force-based intelligent clustering for energy-efficient routing in mobile wireless sensor networks. Turkish Journal of Electrical Engineering & Computer Sciences,26(3), 1444\u20131452.","journal-title":"Turkish Journal of Electrical Engineering & Computer Sciences"},{"issue":"2","key":"6788_CR2","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/s11276-014-0801-3","volume":"21","author":"A Ayyasamy","year":"2015","unstructured":"Ayyasamy, A., & Venkatachalapathy, K. (2015). Context aware adaptive fuzzy based QoS routing scheme for streaming services over MANETs. Wireless Networks,21(2), 421\u2013430.","journal-title":"Wireless Networks"},{"key":"6788_CR3","doi-asserted-by":"crossref","unstructured":"Logambigai, R., & Kannan, A. (2014). QEER: QoS aware energy efficient routing protocol for wireless sensor networks. In IEEE 6th international conference on advanced computing (ICoAC) (pp. 57\u201360).","DOI":"10.1109\/ICoAC.2014.7229745"},{"key":"6788_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-02073-9","author":"S Viswanathan","year":"2019","unstructured":"Viswanathan, S., & Kannan, A. (2019). Elliptic key cryptography with Beta Gamma functions for secure routing in wireless sensor networks. Wireless Networks. \nhttps:\/\/doi.org\/10.1007\/s11276-019-02073-9\n\n.","journal-title":"Wireless Networks"},{"issue":"4","key":"6788_CR5","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.swevo.2011.06.004","volume":"1","author":"AA Baraa","year":"2011","unstructured":"Baraa, A. A. (2011). Energy-aware evolutionary routing protocol for dynamic clustering of wireless sensor networks. Swarm and Evolutionary Computation,1(4), 195\u2013203.","journal-title":"Swarm and Evolutionary Computation"},{"issue":"4","key":"6788_CR6","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1109\/TC.2012.31","volume":"62","author":"LA Villas","year":"2013","unstructured":"Villas, L. A., Boukerche, A., Ramos, H. S., de Oliveira, H. A. B. F., de Araujo, R. B., & Loureiro, A. A. F. (2013). DRINA: A lightweight and reliable routing approach for in-network aggregation in wireless sensor networks. IEEE Transactions on Computers,62(4), 676\u2013689.","journal-title":"IEEE Transactions on Computers"},{"key":"6788_CR7","doi-asserted-by":"crossref","unstructured":"Nakamura, E. F., de Oliveira, H. A., Pontello, L. F., & Loureiro, A. A. F. (2006). On demand role assignment for event detection in sensor networks. In 11th IEEE symposium on computers and communications (ISCC\u201906), Sardinia, Italy (pp. 941\u2013947).","DOI":"10.1109\/ISCC.2006.110"},{"key":"6788_CR8","unstructured":"Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2010). Energy-efficient communication protocol for wireless microsensor networks. In Annual Hawaii international conference, system sciences (p. 10)."},{"issue":"4","key":"6788_CR9","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/TMC.2004.41","volume":"3","author":"O Younis","year":"2004","unstructured":"Younis, O., & Fahmy, S. (2004). HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing,3(4), 366\u2013379.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"6","key":"6788_CR10","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1016\/S1007-0214(11)70075-X","volume":"16","author":"MN Rahman","year":"2011","unstructured":"Rahman, M. N., & Matin, M. A. (2011). Efficient algorithm for prolonging network lifetime of wireless sensor network. Tsinghua Science and Technology,16(6), 561\u2013568.","journal-title":"Tsinghua Science and Technology"},{"key":"6788_CR11","doi-asserted-by":"crossref","unstructured":"Mathapati, B. S., Patil, S. R., & Mytri, V. D. (2012). A cluster based energy efficient reliable routing protocol for wireless sensor networks. In Proceedings on 1st international conference, ET2ECN (pp. 1\u20136).","DOI":"10.1109\/ET2ECN.2012.6470116"},{"key":"6788_CR12","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.engappai.2014.04.009","volume":"33","author":"P Kuila","year":"2014","unstructured":"Kuila, P., & Jana, P. K. (2014). Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach. Engineering Applications of Artificial Intelligence,33, 127\u2013140.","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"6788_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10776-014-0258-4","volume":"22","author":"R Logambigai","year":"2015","unstructured":"Logambigai, R., & Kannan, A. (2015). Fuzzy logic based unequal clustering for wireless sensor networks. Wireless Networks,22, 1\u201313.","journal-title":"Wireless Networks"},{"issue":"10","key":"6788_CR14","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A Wood","year":"2002","unstructured":"Wood, A., & Stankovic, J. (2002). Denial of service in sensor networks. Computer,35(10), 54\u201362.","journal-title":"Computer"},{"issue":"5","key":"6788_CR15","doi-asserted-by":"publisher","first-page":"210","DOI":"10.3923\/ijscomp.2011.210.215","volume":"6","author":"K Kulothungan","year":"2011","unstructured":"Kulothungan, K., Ganapathy, S., Indra Gandhi, P., & Yogesh, P. (2011). Intelligent secured fault tolerant routing in wireless sensor networks using clustering approach. International Journal of Soft Computing,6(5), 210\u2013215.","journal-title":"International Journal of Soft Computing"},{"issue":"1","key":"6788_CR16","first-page":"1","volume":"271","author":"S Ganapathy","year":"2013","unstructured":"Ganapathy, S., Kulothungan, K., Muthuraj Kumar, S., & Vijayalakshmi, M. (2013). Intelligent feature selection and classification techniques for intrusion detection in networks: A survey. EURASIP Journal on Wireless Communication and Networking,271(1), 1\u201316.","journal-title":"EURASIP Journal on Wireless Communication and Networking"},{"issue":"4","key":"6788_CR17","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1007\/s11276-017-1549-3","volume":"24","author":"SVNS Kumar","year":"2018","unstructured":"Kumar, S. V. N. S., & Palanichamy, Y. (2018). Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wireless Networks,24(4), 1343\u20131360.","journal-title":"Wireless Networks"},{"issue":"2","key":"6788_CR18","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/TDSC.2011.58","volume":"9","author":"G Zhan","year":"2012","unstructured":"Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing,9(2), 184\u2013197.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"4","key":"6788_CR19","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1007\/s11277-019-06155-x","volume":"105","author":"M Selvi","year":"2019","unstructured":"Selvi, M., Thangaramya, K., Ganapathy, S., Kulothungan, K., Nehemiah, H. K., & Kannan, A. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communications,105(4), 1475\u20131490.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"6788_CR20","doi-asserted-by":"publisher","first-page":"146","DOI":"10.7763\/JACN.2015.V3.157","volume":"3","author":"BM Thippeswamy","year":"2015","unstructured":"Thippeswamy, B. M., Reshma, S., Tejaswi, V., Shaila, K., Venugopal, K. R., & Patnaik, L. M. (2015). STEAR: Secure trust-aware energy-efficient adaptive routing in wireless sensor networks. Journal of Advances in Computer Networks,3(2), 146\u2013149.","journal-title":"Journal of Advances in Computer Networks"},{"issue":"3","key":"6788_CR21","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/s11277-019-06132-4","volume":"105","author":"P Sethuraman","year":"2019","unstructured":"Sethuraman, P., Tamizharasan, P. S., & Arputharaj, K. (2019). Fuzzy genetic elliptic curve Diffie Hellman algorithm for secured communication in networks. Wireless Personal Communications,105(3), 993\u20131007.","journal-title":"Wireless Personal Communications"},{"key":"6788_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/209436","volume":"10","author":"J Duan","year":"2014","unstructured":"Duan, J., Yang, D., Zhu, H., Zhang, S., & Zhao, J. (2014). TSRF: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks,10, 1\u201314.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"3","key":"6788_CR23","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TNSM.2011.072611.100080","volume":"8","author":"W Gu","year":"2011","unstructured":"Gu, W., Dutta, N., Chellappan, S., & Bai, X. (2011). Providing end-to-end secure communications in wireless sensor networks. IEEE Transactions on Network and Service Management,8(3), 205\u2013218.