{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T04:50:43Z","timestamp":1774327843520,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,8,2]],"date-time":"2020-08-02T00:00:00Z","timestamp":1596326400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,2]],"date-time":"2020-08-02T00:00:00Z","timestamp":1596326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100010426","name":"UGC-DAE Consortium for Scientific Research, University Grants Commission","doi-asserted-by":"crossref","award":["3620"],"award-info":[{"award-number":["3620"]}],"id":[{"id":"10.13039\/501100010426","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s11277-020-07648-w","type":"journal-article","created":{"date-parts":[[2020,8,2]],"date-time":"2020-08-02T05:02:20Z","timestamp":1596344540000},"page":"1651-1666","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Detection of Replica Node Attack Based on Exponential Moving Average Model in Wireless Sensor Networks"],"prefix":"10.1007","volume":"115","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2657-3766","authenticated-orcid":false,"given":"S.","family":"Anitha","sequence":"first","affiliation":[]},{"given":"P.","family":"Jayanthi","sequence":"additional","affiliation":[]},{"given":"R.","family":"Thangarajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,2]]},"reference":[{"key":"7648_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2017\/8782131","volume":"2017","author":"T Andrysiak","year":"2017","unstructured":"Andrysiak, T., Saganowski, \u0141., & Kiedrowski, P. (2017). Anomaly detection in smart metering infrastructure with the use of time series analysis. Journal of Sensors, 2017, 1\u20135.","journal-title":"Journal of Sensors"},{"key":"7648_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100111","author":"J Sakhnini","year":"2019","unstructured":"Sakhnini, J., Karimipour, H., Dehghantanha, A., Parizi, R. M., & Srivastava, G. (2019). Security aspects of Internet of Things aided smart grids: A bibliometric survey. Internet of Things. https:\/\/doi.org\/10.1016\/j.iot.2019.100111.","journal-title":"Internet of Things"},{"issue":"4","key":"7648_CR3","doi-asserted-by":"crossref","first-page":"2179","DOI":"10.1007\/s11277-019-06836-7","volume":"110","author":"H Rajadurai","year":"2020","unstructured":"Rajadurai, H., & Gandhi, U. D. (2020). Fuzzy based collaborative verification system for Sybil attack detection in MANET. Wireless Personal Communications, 110(4), 2179\u20132193.","journal-title":"Wireless Personal Communications"},{"key":"7648_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/8035065","volume":"2018","author":"F Engmann","year":"2018","unstructured":"Engmann, F., Katsriku, F. A., Abdulai, J.-D., Adu-Manu, K. S., & Banaseka, F. K. (2018). Prolonging the lifetime of wireless sensor networks: A review of current techniques. Wireless Communications and Mobile Computing, 2018, 1\u201323. https:\/\/doi.org\/10.1155\/2018\/8035065.","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"2","key":"7648_CR5","first-page":"760","volume":"4","author":"N Alrajei","year":"2014","unstructured":"Alrajei, N., Corser, G., Fu, H., & Zhu, Y. (2014). Energy prediction based intrusion detection in wireless sensor networks. International Journal of Emerging Technology and Advanced Engineering, 4(2), 760\u2013767.","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"key":"7648_CR6","doi-asserted-by":"crossref","first-page":"1188","DOI":"10.1016\/j.procs.2018.04.297","volume":"131","author":"X Jinhui","year":"2018","unstructured":"Jinhui, X., Yang, T., Feiyue, Y., Leina, P., Juan, X., & Yao, H. (2018). Intrusion detection system for hybrid DoS attacks using energy trust in wireless sensor networks. Procedia computer science, 131, 1188\u20131195.","journal-title":"Procedia computer science"},{"key":"7648_CR7","doi-asserted-by":"crossref","first-page":"65450","DOI":"10.1109\/ACCESS.2020.2983091","volume":"8","author":"M Numan","year":"2020","unstructured":"Numan, M., Subhan, F., Khan, W. Z., Hakak, S., Haider, S., Reddy, G. T., et al. (2020). A systematic review on clone node detection in static wireless sensor networks. IEEE Access, 8, 65450\u201365461.","journal-title":"IEEE Access"},{"key":"7648_CR8","doi-asserted-by":"publisher","first-page":"3343","DOI":"10.1109\/ACCESS.2019.2962829","volume":"8","author":"S Pundir","year":"2020","unstructured":"Pundir, S., Wazid, M., Singh, D. P., Das, A. K., Rodrigues, J. J. P. C., & Park, Y. (2020). Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: Survey and future challenges. IEEE Access, 8, 3343\u20133363. https:\/\/doi.org\/10.1109\/ACCESS.2019.2962829.","journal-title":"IEEE Access"},{"key":"7648_CR9","doi-asserted-by":"crossref","unstructured":"Machaka, P., Bagula, A., & Nelwamondo, F. (2017). Using exponentially weighted moving average algorithm to defend against DDoS attacks. In 2016 Pattern recognition association of South Africa and robotics and mechatronics international conference (PRASA-RobMech), 2017 (pp. 1\u20136). IEEE.","DOI":"10.1109\/RoboMech.2016.7813157"},{"key":"7648_CR10","doi-asserted-by":"crossref","first-page":"117883","DOI":"10.1109\/ACCESS.2019.2937098","volume":"7","author":"H Cheng","year":"2019","unstructured":"Cheng, H., Xie, Z., Shi, Y., & Xiong, N. (2019). Multi-step data prediction in wireless sensor networks based on one-dimensional CNN and bidirectional LSTM. IEEE Access, 7, 117883\u2013117896.","journal-title":"IEEE Access"},{"key":"7648_CR11","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1016\/j.comcom.2020.01.064","volume":"152","author":"P Devi","year":"2020","unstructured":"Devi, P., & Jaison, B. (2020). Protection on wireless sensor network from clone attack using the SDN-enabled hybrid clone node detection mechanisms. Computer Communications, 152, 316\u2013322.","journal-title":"Computer Communications"},{"issue":"2","key":"7648_CR12","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1049\/iet-ifs.2012.0052","volume":"7","author":"G Han","year":"2013","unstructured":"Han, G., Jiang, J., Shen, W., Shu, L., & Rodrigues, J. (2013). IDSEP: A novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks. IET Information Security, 7(2), 97\u2013105.","journal-title":"IET Information Security"},{"issue":"1","key":"7648_CR13","first-page":"1","volume":"12","author":"Q Yu","year":"2016","unstructured":"Yu, Q., Jibin, L., & Jiang, L. (2016). An improved ARIMA-based traffic anomaly detection algorithm for wireless sensor networks. International Journal of Distributed Sensor Networks, 12(1), 1\u20139.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"7648_CR14","unstructured":"Mini, R. A., Nath, B., & Loureiro, A. A. (2002). A probabilistic approach to predict the energy consumption in wireless sensor networks. In IV Workshop de comunicao sem Fio e computao Mvel, 2002 (pp. 23\u201325)."},{"issue":"2","key":"7648_CR15","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/j.adhoc.2004.07.008","volume":"3","author":"RA Mini","year":"2005","unstructured":"Mini, R. A., do Val Machado, M., Loureiro, A. A., & Nath, B. (2005). Prediction-based energy map for wireless sensor networks. Ad Hoc Networks, 3(2), 235\u2013253.","journal-title":"Ad Hoc Networks"},{"key":"7648_CR16","doi-asserted-by":"crossref","unstructured":"Maivizhi, R., & Yogesh, P. (2020). Concealed multidimensional data aggregation in big data wireless sensor networks. In Proceedings of the 7th ACM IKDD CoDS and 25th COMAD (pp. 19\u201327).","DOI":"10.1145\/3371158.3371161"},{"issue":"12","key":"7648_CR17","doi-asserted-by":"crossref","first-page":"2542","DOI":"10.1002\/sec.373","volume":"7","author":"G Han","year":"2014","unstructured":"Han, G., Shen, W., Duong, T. Q., Guizani, M., & Hara, T. (2014). A proposed security scheme against denial of service attacks in cluster-based wireless sensor networks. Security and Communication Networks, 7(12), 2542\u20132554.","journal-title":"Security and Communication Networks"},{"issue":"6","key":"7648_CR18","doi-asserted-by":"crossref","first-page":"1691","DOI":"10.3390\/s18061691","volume":"18","author":"O Osanaiye","year":"2018","unstructured":"Osanaiye, O., Alfa, A. S., & Hancke, G. P. (2018). A statistical approach to detect jamming attacks in wireless