{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:48:35Z","timestamp":1774540115308,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,3,15]],"date-time":"2022-03-15T00:00:00Z","timestamp":1647302400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,15]],"date-time":"2022-03-15T00:00:00Z","timestamp":1647302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11277-022-09541-0","type":"journal-article","created":{"date-parts":[[2022,3,15]],"date-time":"2022-03-15T15:02:53Z","timestamp":1647356573000},"page":"63-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["FEBSRA: Fuzzy Trust Based Energy Aware Balanced Secure Routing Algorithm for Secured Communications in WSNs"],"prefix":"10.1007","volume":"125","author":[{"given":"R.","family":"Anitha","sequence":"first","affiliation":[]},{"given":"B. R. Tapas","family":"Bapu","sequence":"additional","affiliation":[]},{"given":"P. G.","family":"Kuppusamy","sequence":"additional","affiliation":[]},{"given":"N.","family":"Partheeban","sequence":"additional","affiliation":[]},{"given":"A. N.","family":"Sasikumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,15]]},"reference":[{"issue":"4","key":"9541_CR1","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/TMC.2004.41","volume":"3","author":"O Younis","year":"2004","unstructured":"Younis, O., & Fahmy, S. (2004). HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. In IEEE Transactions on Mobile Computing, 3(4), 366\u2013379. https:\/\/doi.org\/10.1109\/TMC.2004.41.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"9541_CR2","doi-asserted-by":"publisher","first-page":"9599","DOI":"10.1109\/ACCESS.2017.2706973","volume":"5","author":"D Qin","year":"2017","unstructured":"Qin, D., Yang, S., Jia S., Zhang, Y., Ma, J., & Ding, Q. (2017). Research on trust sensing based secure routing mechanism for wireless sensor network. In IEEE Access, 5, 9599\u20139609. https:\/\/doi.org\/10.1109\/ACCESS.2017.2706973.","journal-title":"IEEE Access"},{"issue":"4","key":"9541_CR3","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1109\/JCN.2016.000081","volume":"18","author":"T-T Huynh","year":"2016","unstructured":"Huynh, T.-T., Dinh-Duc, A.-V., & Tran C.-H. (2016). Delay-constrained energy-efficient cluster-based multi-hop routing in wireless sensor networks. In Journal of Communications and Networks, 18(4), 580\u2013588. https:\/\/doi.org\/10.1109\/JCN.2016.000081.","journal-title":"Journal of Communications and Networks"},{"key":"9541_CR4","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.compeleceng.2018.03.036","volume":"68","author":"R Logambigai","year":"2018","unstructured":"Logambigai, R., Ganapathy, S., & Kannan A. (2018).Energy\u2013efficient grid\u2013based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Computers & Electrical Engineering, 68, 62\u201375. https:\/\/doi.org\/10.1016\/j.compeleceng.2018.03.036.","journal-title":"Computers &amp; Electrical Engineering"},{"issue":"4","key":"9541_CR5","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"WB Heinzelman","year":"2002","unstructured":"Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. In IEEE Transactions on Wireless Communications, 1(4), 660\u2013670. https:\/\/doi.org\/10.1109\/TWC.2002.804190.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"1","key":"9541_CR6","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/TWC.2015.2475255","volume":"15","author":"A El Assaf","year":"2016","unstructured":"El Assaf, A., Zaidi, S., Affes, S., & Kandil, N. (2016). Low-cost localization for multihop heterogeneous wireless sensor networks. In IEEE Transactions on Wireless Communications, 15(1), 472\u2013484. https:\/\/doi.org\/10.1109\/TWC.2015.2475255.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"3","key":"9541_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2903721","volume":"12","author":"H Rathore","year":"2016","unstructured":"Rathore, H., Badarla, V., & Shit, S. (2016). Consensus-aware sociopsychological trust model for wireless sensor networks. ACM Transactions on Sensor Networks, 12(3), 1\u201327. https:\/\/doi.org\/10.1145\/2903721.","journal-title":"ACM Transactions on Sensor Networks"},{"issue":"22","key":"9541_CR8","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1049\/el.2014.2969","volume":"50","author":"L Chen","year":"2014","unstructured":"Chen, L., Xiong, X., Chen, Y., Liu, K., Zhang, J., Jiang, Y., & Luo, Q. (2014). Why (n + 1)th-hop neighbours