{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:47:43Z","timestamp":1769924863304,"version":"3.49.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,6,20]],"date-time":"2020-06-20T00:00:00Z","timestamp":1592611200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,20]],"date-time":"2020-06-20T00:00:00Z","timestamp":1592611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s11277-020-07579-6","type":"journal-article","created":{"date-parts":[[2020,6,20]],"date-time":"2020-06-20T10:03:02Z","timestamp":1592647382000},"page":"415-437","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Trust and Opportunity Based Routing Framework in Wireless Sensor Network Using Hybrid Optimization Algorithm"],"prefix":"10.1007","volume":"115","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6605-3904","authenticated-orcid":false,"given":"Pritesh A.","family":"Patil","sequence":"first","affiliation":[]},{"given":"Rajkumar S.","family":"Deshpande","sequence":"additional","affiliation":[]},{"given":"Pradeep B.","family":"Mane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,20]]},"reference":[{"issue":"2","key":"7579_CR1","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/TDSC.2011.58","volume":"9","author":"G Zhan","year":"2012","unstructured":"Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 9(2), 184\u2013197.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"9","key":"7579_CR2","first-page":"15","volume":"20","author":"C Townsend","year":"2005","unstructured":"Townsend, C., & Arms, S. (2005). Wireless sensor networks. MicroStrain, 20(9), 15\u201321.","journal-title":"MicroStrain"},{"key":"7579_CR3","doi-asserted-by":"crossref","unstructured":"Zahedi, A., & Parma, F. (2018). An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-to-Peer Networking and Applications, 1\u201310.","DOI":"10.1007\/s12083-018-0654-0"},{"issue":"2","key":"7579_CR4","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/TVT.2006.889570","volume":"56","author":"JG Choi","year":"2007","unstructured":"Choi, J. G., & Bahk, S. (2007). Cell-throughput analysis of the proportional fair scheduler in the single-cell environment. IEEE Transactions on Vehicular Technology, 56(2), 766\u2013778.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"7579_CR5","doi-asserted-by":"publisher","first-page":"9599","DOI":"10.1109\/ACCESS.2017.2706973","volume":"5","author":"D Qin","year":"2017","unstructured":"Qin, D., Yang, S., Jia, S., Zhang, Y., Ma, J., & Ding, Q. (2017). Research on trust sensing based secure routing mechanism for wireless sensor network. IEEE Access, 5, 9599\u20139609.","journal-title":"IEEE Access"},{"key":"7579_CR6","doi-asserted-by":"crossref","unstructured":"Saidi, H., Gretete, D., & Adnane, A. (2017). Opportunistic routing in wireless sensors networks. In Proceedings of the 2nd international conference on computing and wireless communication systems (p. 69).","DOI":"10.1145\/3167486.3167558"},{"issue":"2","key":"7579_CR7","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/TNET.2014.2387440","volume":"24","author":"D Liu","year":"2016","unstructured":"Liu, D., et al. (2016). Duplicate detectable opportunistic forwarding in duty-cycled wireless sensor networks. IEEE\/ACM Transactions on Networking, 24(2), 662\u2013673.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"7579_CR8","doi-asserted-by":"crossref","unstructured":"Shelke, M., Malhotra, A., & Mahalle, P. N. (2018). Congestion-aware opportunistic routing protocol in wireless sensor networks. In Smart computing and informatics (pp. 63\u201372). Berlin: Springer.","DOI":"10.1007\/978-981-10-5544-7_7"},{"issue":"12","key":"7579_CR9","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1109\/TMC.2009.82","volume":"8","author":"E Rozner","year":"2009","unstructured":"Rozner, E., Seshadri, J., Mehta, Y. A., & Qiu, L. (2009). SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks. IEEE Transactions on Mobile Computing, 8(12), 1622.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"1","key":"7579_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1515\/fcds-2016-0001","volume":"41","author":"AK Das","year":"2016","unstructured":"Das, A. K., Chaki, R., & Dey, K. N. (2016). Secure energy efficient routing protocol for wireless sensor network. Foundations of Computing and Decision Sciences, 41(1), 3\u201327.","journal-title":"Foundations of Computing and Decision Sciences"},{"issue":"9","key":"7579_CR11","doi-asserted-by":"publisher","first-page":"2013","DOI":"10.1109\/TIFS.2016.2570740","volume":"11","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013\u20132027.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7579_CR12","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1186\/s13638-018-1174-6","volume":"1","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Zhang, M., & Shu, W. (2018). An emerging intelligent optimization algorithm based on trust sensing model for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 1, 145.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"4","key":"7579_CR13","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1504\/IJSNET.2016.079176","volume":"21","author":"AK Das","year":"2016","unstructured":"Das, A. K., Chaki, R., & Dey, K. N. (2016). Cluster based energy aware routing scheme CBEARS for wireless sensor network. International Journal of Sensor Network, 21(4), 262\u2013272.","journal-title":"International Journal of Sensor Network"},{"issue":"4","key":"7579_CR14","doi-asserted-by":"publisher","first-page":"2561","DOI":"10.1007\/s11277-019-06697-0","volume":"109","author":"D Sinha","year":"2019","unstructured":"Sinha, D., Kumari, R., & Tripathi, S. (2019). Semisupervised classification based clustering approach in WSN for forest fire detection. Wireless Personal Communications, 109(4), 2561\u20132605.