{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T00:51:32Z","timestamp":1774140692497,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,8,8]],"date-time":"2021-08-08T00:00:00Z","timestamp":1628380800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,8]],"date-time":"2021-08-08T00:00:00Z","timestamp":1628380800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s11277-021-08760-1","type":"journal-article","created":{"date-parts":[[2021,8,8]],"date-time":"2021-08-08T11:02:21Z","timestamp":1628420541000},"page":"2081-2100","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Enhanced WSN Routing Protocol for Internet of Things to Process Multimedia Big Data"],"prefix":"10.1007","volume":"126","author":[{"given":"Vani","family":"Rajasekar","sequence":"first","affiliation":[]},{"given":"Premalatha","family":"Jayapaul","sequence":"additional","affiliation":[]},{"given":"Sathya","family":"Krishnamoorthi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2577-7927","authenticated-orcid":false,"given":"Muzafer","family":"Saracevic","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Elhoseny","sequence":"additional","affiliation":[]},{"given":"Marwan","family":"Al-Akaidi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,8]]},"reference":[{"key":"8760_CR1","doi-asserted-by":"publisher","first-page":"2604","DOI":"10.48084\/etasr.1810","volume":"8","author":"I Alameri","year":"2018","unstructured":"Alameri, I. (2018). MANETS and Internet of Things: The development of a data routing algorithm. Engineering, Technology & Applied Science Research, 8, 2604\u20132608.","journal-title":"Engineering, Technology & Applied Science Research"},{"key":"8760_CR2","doi-asserted-by":"crossref","unstructured":"Bruzgiene, R., Narbutaite, L., & Adomkus, T. (2017). MANET network in internet of things system. In Ad hoc networks (pp. 89\u2013114).","DOI":"10.5772\/66408"},{"key":"8760_CR3","doi-asserted-by":"publisher","first-page":"30039","DOI":"10.1007\/s11042-018-6883-7","volume":"78","author":"BH Al-Qarni","year":"2019","unstructured":"Al-Qarni, B. H., Almogren, A., & Hassan, M. M. (2019). An efficient networking protocol for internet of things to handle multimedia big data. Multimedia Tools Applications, 78, 30039\u201330056.","journal-title":"Multimedia Tools Applications"},{"key":"8760_CR4","doi-asserted-by":"publisher","first-page":"2062","DOI":"10.1109\/COMST.2018.2817685","volume":"20","author":"F Javed","year":"2018","unstructured":"Javed, F., Afzal, M. K., Sharif, M., & Kim, B.-S. (2018). Internet of Things (IoT) operating systems support, networking technologies, applications, and challenges: A comparative review. IEEE Communications Surveys & Tutorials, 20, 2062\u20132100.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"8760_CR5","doi-asserted-by":"crossref","unstructured":"Rajasekar, V., Sathya, K., & Premalatha, J. (2018). Energy efficient cluster formation in wireless sensor networks based on multi objective bat algorithm. In International conference on intelligent computing and communication for smart world (I2C2SW) (pp. 116\u2013120).","DOI":"10.1109\/I2C2SW45816.2018.8997529"},{"key":"8760_CR6","doi-asserted-by":"publisher","first-page":"455","DOI":"10.3390\/electronics9030455","volume":"9","author":"MS Al-kahtani","year":"2020","unstructured":"Al-kahtani, M. S., Karim, L., & Khan, N. (2020). Efficient opportunistic routing protocol for sensor network in emergency applications. Electronics, 9, 455.","journal-title":"Electronics"},{"key":"8760_CR7","doi-asserted-by":"publisher","first-page":"32659","DOI":"10.1007\/s11042-019-7619-z","volume":"78","author":"R Borawake-Satao","year":"2019","unstructured":"Borawake-Satao, R., & Prasad, R. (2019). Mobility aware multi-objective routing in wireless multimedia sensor network. Multimedia Tools and Applications, 78, 