{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T10:16:39Z","timestamp":1778148999590,"version":"3.51.4"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T00:00:00Z","timestamp":1609545600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T00:00:00Z","timestamp":1609545600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11277-020-07882-2","type":"journal-article","created":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T14:02:38Z","timestamp":1609596158000},"page":"545-559","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["Automata Based Hybrid PSO\u2013GWO Algorithm for Secured Energy Efficient Optimal Routing in Wireless Sensor Network"],"prefix":"10.1007","volume":"117","author":[{"given":"S.","family":"Prithi","sequence":"first","affiliation":[]},{"given":"S.","family":"Sumathi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,2]]},"reference":[{"key":"7882_CR1","unstructured":"Mainetti, L., Patrono, L., & Vilei, A. (2011). Evolution of wireless sensor networks towards the internet of things: A survey. In International conference on software, telecommunications and computer networks (SoftCOM)\u00a0(pp. 1\u20136)."},{"key":"7882_CR2","unstructured":"Furtado, H., & Trobec, R. (2011). Applications of wireless sensors in medicine. In Proceedings of the 34th international convention\u00a0(pp. 257\u2013261)."},{"key":"7882_CR3","doi-asserted-by":"crossref","unstructured":"Wang, N., Zhou, Y., & Xiang, W. (2016). An energy efficient clustering protocol for lifetime maximization in wireless sensor networks. In Proceedings of the IEEE conference on global communications (GLOBECO) Dec. 4\u20138 (pp. 1\u20136)","DOI":"10.1109\/GLOCOM.2016.7841588"},{"issue":"2","key":"7882_CR4","doi-asserted-by":"publisher","first-page":"728","DOI":"10.1109\/JSEN.2012.2225423","volume":"13","author":"SS Wang","year":"2013","unstructured":"Wang, S. S., & Chen, Z. P. (2013). LCM: A link-aware clustering mechanism for energy-efficient routing in wireless sensor networks. IEEE Sensors Journal, 13(2), 728\u2013736.","journal-title":"IEEE Sensors Journal"},{"key":"7882_CR5","doi-asserted-by":"crossref","unstructured":"Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of IEEE international conference on system sciences\u00a0Jan. 7, 2000 (p. 10).","DOI":"10.1109\/HICSS.2000.926982"},{"issue":"4","key":"7882_CR6","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/TMC.2004.41","volume":"3","author":"KO Younis","year":"2004","unstructured":"Younis, K. O., & Fahmy, S. (2004). HEED: A hybrid, energy-efficient distributed clustering approach for ad hoc sensor networks. Mobile Computing, IEEE Transactions on, 3(4), 366\u2013379.","journal-title":"Mobile Computing, IEEE Transactions on"},{"key":"7882_CR7","first-page":"99","volume":"3","author":"M Ye","year":"2007","unstructured":"M Ye, C Li, & , G Chen, J Wu\u00a0(2007) An energy efficient clustering scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks, 3, 99\u2013119.","journal-title":"Ad Hoc & Sensor Wireless Networks"},{"key":"7882_CR8","unstructured":"Depedri, A., Zanella, A., & Verdone, R. (2003). An energy efficient protocol for wireless sensor networks. In Proceedings of AINS\u00a0(pp. 1\u20136)."},{"key":"7882_CR9","unstructured":"Fan, X., & Song, Y. (2007). Improvement on LEACH protocol of wireless sensor network. In Proceeding of the international conference on sensor technologies and applications\u00a0(pp. 260\u2013264)."},{"key":"7882_CR10","unstructured":"Han, L. (2011). LEACH-HIR: An energy efficient routing algorithm for Heterogenous WSN. In IEEE international conference on intelligent computing and intelligent systems (ICIS)\u00a0(Vol. 2, pp. 507\u2013511)."},{"key":"7882_CR11","unstructured":"Yi, G., Guiling, S., Weixiang, L., & Yong, P. (2009). Recluster-LEACH: A recluster control algorithm based on density for wireless sensor network. In: 2nd international conference on power electronics and intelligent transportation system\u00a0(Vol. 3, pp. 198\u2013202)."},{"key":"7882_CR12","unstructured":"Smaragdakis, G., Matta, I., & Bestavros, A. (2004). SEP: A stable election protocol for clustered heterogeneous wireless sensor networks. In Proceedings of international workshop sensor and actor network protocols and applications, Boston, MA (pp. 251\u2013261)."