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"7579_CR15","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1007\/s12351-016-0251-z","volume":"18","author":"GG Wang","year":"2016","unstructured":"Wang, G. G., Deb, S., Zhao, X., & Cui, Z. (2016). A new monarch butterfly optimization with an improved crossover operator. Operational Research, 18(3), 731\u2013755.","journal-title":"Operational Research"},{"key":"7579_CR16","doi-asserted-by":"crossref","unstructured":"Bahrami, M., Bozorg-Haddad, O., & Chu, X. (2018). Cat Swarm Optimization (CSO) algorithm. In Advanced optimization by nature-inspired algorithms (pp. 9\u201318).","DOI":"10.1007\/978-981-10-5221-7_2"},{"key":"7579_CR17","unstructured":"Johnson, D. B., Maltz, D. A., & Broch, J. (2001). DSR: The dynamic source routing protocol for multihop wireless ad hoc networks. Ad Hoc Networking."},{"key":"7579_CR18","doi-asserted-by":"crossref","unstructured":"Perkins, C. E., & Bhagwat, P. (1994). Highly dynamic destination sequenced distance-vector routing (dsdv) for mobile computers. In Proceedings of ACM SIGCOMM.","DOI":"10.1145\/190314.190336"},{"key":"7579_CR19","doi-asserted-by":"crossref","unstructured":"Perkins, C. E., & Royer, E. M. (1999). Ad hoc on-demand distance vector routing. In Proceedings of the workshop on mobile computing systems and applications.","DOI":"10.1109\/MCSA.1999.749281"},{"key":"7579_CR20","doi-asserted-by":"crossref","unstructured":"Draves, R., Padhye, J., & Zill, B. (2004). Comparison of routing metrics for multi-hop wireless networks. In Proceedings of ACM SIGCOMM.","DOI":"10.1145\/1015467.1015483"},{"issue":"3","key":"7579_CR21","doi-asserted-by":"publisher","first-page":"52","DOI":"10.5121\/ijnsa.2010.2304","volume":"2","author":"T Zahariadis","year":"2011","unstructured":"Zahariadis, T., Leligou, H., Karkazis, P., Trakadas, P., Papaefstathiou, I., Vangelatos, C., et al. (2011). Design and implementation of a trust-aware routing protocol for Largewsns. International Journal of Network Security & Its Applications, 2(3), 52\u201368.","journal-title":"International Journal of Network Security & Its Applications"},{"key":"7579_CR22","doi-asserted-by":"publisher","first-page":"21658","DOI":"10.1109\/ACCESS.2018.2827082","volume":"6","author":"CM Yu","year":"2018","unstructured":"Yu, C. M., & Ku, M. L. (2018). Joint hybrid transmission and adaptive routing for lifetime extension of WSNS. IEEE Access, 6, 21658\u201321667.","journal-title":"IEEE Access"},{"issue":"1","key":"7579_CR23","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s11277-008-9596-9","volume":"51","author":"G F\u00e9lix","year":"2009","unstructured":"F\u00e9lix, G., Gregorio, M., P\u00e9rez, M., & Antonio, F. (2009). TACS, a trust model for P2P networks. Wireless Personal Communications, 51(1), 153\u2013164.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"7579_CR24","doi-asserted-by":"publisher","first-page":"3705","DOI":"10.1007\/s11277-017-4694-1","volume":"97","author":"X Gu","year":"2017","unstructured":"Gu, X., Wang, J., Qiu, J., & Jiang, Z. (2017). Self-recommendation mechanism in trust calculation among nodes in WSN. Wireless Personal Communications, 97(3), 3705\u20133723.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"7579_CR25","doi-asserted-by":"publisher","first-page":"5137","DOI":"10.1007\/s11277-017-4772-4","volume":"97","author":"N Karthik","year":"2017","unstructured":"Karthik, N., & Ananthanarayana, V. S. (2017). A hybrid trust management scheme for wireless sensor networks. Wireless Personal Communications, 97(4), 5137\u20135170.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"7579_CR26","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s11277-017-5070-x","volume":"100","author":"V Kshirsagar","year":"2018","unstructured":"Kshirsagar, V., Kanthe, A. M., & Simunic, D. (2018). Trust based detection and elimination of packet drop attack in the mobile ad-hoc networks. Wireless Personal Communications, 100(2), 311\u2013320.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"7579_CR27","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1109\/TDSC.2011.57","volume":"9","author":"A Das","year":"2012","unstructured":"Das, A., & Islam, M. M. (2012). SecuredTrust: A dynamic trust computation model for secured communication in multiagent systems. IEEE Transactions on Dependable and Secure Computing, 9(2), 261\u2013274.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"12","key":"7579_CR28","doi-asserted-by":"publisher","first-page":"1406","DOI":"10.1049\/iet-com.2017.1279","volume":"12","author":"RM Chintalapalli","year":"2018","unstructured":"Chintalapalli, R. M., & Ananthula, V. R. (2018). M-LionWhale: Multi-objective optimisationmodel for secure routing in mobile ad-hocnetwork. IET Communications, 12(12), 1406\u20131415.","journal-title":"IET Communications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07579-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07579-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07579-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,19]],"date-time":"2021-06-19T23:26:12Z","timestamp":1624145172000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07579-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,20]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["7579"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07579-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,20]]},"assertion":[{"value":"20 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}