{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T20:04:12Z","timestamp":1767211452577},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T00:00:00Z","timestamp":1629072000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T00:00:00Z","timestamp":1629072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s11277-021-08856-8","type":"journal-article","created":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T18:02:57Z","timestamp":1629136977000},"page":"2927-2945","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An Efficient Wormhole Detection and Optimal Path Selection for Secure Data Transmission in WSN Environment"],"prefix":"10.1007","volume":"121","author":[{"given":"Vanita","family":"Verma","sequence":"first","affiliation":[]},{"given":"Vijay Kumar","family":"Jha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,16]]},"reference":[{"key":"8856_CR1","doi-asserted-by":"crossref","unstructured":"Sharma, M., Tandon, A., Narayan, S., & Bhushan, B. (2017). Classification and analysis of security attacks in WSNs and IEEE 802.15. 4 standards: A survey. In\u00a02017 3rd International conference on advances in computing, communication & automation (ICACCA) (Fall) (pp. 1\u20135). IEEE","DOI":"10.1109\/ICACCAF.2017.8344727"},{"key":"8856_CR2","doi-asserted-by":"publisher","unstructured":"Fotohi, R., & Bari, S. F. (2020). A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms.\u00a0The Journal of Supercomputing, 1\u201327. https:\/\/doi.org\/10.1007\/s11227-019-03131-x","DOI":"10.1007\/s11227-019-03131-x"},{"key":"8856_CR3","unstructured":"Jhanjhi, N. Z, Brohi, S. N., & Malik, N. A. (2019). Proposing a rank and wormhole attack detection framework using machine learning. In\u00a013th international conference on mathematics, actuarial science, computer science and statistics (MACS) (pp. 1\u20139). IEEE"},{"key":"8856_CR4","doi-asserted-by":"publisher","unstructured":"Singh, M. M., Dutta, N., Singh, T. R, & Nandi, U. (2020). A technique to detect wormhole attack in wireless sensor network using artificial neural network. In\u00a0Evolutionary computing and mobile sustainable networks (pp. 297\u2013307). Springer. https:\/\/doi.org\/10.1007\/978-981-15-5258-8_29","DOI":"10.1007\/978-981-15-5258-8_29"},{"issue":"1","key":"8856_CR5","doi-asserted-by":"publisher","first-page":"14","DOI":"10.3390\/asi3010014","volume":"3","author":"D Kandris","year":"2020","unstructured":"Kandris, D., Nakas, C., Vomvas, D., & Koulouras, G. (2020). Applications of wireless sensor networks: An up-to-date survey. Applied System Innovation, 3(1), 14.","journal-title":"Applied System Innovation"},{"issue":"3","key":"8856_CR6","doi-asserted-by":"publisher","first-page":"1667","DOI":"10.1007\/s11277-019-06948-0","volume":"111","author":"B Bhushan","year":"2020","unstructured":"Bhushan, B., & Sahoo, G. (2020). ISFC-BLS (intelligent and secured fuzzy clustering algorithm using balanced load sub-cluster formation) in WSN environment. Wireless Personal Communications, 111(3), 1667\u20131694. https:\/\/doi.org\/10.1007\/s11277-019-06948-0","journal-title":"Wireless Personal Communications"},{"key":"8856_CR7","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/2081902","author":"M Carlos-Mancilla","year":"2016","unstructured":"Carlos-Mancilla, M., L\u00f3pez-Mellado, E., & Siller, M. (2016). Wireless sensor networks formation: Approaches and techniques. Journal of Sensors. https:\/\/doi.org\/10.1155\/2016\/2081902","journal-title":"Journal of Sensors"},{"key":"8856_CR8","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1016\/j.procs.2016.03.092","volume":"79","author":"P Amish","year":"2016","unstructured":"Amish, P., & Vaghela, V. B. (2016). Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. Procedia Computer Science, 79, 700\u2013707. https:\/\/doi.org\/10.1016\/j.procs.2016.03.092","journal-title":"Procedia Computer Science"},{"key":"8856_CR9","doi-asserted-by":"publisher","first-page":"6975","DOI":"10.1109\/ACCESS.2018.2793841","volume":"6","author":"A Opeyemi Osanaiye","year":"2018","unstructured":"Opeyemi Osanaiye, A., Alfa, A. S., & Hancke, G. P. (2018). Denial of service defence for resource availability in wireless sensor networks. IEEE Access, 6, 6975\u20137004. https:\/\/doi.org\/10.1109\/ACCESS.2018.2793841","journal-title":"IEEE Access"},{"issue":"4","key":"8856_CR10","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1007\/s11277-019-06160-0","volume":"105","author":"G Farjamnia","year":"2019","unstructured":"Farjamnia, G., Gasimov, Y., & Kazimov, C. (2019). Review of the techniques against the wormhole attacks on wireless sensor networks. Wireless Personal Communications, 105(4), 1561\u20131584. https:\/\/doi.org\/10.1007\/s11277-019-06160-0","journal-title":"Wireless Personal Communications"},{"key":"8856_CR11","doi-asserted-by":"crossref","unstructured":"Jilani, S. A., Koner, C., & Nandi, S. (2020). Security in wireless sensor networks: Attacks and evasion. In\u00a0National conference on emerging trends on sustainable technology and engineering applications (NCETSTEA) (pp. 1\u20135). IEEE","DOI":"10.1109\/NCETSTEA48365.2020.9119947"},{"key":"8856_CR12","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/2804291","author":"J Foley","year":"2020","unstructured":"Foley, J., Moradpoor, N., & Ochen, H. (2020). Employing a machine learning approach to detect combined internet of things attacks against two objective functions using a novel dataset. Security and Communication Networks. https:\/\/doi.org\/10.1155\/2020\/2804291","journal-title":"Security and Communication Networks"},{"issue":"17","key":"8856_CR13","doi-asserted-by":"publisher","first-page":"4717","DOI":"10.3390\/s20174717","volume":"20","author":"KRC Boni","year":"2020","unstructured":"Boni, K. R. C., Xu, L., Chen, Z., & Baddoo, T. D. (2020). A security concept based on scaler distribution of a novel intrusion detection device for wireless sensor networks in a smart environment. Sensors, 20(17), 4717.","journal-title":"Sensors"},{"issue":"5","key":"8856_CR14","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.3390\/s20051300","volume":"20","author":"S Pundir","year":"2020","unstructured":"Pundir, S., Wazid, M., Singh, D. P., Das, A. K., Rodrigues, J. J. P. C., & Park, Y. (2020). Designing efficient sinkhole attack detection mechanism in edge-based IoT Deployment. Sensors, 20(5), 1300.","journal-title":"Sensors"},{"issue":"1","key":"8856_CR15","doi-asserted-by":"publisher","first-page":"41","DOI":"10.29375\/25392115.3606","volume":"20","author":"JR G\u00f3mez","year":"2019","unstructured":"G\u00f3mez, J. R., Montoya, H. F. V., & Henao, A. L. (2019). Implementaci\u00f3n del ataque Wormhole en redes de sensores inal\u00e1mbricos con dispositivos XBee S2C. Rev Colomb de Computaci\u00f3n, 20(1), 41\u201358.","journal-title":"Rev Colomb de Computaci\u00f3n"},{"key":"8856_CR16","doi-asserted-by":"crossref","unstructured":"Dwivedi, R. K., Sharma, P, & Kumar, R. (2018). Detection and prevention analysis of wormhole attack in wireless sensor network. In\u00a02018 8th international conference on cloud computing, data science & engineering (confluence) (pp. 727\u2013732). IEEE","DOI":"10.1109\/CONFLUENCE.2018.8442601"},{"key":"8856_CR17","doi-asserted-by":"crossref","unstructured":"Hars\u00e1nyi, K., Kiss, A., & Szir\u00e1nyi, T. (2018). Wormhole detection in wireless sensor networks using spanning trees. In\u00a0IEEE international conference on future IoT technologies (Future IoT) (pp. 1\u20136). IEEE","DOI":"10.1109\/FIOT.2018.8325596"},{"key":"8856_CR18","doi-asserted-by":"crossref","unstructured":"Verma, M. K., & Dwivedi, R. K. (2020). A survey on wormhole attack detection and prevention techniques in wireless sensor networks. In International conference on electrical and electronics engineering (ICE3) (pp. 326\u2013331). IEEE","DOI":"10.1109\/ICE348803.2020.9122944"},{"key":"8856_CR19","unstructured":"Solangi, S. A., & Bhatti, Z. (2020). Optimal route planning by genetic algorithm for wireless sensor networks. In\u00a0International conference on information science and communication technology (ICISCT) (pp. 1\u20134). IEEE"},{"key":"8856_CR20","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/9040395","author":"KN Qureshi","year":"2020","unstructured":"Qureshi, K. N., Bashir, M. U., Lloret, J., & Leon, A. (2020). Optimized cluster-based dynamic energy-aware routing protocol for