32659\u201332677.","journal-title":"Multimedia Tools and Applications"},{"key":"8760_CR8","doi-asserted-by":"crossref","unstructured":"Sara\u010devi\u0107, M., Plojovi\u0107, \u0160., & Bu\u0161atli\u0107, S. (2020). IoT application for smart cities data storage and processing based on triangulation method. In Internet of Things (IoT) (pp. 317\u2013334). Springer.","DOI":"10.1007\/978-3-030-37468-6_17"},{"key":"8760_CR9","doi-asserted-by":"crossref","first-page":"923","DOI":"10.24425\/bpasts.2020.134470","volume":"68","author":"V Rajasekar","year":"2020","unstructured":"Rajasekar, V., Premalatha, J., & Sathya, K. (2020). Multi-factor signcryption scheme for secure authentication using hyper elliptic curve cryptography and bio-hash function. Bulletin of the Polish Academy of Sciences, Technical Sciences, 68, 923\u2013935.","journal-title":"Bulletin of the Polish Academy of Sciences, Technical Sciences"},{"key":"8760_CR10","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1109\/TR.2020.3010973","volume":"70","author":"M Sara\u010devi\u0107","year":"2020","unstructured":"Sara\u010devi\u0107, M., Adamovi\u0107, S., Mi\u0161kovic, V., Elhoseny, M., Ma\u010dek, N., Selim, M., et al. (2020). Data encryption for Internet of Things applications based on catalan objects and two combinatorial structures. IEEE Transactions on Reliability, 70, 819\u2013830.","journal-title":"IEEE Transactions on Reliability"},{"key":"8760_CR11","doi-asserted-by":"publisher","DOI":"10.1201\/9781003032441","volume-title":"Internet of Things: Integration and security challenges","author":"S Velliangiri","year":"2020","unstructured":"Velliangiri, S., Kumar, S. A., & Karthikeyan, P. (2020). Internet of Things: Integration and security challenges. CRC Press."},{"key":"8760_CR12","doi-asserted-by":"crossref","unstructured":"Rajasekar, V., Premalatha, J., & Sathya, K. (2020). Enhanced biometric recognition for secure authentication using iris preprocessing and hyperelliptic curve cryptography. In Wireless communications and mobile computing (Vol. 2020).","DOI":"10.21203\/rs.2.23196\/v1"},{"issue":"1415\u20131423","key":"8760_CR13","first-page":"2016","volume":"22","author":"P Marappan","year":"2016","unstructured":"Marappan, P., & Rodrigues, P. (2016). An energy-efficient routing protocol for correlated data using CL-LEACH in WSN. Wireless Networks, 22(1415\u20131423), 2016.","journal-title":"Wireless Networks"},{"key":"8760_CR14","doi-asserted-by":"crossref","unstructured":"Bria, R., Wahab, A., & Alaydrus, M. (2019). Energy efficiency analysis of TEEN routing protocol with isolated nodes. In Fourth international conference on informatics and computing (ICIC) (pp. 1\u20135).","DOI":"10.1109\/ICIC47613.2019.8985668"},{"key":"8760_CR15","doi-asserted-by":"publisher","first-page":"1601","DOI":"10.1109\/TMC.2018.2865485","volume":"18","author":"A Hawbani","year":"2018","unstructured":"Hawbani, A., Wang, X., Sharabi, Y., Ghannami, A., Kuhlani, H., & Karmoshi, S. (2018). LORA: Load-balanced opportunistic routing for asynchronous duty-cycled WSN. IEEE Transactions on Mobile Computing, 18, 1601\u20131615.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"8760_CR16","doi-asserted-by":"publisher","first-page":"144303","DOI":"10.1109\/ACCESS.2019.2944867","volume":"7","author":"Y He","year":"2019","unstructured":"He, Y., Tang, X., Zhang, R., Du, X., Zhou, D., & Guizani, M. (2019). A course-aware opportunistic routing protocol for FANETs. IEEE Access, 7, 144303\u2013144312.","journal-title":"IEEE Access"},{"key":"8760_CR17","first-page":"26","volume":"6","author":"M Zhao","year":"2016","unstructured":"Zhao, M., Kumar, A., Chong, P. H. J., & Lu, R. (2016). A reliable and energy-efficient opportunistic routing protocol for dense lossy networks. IEEE Wireless Communications Letters, 6, 26\u201329.","journal-title":"IEEE Wireless Communications