},{"key":"7882_CR13","doi-asserted-by":"crossref","unstructured":"Mahmood, D., Javaid, N., Mahmood, S., Qureshi, S., Memon, A. M., & Zaman, T. (2013). MODLEACH: A variant of LEACH for WSNs. In BWCCA \u201813 proceedings of the 2013 eighth international conference on broadband and wireless computing, communication and applications.","DOI":"10.1109\/BWCCA.2013.34"},{"issue":"5","key":"7882_CR14","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1016\/j.comcom.2009.11.008","volume":"33","author":"Y-H Zhu","year":"2010","unstructured":"Zhu, Y.-H., Wu, W.-D., Pan, J., & Tang, Y.-P. (2010). An energy-efficient data gathering algorithm to prolong lifetime of wireless sensor networks. Computer Communications, 33(5), 639\u2013647.","journal-title":"Computer Communications"},{"issue":"6","key":"7882_CR15","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1016\/S1007-0214(11)70075-X","volume":"16","author":"MN Rahman","year":"2011","unstructured":"Rahman, M. N., & Matin (2011). Efficient algorithm for prolonging network lifetime of wireless sensor network. Tsinghua Science and Technology, 16(6), 561\u2013568.","journal-title":"Tsinghua Science and Technology"},{"key":"7882_CR16","doi-asserted-by":"crossref","unstructured":"Li, X., Gang, W., Zongqi, L., & Yanyan, Z. (2013). An energy-efficient routing protocol based on particle swarm clustering algorithm and inter-cluster routing algorithm for WSN. In 2013 25th Chinese control and decision conference (CCDC) (pp.\u00a04029\u20134033).","DOI":"10.1109\/CCDC.2013.6561655"},{"key":"7882_CR17","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.ieri.2014.09.063","volume":"10","author":"Z Ye","year":"2014","unstructured":"Ye, Z., & Mohamadian, H. (2014). Adaptive clustering based dynamic routing of wireless sensor networks via generalized ant colony optimization. IERI Procedia, 10, 2\u201310.","journal-title":"IERI Procedia"},{"key":"7882_CR18","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.engappai.2014.04.009","volume":"33","author":"P Kuila","year":"2014","unstructured":"Kuila, P., & Jana, P. K. (2014). Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach. Engineering Applications of Artificial Intelligence 33, 127\u2013140.","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"7882_CR19","doi-asserted-by":"crossref","unstructured":"Becchi, M., & Crowley, P. (2007). A hybrid finite automaton for practical deep packet inspection. In Proceedings of the ACM conference on emerging networking experiments and technologies.","DOI":"10.1145\/1364654.1364656"},{"key":"7882_CR20","unstructured":"Manikandan, A., & Rajarajachozhan, C. (2017). Artificial bee colony for socially aware networking. Journal of Chemical and Pharmaceutical Sciences, Special Issue (2), 299\u2013301."},{"key":"7882_CR21","unstructured":"Snort: Light weight intrusion detection for networks. Columbia, MD: Sourcefire, Inc.\u00a0http:\/\/www.snort.org\/."},{"key":"7882_CR22","unstructured":"Bro: A system for detecting network intruders in real time. Berkeley, CA: Lawrence Berkeley National Laboratory. http:\/\/www.bro-ids.org."},{"key":"7882_CR23","unstructured":"William, J., & Eatherton, W. (2005). An encoded version of reg-ex database from Cisco systems provided for research purposes."},{"key":"7882_CR24","doi-asserted-by":"crossref","unstructured":"Ficara, D., Giordano, S., Procissi, G., Vitucci, F., Antichi, G., & Pietro, A. D. (2008). An improved DFA for fast regular expression matching. In Proceedings of the ACM SIGCOMM computer communication review, 2008\u00a0(No. 38, Issue 5, pp.\u00a029\u201340).","DOI":"10.1145\/1452335.1452339"},{"key":"7882_CR25","doi-asserted-by":"crossref","unstructured":"Smith, R., Estan, C., Jha, S., & Kong, S. (2008). Deflating the big bang: Fast and scalable deep packet inspection with extended finite automata. In Proceedings of the ACM SIGCOMM 2008 conference on applications, technologies, architectures, and protocols for computer communications\u00a0(pp.\u00a0207\u2013218).","DOI":"10.1145\/1402958.1402983"},{"key":"7882_CR26","doi-asserted-by":"crossref","unstructured":"Antichi, G., Di Pietro, A., Ficara, D., Giordano, S., Procissi, G., & Vitucci, F. (2009). Second-order differential encoding of deterministic finite automata. In Proceedings of the 28th IEEE conference on global telecommunications (pp.