wireless sensor networks in agriculture precision. Journal of Sensors. https:\/\/doi.org\/10.1155\/2020\/9040395","journal-title":"Journal of Sensors"},{"key":"8856_CR21","doi-asserted-by":"crossref","unstructured":"Mezni, A., Dumitrescu, E., Niel, E., & Ahmed, S. B. (2018). Multi criteria automatic generation of optimal routing for WSN. In\u00a014th international wireless communications & mobile computing conference (IWCMC) (pp. 747\u2013752). IEEE","DOI":"10.1109\/IWCMC.2018.8450311"},{"issue":"5","key":"8856_CR22","doi-asserted-by":"publisher","first-page":"1885","DOI":"10.3390\/app10051885","volume":"10","author":"L Tang","year":"2020","unstructured":"Tang, L., Lu, Z., & Fan, B. (2020). Energy efficient and reliable routing algorithm for wireless sensors networks. Applied Sciences, 10(5), 1885.","journal-title":"Applied Sciences"},{"key":"8856_CR23","doi-asserted-by":"publisher","unstructured":"Aghbari, Z. A., Khedr, A. M., Osamy, W., Arif, I., & Agrawal, D. P. (2019). Routing in wireless sensor networks using optimization techniques: A survey.\u00a0Wireless Personal Communications, 1\u201328. https:\/\/doi.org\/10.1007\/s11277-019-06993-9","DOI":"10.1007\/s11277-019-06993-9"},{"issue":"1","key":"8856_CR24","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/s11277-020-07365-4","volume":"114","author":"N Tamilarasi","year":"2020","unstructured":"Tamilarasi, N., & Santhi, S. G. (2020). Detection of wormhole attack and secure path selection in wireless sensor network. Wireless Personal Communications, 114(1), 329\u2013345.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"8856_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5120\/ijca2017915376","volume":"174","author":"MO Johnson","year":"2017","unstructured":"Johnson, M. O., Siddiqui, A., & Karami, A. (2017). A wormhole attack detection and prevention technique in wireless sensor networks. International Journal of Computer Applications, 174(4), 1\u20138.","journal-title":"International Journal of Computer Applications"},{"issue":"1","key":"8856_CR26","doi-asserted-by":"publisher","first-page":"35","DOI":"10.4018\/IJISP.2017010103","volume":"11","author":"M Kumar","year":"2017","unstructured":"Kumar, M., & Dutta, K. (2017). Detecting wormhole attack on data aggregation in hierarchical WSN. International Journal of Information Security and Privacy (IJISP), 11(1), 35\u201351.","journal-title":"International Journal of Information Security and Privacy (IJISP)"},{"key":"8856_CR27","doi-asserted-by":"publisher","unstructured":"Singh, R., Singh, J., & Singh, R. (2016). WRHT: A hybrid technique for detection of wormhole attack in wireless sensor networks.\u00a0Mobile Information Systems. https:\/\/doi.org\/10.1155\/2016\/8354930","DOI":"10.1155\/2016\/8354930"},{"key":"8856_CR28","doi-asserted-by":"publisher","first-page":"18194","DOI":"10.1109\/ACCESS.2019.2894637","volume":"7","author":"X Luo","year":"2019","unstructured":"Luo, X., Chen, Y., Li, M., Luo, Q., Xue, K., Liu, S., & Chen, L. (2019). CREDND: A novel secure neighbor discovery algorithm for wormhole attack. IEEE Access, 7, 18194\u201318205. https:\/\/doi.org\/10.1109\/ACCESS.2019.2894637","journal-title":"IEEE Access"},{"key":"8856_CR29","doi-asserted-by":"publisher","unstructured":"Neelamadhab Padhy Gomathy, V., Samanta, D., Sivaram, M., Jain, V., & Amiri, I. S. (2020). Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks.\u00a0Journal of Ambient Intelligence and Humanized Computing, 1\u20137. https:\/\/doi.org\/10.1007\/s12652-020-01797-3","DOI":"10.1007\/s12652-020-01797-3"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08856-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08856-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08856-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T20:01:27Z","timestamp":1638302487000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08856-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,16]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["8856"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08856-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,16]]},"assertion":[{"value":"7 August 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}