Letters"},{"issue":"3","key":"8760_CR18","doi-asserted-by":"publisher","first-page":"87","DOI":"10.12700\/APH.18.3.2021.3.5","volume":"18","author":"V Rajasekar","year":"2021","unstructured":"Rajasekar, V., Premalatha, J., Sathya, K., & Sara\u010devi\u0107, M. (2021). Secure remote user authentication scheme on health care, IoT and cloud applications: A multilayer systematic survey. Acta Polytechnica Hungarica, 18(3), 87\u2013106.","journal-title":"Acta Polytechnica Hungarica"},{"key":"8760_CR19","doi-asserted-by":"crossref","unstructured":"Amandeep, K., Gupta, P., & Garg, R. (2021). Soft computing techniques for clustering in WSN. In IOP conference series: Materials science and engineering (Vol. 1022, No. 1, p. 012041). IOP Publishing.","DOI":"10.1088\/1757-899X\/1022\/1\/012041"},{"key":"8760_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08433-z","author":"VK Quy","year":"2021","unstructured":"Quy, V. K., Nam, V. H., Linh, D. M., et al. (2021). A survey of QoS-aware routing protocols for the MANET-WSN convergence scenarios in IoT networks. Wireless Personal Communications. https:\/\/doi.org\/10.1007\/s11277-021-08433-z","journal-title":"Wireless Personal Communications"},{"key":"8760_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08173-0","author":"R Maheswar","year":"2021","unstructured":"Maheswar, R., Jayarajan, P., Sampathkumar, A., et al. (2021). CBPR: A cluster-based backpressure routing for the Internet of Things. Wireless Personal Communications. https:\/\/doi.org\/10.1007\/s11277-021-08173-0","journal-title":"Wireless Personal Communications"},{"key":"8760_CR22","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s11277-019-06853-6","volume":"111","author":"J Marietta","year":"2020","unstructured":"Marietta, J., & Chandra Mohan, B. (2020). A review on routing in Internet of Things. Wireless Personal Communications, 111, 209\u2013233. https:\/\/doi.org\/10.1007\/s11277-019-06853-6","journal-title":"Wireless Personal Communications"},{"key":"8760_CR23","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1007\/s11277-018-6060-3","volume":"104","author":"HB Fradj","year":"2019","unstructured":"Fradj, H. B., Anane, R., & Bouallegue, R. (2019). Opportunistic routing protocols in wireless sensor networks. Wireless Personal Communications, 104, 921\u2013933.","journal-title":"Wireless Personal Communications"},{"key":"8760_CR24","doi-asserted-by":"crossref","unstructured":"Hasson, S. T., & Abd Al-kadhum, H. (2017). Developed clustering approaches to enhance the data transmissions in WSNs. In International conference on current research in computer science and information technology (ICCIT) (pp. 99\u2013106).","DOI":"10.1109\/CRCSIT.2017.7965541"},{"key":"8760_CR25","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1080\/00051144.2019.1666548","volume":"60","author":"R Vijayashree","year":"2019","unstructured":"Vijayashree, R., & C. Suresh Ghana Dhas, . (2019). Energy efficient data collection with multiple mobile sink using artificial bee colony algorithm in large-scale WSN. Automatika, 60, 555\u2013563.","journal-title":"Automatika"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08760-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08760-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08760-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:24:51Z","timestamp":1725571491000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08760-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,8]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["8760"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08760-1","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-368957\/v1","asserted-by":"object"}]},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,8]]},"assertion":[{"value":"1 August 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and Animal Rights"}}]}}