sensor networks. Sensors, 18(6), 1691.","journal-title":"Sensors"},{"issue":"2","key":"7648_CR19","doi-asserted-by":"crossref","first-page":"023704","DOI":"10.1063\/1.5006619","volume":"10","author":"H Sharma","year":"2018","unstructured":"Sharma, H., Haque, A., & Jaffery, Z. A. (2018). Solar energy harvesting wireless sensor network nodes: A survey. Journal of Renewable and Sustainable Energy, 10(2), 023704.","journal-title":"Journal of Renewable and Sustainable Energy"},{"key":"7648_CR20","doi-asserted-by":"crossref","unstructured":"Jiang, Z., Jin, X., & Zhang, Y. (2010). A weather-condition prediction algorithm for solar-powered wireless sensor nodes. In 2010 6th international conference on wireless communications networking and mobile computing (WiCOM), 2010 (pp. 1\u20134). IEEE.","DOI":"10.1109\/WICOM.2010.5601116"},{"issue":"5","key":"7648_CR21","doi-asserted-by":"publisher","first-page":"3507","DOI":"10.1007\/s11276-020-02276-5","volume":"26","author":"M Nurgaliyev","year":"2020","unstructured":"Nurgaliyev, M., Saymbetov, A., Yashchyshyn, Y., Kuttybay, N., & Tukymbekov, D. (2020). Prediction of energy consumption for LoRa based wireless sensors network. Wireless Networks, 26(5), 3507\u20133520. https:\/\/doi.org\/10.1007\/s11276-020-02276-5.","journal-title":"Wireless Networks"},{"key":"7648_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07255-9","author":"R Priyadarshi","year":"2020","unstructured":"Priyadarshi, R., Gupta, B., & Anurag, A. (2020). Wireless sensor networks deployment: A result oriented analysis. Wireless Personal Communications. https:\/\/doi.org\/10.1007\/s11277-020-07255-9.","journal-title":"Wireless Personal Communications"},{"key":"7648_CR23","doi-asserted-by":"publisher","first-page":"2741","DOI":"10.1007\/s11277-020-07173-w","volume":"112","author":"S Dhillon","year":"2020","unstructured":"Dhillon, S., Madhu, C., Kaur, D., & Singh, S. (2020). A solar energy forecast model using neural networks: Application for prediction of power for wireless sensor networks in precision agriculture. Wireless Personal Communications, 112, 2741\u20132760. https:\/\/doi.org\/10.1007\/s11277-020-07173-w.","journal-title":"Wireless Personal Communications"},{"issue":"6","key":"7648_CR24","doi-asserted-by":"crossref","first-page":"476176","DOI":"10.1155\/2014\/476176","volume":"10","author":"M Shanmugam","year":"2014","unstructured":"Shanmugam, M., & Ramasamy, A. (2014). Sensor-based turmeric finger growth characteristics monitoring using embedded system under soil. International Journal of Distributed Sensor Networks, 10(6), 476176.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"08","key":"7648_CR25","doi-asserted-by":"crossref","first-page":"1280","DOI":"10.4236\/cs.2016.78112","volume":"7","author":"M Shanmugam","year":"2016","unstructured":"Shanmugam, M., Ramasamy, A., Paramasivam, S., & Prabhakaran, P. (2016). Monitoring the turmeric finger disease and growth characteristics using sensor based embedded system\u2014A novel method. Circuits and Systems, 7(08), 1280.","journal-title":"Circuits and Systems"},{"key":"7648_CR26","doi-asserted-by":"crossref","unstructured":"Hill, J. R., Szewczyk, A. Woo, Hollar, S. Culler, D., & Pister, K. (2000). System architecture directions for networked sensors. In Proceedings of the 9th ACM international conference on architectural support for programming languages and operating systems, 2000. (pp. 93\u2013104). New York: ACM Press.","DOI":"10.1145\/384264.379006"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07648-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07648-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07648-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T23:34:51Z","timestamp":1627860891000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07648-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,2]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["7648"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07648-w","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,2]]},"assertion":[{"value":"2 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}