are more important than nth-hop ones for localisation in multi-hop WSNs, Electronics Letters, 50(22), 1646\u20131648. https:\/\/doi.org\/10.1049\/el.2014.2969.","journal-title":"Electronics Letters"},{"issue":"12","key":"9541_CR9","doi-asserted-by":"publisher","first-page":"6962","DOI":"10.1109\/JSEN.2015.2468576","volume":"15","author":"A Ahmed","year":"2015","unstructured":"Ahmed, A., Bakar, K. A., Channa, M. I., Haseeb, K., & Khan, A. W. (2015). TERP: A trust and energy aware routing protocol for wireless sensor network. IEEE Sensors Journal, 15(12), 6962\u20136972. https:\/\/doi.org\/10.1109\/JSEN.2015.2468576.","journal-title":"IEEE Sensors Journal"},{"issue":"12","key":"9541_CR10","doi-asserted-by":"publisher","first-page":"7208","DOI":"10.1109\/JSEN.2015.2472566","volume":"15","author":"TN Le","year":"2015","unstructured":"Le, T. N., Pegatoquet, A., Berder, O., & Sentieys, O. (2015). Energy-efficient power manager and MAC protocol for multi-hop wireless sensor networks powered by periodic energy harvesting sources. In IEEE Sensors Journal, 15(12), 7208\u20137220. https:\/\/doi.org\/10.1109\/JSEN.2015.2472566.","journal-title":"IEEE Sensors Journal"},{"issue":"9","key":"9541_CR11","doi-asserted-by":"publisher","first-page":"3886","DOI":"10.1109\/TCOMM.2016.2590436","volume":"64","author":"S Zaidi","year":"2016","unstructured":"Zaidi, S., El Assaf, A., Affes, S., & Kandil, N. (2016). Accurate range-free localization in multi-hop wireless sensor networks. In IEEE Transactions on Communications, 64(9), 3886\u20133900. https:\/\/doi.org\/10.1109\/TCOMM.2016.2590436.","journal-title":"IEEE Transactions on Communications"},{"key":"9541_CR12","doi-asserted-by":"publisher","unstructured":"Ganapathy, S., Yogesh, P., Kannan, A. (2012). Intelligent agent-based intrusion detection system using enhanced multiclass SVM. Computational Intelligence and Neuroscience, 2012(9), 1\u20139. https:\/\/doi.org\/10.1155\/2012\/850259.","DOI":"10.1155\/2012\/850259"},{"issue":"2","key":"9541_CR13","doi-asserted-by":"publisher","first-page":"1753","DOI":"10.1007\/s11277-017-4266-4","volume":"96","author":"S Muthurajkumar","year":"2017","unstructured":"Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., & Kannan, A. (2017). An intelligent secured and energy efficient routing algorithm for MANETs. Wireless Personal Communications, 96(2), 1753\u20131769. https:\/\/doi.org\/10.1007\/s11277-017-4266-4.","journal-title":"Wireless Personal Communications"},{"key":"9541_CR14","doi-asserted-by":"publisher","unstructured":"Selvi, M., Velvizhy, P., Ganapathy, S., Nehemiah, H. K., & Kannan, A. (2017). A rule based delay constrained energy efficient routing technique for wireless sensor networks. Cluster Computing, 22(12), 1\u201310. https:\/\/doi.org\/10.1007\/s10586-017-1191-y.","DOI":"10.1007\/s10586-017-1191-y"},{"issue":"4","key":"9541_CR15","doi-asserted-by":"publisher","first-page":"2223","DOI":"10.1109\/TNET.2017.2690359","volume":"25","author":"X Gao","year":"2017","unstructured":"Gao, X., Zhu, X., Li, J., Wu, F., Chen, G., Du, D. Z., & Tang, S. (2017). A novel approximation for multi-hop connected clustering problem in wireless networks. In IEEE\/ACM Transactions on Networking, 25(4), 2223\u20132234. https:\/\/doi.org\/10.1109\/TNET.2017.2690359.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"9541_CR16","doi-asserted-by":"publisher","unstructured":"Thangaramya, K., Logambigai, R., SaiRamesh, L., Kulothungan, K., Kannan, A., Ganapathy, S. An energy efficient clustering approach using spectral graph theory in wireless sensor networks. 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM), 2017, 126\u2013129. https:\/\/doi.org\/10.1109\/ICRTCCM.2017.41.","DOI":"10.1109\/ICRTCCM.2017.41"},{"key":"9541_CR17","doi-asserted-by":"publisher","first-page":"4725","DOI":"10.1109\/ACCESS.2017.2786944","volume":"6","author":"B Sun","year":"2018","unstructured":"Sun, B., & Li, D. (2018). A comprehensive trust-aware routing protocol with multi-attributes for WSNs. In IEEE Access, 6, 4725\u20134741. https:\/\/doi.org\/10.1109\/ACCESS.2017.2786944.","journal-title":"IEEE Access"},{"issue":"3","key":"9541_CR18","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1080\/03772063.2017.1284613","volume":"63","author":"M Singh","year":"2017","unstructured":"Singh, M., Sardar, A. R., Majumder, K., & Sarkar, S. K. (2017). A lightweight trust mechanism and overhead analysis for clustered