\u00a02838\u20132843).","DOI":"10.1109\/GLOCOM.2009.5425895"},{"key":"7882_CR27","unstructured":"Sumathi, S., &\u00a0 Prithi, S. (2017). A survey on recent DFA compression techniques for deep packet inspection in network intrusion detection system. Journal of Electrical Engineering, 17(3)."},{"key":"7882_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2013.04.002i","author":"P Kuila","year":"2013","unstructured":"Kuila, P., Gupta, S. K., & Jana,\u00a0P. K. (2013). A novel evolutionary approach for load balanced clustering problem for wireless sensor networks. Swarm and Evolutionary Computation. https:\/\/doi.org\/10.1016\/j.swevo.2013.04.002i.","journal-title":"Swarm and Evolutionary Computation"},{"key":"7882_CR29","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1016\/j.comcom.2007.10.020","volume":"31","author":"CP Low","year":"2008","unstructured":"Low, C. P., Fang, C., Ng, J. M., & Ang, Y. H. (2008). Efficient load-balancing clustering algorithms for wireless sensor networks. Computer Communications, 31, 750\u2013759.","journal-title":"Computer Communications"},{"key":"7882_CR30","doi-asserted-by":"publisher","first-page":"3451","DOI":"10.1016\/j.comcom.2008.05.038","volume":"31","author":"B Ataul","year":"2008","unstructured":"B. Ataul, et al. (2008). Clustering strategies for improving the lifetime of two-tired sensor networks. Computer Communications, 31, 3451\u20133459.","journal-title":"Computer Communications"},{"key":"7882_CR31","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.engappai.2014.04.009","volume":"33","author":"P Kuila","year":"2014","unstructured":"Kuila, P., & Jana, P. K.\u00a0(2014). Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach. Engineering Applications of Artificial Intelligence, 33, 127\u2013140.","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"7882_CR32","doi-asserted-by":"publisher","first-page":"102024","DOI":"10.1016\/j.adhoc.2019.102024","volume":"97","author":"S Prithi","year":"2020","unstructured":"Prithi, S., & Sumathi, S. (2020). LD2FA-PSO: A novel learning dynamic deterministic finite automata with PSO algorithm for secured energy efficient routing in wireless sensor network. Ad Hoc Networks, 97, 102024.","journal-title":"Ad Hoc Networks"},{"key":"7882_CR33","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili, S.,\u00a0Mirjalili,\u00a0S. M., &\u00a0 Lewis,\u00a0A. (2014). Grey wolf optimizer. Advances in Engineering Software, 69, 46\u201361.","journal-title":"Advances in Engineering Software"},{"key":"7882_CR34","doi-asserted-by":"crossref","unstructured":"Kennedy,\u00a0J., &\u00a0Eberhart,\u00a0R. (1995).\u00a0Particle swarm optimization. In Proceedings of the 1995 IEEE international conference on neural network.","DOI":"10.1109\/ICNN.1995.488968"},{"key":"7882_CR35","doi-asserted-by":"crossref","unstructured":"Singh, S., & Kushwah, R. S. (2016). Energy efficient approach for intrusion detection system for WSN by applying optimal clustering and genetic algorithm. In Proceedings of the international conference on advances in information communication technology and computing- AICTC\u201916.","DOI":"10.1145\/2979779.2979840"},{"key":"7882_CR36","doi-asserted-by":"publisher","unstructured":"Riecker, M., Biedermann, S., Bansarkhani, R. E., & Hollick, M. (2014). Lightweight energy consumption-based intrusion detection system for wireless sensor networks, special issue paper. Berlin: Springer. https:\/\/doi.org\/10.1007\/s10207-014-0241-1.","DOI":"10.1007\/s10207-014-0241-1"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07882-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-020-07882-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07882-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,3]],"date-time":"2021-03-03T19:19:37Z","timestamp":1614799177000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-020-07882-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,2]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["7882"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07882-2","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,2]]},"assertion":[{"value":"29 October 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}