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"10","key":"6788_CR24","doi-asserted-by":"publisher","first-page":"2941","DOI":"10.1109\/JSEN.2012.2205674","volume":"12","author":"S Murthy","year":"2012","unstructured":"Murthy, S., D\u2019Souza, R. J., & Varaprasad, G. (2012). Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks. IEEE Transactions on Sensors Journal,12(10), 2941\u20132949.","journal-title":"IEEE Transactions on Sensors Journal"},{"issue":"4","key":"6788_CR25","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1109\/JCN.2013.000073","volume":"15","author":"S Ganesh","year":"2013","unstructured":"Ganesh, S., & Amutha, R. (2013). Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms. Journal of Communications and Networks,15(4), 422\u2013429.","journal-title":"Journal of Communications and Networks"},{"issue":"4","key":"6788_CR26","doi-asserted-by":"publisher","first-page":"1140","DOI":"10.1109\/TPDS.2013.138","volume":"26","author":"MM Mahmoud","year":"2015","unstructured":"Mahmoud, M. M., Lin, X., & Shen, X. S. (2015). Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Transactions on Parallel and Distributed Systems,26(4), 1140\u20131153.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"3","key":"6788_CR27","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1109\/JSYST.2013.2260626","volume":"8","author":"S Li","year":"2014","unstructured":"Li, S., Zhao, S., Wang, X., Zhang, K., & Li, L. (2014). Adaptive and secure load-balancing routing protocol for service-oriented wireless sensor networks. IEEE Systems Journal,8(3), 858\u2013867.","journal-title":"IEEE Systems Journal"},{"issue":"1","key":"6788_CR28","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.comcom.2006.08.006","volume":"30","author":"S-B Lee","year":"2006","unstructured":"Lee, S.-B., & Choi, Y.-H. (2006). A secure alternate path routing in sensor networks. Computer Communications,30(1), 153\u2013165.","journal-title":"Computer Communications"},{"issue":"9","key":"6788_CR29","doi-asserted-by":"publisher","first-page":"2013","DOI":"10.1109\/TIFS.2016.2570740","volume":"11","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security,11(9), 2013\u20132027.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"7","key":"6788_CR30","doi-asserted-by":"publisher","first-page":"1442","DOI":"10.1109\/TIFS.2015.2414399","volume":"10","author":"H Xiong","year":"2015","unstructured":"Xiong, H., & Qin, Z. (2015). Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Transactions on Information Forensics and Security,10(7), 1442\u20131455.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"6788_CR31","doi-asserted-by":"publisher","first-page":"9293","DOI":"10.1109\/ACCESS.2016.2645452","volume":"4","author":"CA Kerrache","year":"2016","unstructured":"Kerrache, C. A., Calafate, C. T., Cano, J. C., Lagraa, N., & Manzoni, P. (2016). Trust management for vehicular networks: An adversary-oriented overview. IEEE Access,4, 9293\u20139307.","journal-title":"IEEE Access"},{"key":"6788_CR32","unstructured":"Hamdane, B., Boussada, R., Elhdhili, M. E., & El Fatmi, S. G. (2017). Hierarchical identity based cryptography for security and trust in named data networking. In 2017 IEEE 26th international conference on enabling technologies: Infrastructure for collaborative enterprises (pp. 226\u2013231)."},{"key":"6788_CR33","doi-asserted-by":"crossref","unstructured":"Selvi, M., Logambigai, R., Ganapathy, S., Ramesh, L. S., Nehemiah, H. K., Arputharaj, K. (2016). Fuzzy temporal approach for energy efficient routing in WSN. In Proceedings of the international conference on informatics and analytics (pp. 117\u2013122).","DOI":"10.1145\/2980258.2982109"},{"key":"6788_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1191-y","author":"M Selvi","year":"2017","unstructured":"Selvi, M., Velvizhy, M., Ganapathy, S., Nehemiah, H. K., & Kannan, A. (2017). A rule based delay constrained energy efficient routing technique for wireless sensor networks. Cluster Computing. \nhttps:\/\/doi.org\/10.1007\/s10586-017-1191-y\n\n.","journal-title":"Cluster Computing"},{"issue":"2","key":"6788_CR35","doi-asserted-by":"publisher","first-page":"1753","DOI":"10.1007\/s11277-017-4266-4","volume":"96","author":"S Muthurajkumar","year":"2017","unstructured":"Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., & Kannan, A. (2017). An intelligent secured and energy efficient routing algorithm for MANETs. Wireless Personal Communications,96(2), 1753\u20131769.","journal-title":"Wireless Personal Communications"},{"key":"6788_CR36","doi-asserted-by":"publisher","first-page":"2550","DOI":"10.1109\/ACCESS.2017.2672827","volume":"5","author":"IA Umar","year":"2017","unstructured":"Umar, I. A., Hanapi, Z. M., Sali, A., & Zulkarnain, Z. A. (2017). TruFiX: A configurable trust-based cross-layer protocol for wireless sensor networks. IEEE Access,5, 2550\u20132562.","journal-title":"IEEE Access"},{"issue":"4","key":"6788_CR37","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/TPDS.2014.2318296","volume":"26","author":"D Tang","year":"2015","unstructured":"Tang, D., Li, T., Ren, J., & Jie, W. (2015). Cost-aware secure routing (CASER) protocol design for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems,26(4), 960\u2013973.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"6788_CR38","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.comnet.2019.01.024","volume":"151","author":"K Thangaramya","year":"2019","unstructured":"Thangaramya, K., Kulothungan, K., Logambigai, R., Selvi, M., Ganapathy, S., & Kannan, A. (2019). Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT. Computer Networks,151, 211\u2013223.","journal-title":"Computer Networks"},{"key":"6788_CR39","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.procs.2012.06.035","volume":"10","author":"R Mhemed","year":"2012","unstructured":"Mhemed, R., Aslam, N., Phillips, W., & Comeau, F. (2012). An energy efficient fuzzy logic cluster formation protocol in wireless sensor networks. Procedia Computer Science,10, 255\u2013262.","journal-title":"Procedia Computer Science"},{"issue":"4","key":"6788_CR40","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"WB Heinzelman","year":"2002","unstructured":"Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications,1(4), 660\u2013670.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"6788_CR41","unstructured":"Guo, Q., Sun, D., Chang, G., Sun, L., & Wang, X. (2011). Modeling and evaluation of trust in cloud computing environments. In IEEE 3rd international conference on advanced computer control (ICACC 2011) (pp. 112\u2013116)."},{"key":"6788_CR42","doi-asserted-by":"publisher","first-page":"1078","DOI":"10.1016\/j.comcom.2012.09.002","volume":"36","author":"H Xia","year":"2013","unstructured":"Xia, H., Jia, Z., Ju, L., Li, X., & Sha, E. H. (2013). Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Computer Communications,36, 1078\u20131093.","journal-title":"Computer Communications"},{"issue":"11","key":"6788_CR43","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1145\/182.358434","volume":"26","author":"JF Allen","year":"1983","unstructured":"Allen, J. F. (1983). Maintaining knowledge about temporal intervals. Communications of the ACM,26(11), 832\u2013843.","journal-title":"Communications of the ACM"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06788-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-019-06788-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06788-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T23:49:08Z","timestamp":1601423348000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-019-06788-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,1]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["6788"],"URL":"https:\/\/doi.org\/10.1007\/s11277-019-06788-y","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,1]]},"assertion":[{"value":"1 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}