WSN. IETE Journal of Research, 63(3), 297\u2013308. https:\/\/doi.org\/10.1080\/03772063.2017.1284613.","journal-title":"IETE Journal of Research"},{"key":"9541_CR19","doi-asserted-by":"publisher","first-page":"3882","DOI":"10.1109\/ACCESS.2018.2799681","volume":"6","author":"X Liu","year":"2018","unstructured":"Liu, X., Xiong, N., Zhang, N., Liu, A., Shen, H., & Huang, C. (2018). A trust with abstract information verified routing scheme for cyber-physical network. In IEEE Access, 6, 3882\u20133898. https:\/\/doi.org\/10.1109\/ACCESS.2018.2799681.","journal-title":"IEEE Access"},{"issue":"2","key":"9541_CR20","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/JSAC.2018.2804098","volume":"36","author":"P Asuquo","year":"2018","unstructured":"Asuquo, P., Cruickshank, H., AnyigorOgah, C. P., Lei, Ao., & Sun, Z. (2018). A distributed trust management scheme for data forwarding in satellite DTN emergency communications. In IEEE Journal on Selected Areas in Communications, 36(2), 246\u2013256. https:\/\/doi.org\/10.1109\/JSAC.2018.2804098.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"12","key":"9541_CR21","doi-asserted-by":"publisher","first-page":"5187","DOI":"10.1109\/JSEN.2018.2832664","volume":"18","author":"Y-W Kuo","year":"2018","unstructured":"Kuo, Y.-W., Li, C.-L., Jhang, J.-H., & Lin, S. (2018). Design of a wireless sensor network-based IoT platform for wide area and heterogeneous applications. In IEEE Sensors Journal, 18(12), 5187\u20135197. https:\/\/doi.org\/10.1109\/JSEN.2018.2832664.","journal-title":"IEEE Sensors Journal"},{"key":"9541_CR22","doi-asserted-by":"publisher","first-page":"27637","DOI":"10.1109\/ACCESS.2018.2834550","volume":"6","author":"Y Li","year":"2018","unstructured":"Li, Y., & Liang, Y. (2018). Compressed sensing in multi-hop large-scale wireless sensor networks based on routing topology tomography. In IEEE Access, 6, 27637\u201327650. https:\/\/doi.org\/10.1109\/ACCESS.2018.2834550.","journal-title":"IEEE Access"},{"issue":"15","key":"9541_CR23","doi-asserted-by":"publisher","first-page":"6446","DOI":"10.1109\/JSEN.2018.2848205","volume":"18","author":"F Firoozi","year":"2018","unstructured":"Firoozi, F., Zadorozhny, V. I., & Li, F. Y. (2018). Subjective logic-based in-network data processing for trust management in collocated and distributed wireless sensor networks. In IEEE Sensors Journal, 18(15), 6446\u20136460. https:\/\/doi.org\/10.1109\/JSEN.2018.2848205.","journal-title":"IEEE Sensors Journal"},{"issue":"4","key":"9541_CR24","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1049\/iet-wss.2017.0078","volume":"8","author":"SM Lambor","year":"2018","unstructured":"Lambor, S. M., & Joshi, S. M. (2018). Optimal hops for minimal route power under SINR constraints in wireless sensor networks. IET Wireless Sensor Systems, 8(4), 176\u2013182. https:\/\/doi.org\/10.1049\/iet-wss.2017.0078.","journal-title":"IET Wireless Sensor Systems"},{"key":"9541_CR25","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1016\/j.asoc.2018.11.022","volume":"75","author":"Z Lyu","year":"2019","unstructured":"Lyu, Z., Wei, Z., Pan, J., Chen, H., Xia, C., Han, J., & Shi, L. (2019). Periodic charging planning for a mobile WCE in wireless rechargeable sensor networks based on hybrid PSO and GA algorithm. Applied Soft Computing Journal, 75, 388\u2013403, https:\/\/doi.org\/10.1016\/j.asoc.2018.11.022.","journal-title":"Applied Soft Computing Journal"},{"issue":"2","key":"9541_CR26","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1080\/02564602.2019.1709573","volume":"38","author":"V Daiya","year":"2021","unstructured":"Daiya, V., Ebenezer, J., & Jehadeesan, R. (2021). Mapping obfuscation-based PHY security scheme for resource-constrained wireless sensor network. IETE Technical Review, 38(2), 221\u2013230. https:\/\/doi.org\/10.1080\/02564602.2019.1709573.","journal-title":"IETE Technical Review"},{"key":"9541_CR27","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/716468.2015","author":"Z Chen","year":"2015","unstructured":"Chen, Z., He, M., Liang, W., & Chen, K. (2015). Trust-aware and low energy consumption security topology protocol of wireless aensor network. Journal of Sensors, 2015, 1\u201310. https:\/\/doi.org\/10.1155\/2015\/716468.","journal-title":"Journal of Sensors"},{"key":"9541_CR28","doi-asserted-by":"publisher","unstructured":"Kim, J., Jang, K. Y., Choo, H., Kim, W. (2007). Energy efficient LEACH with TCP for wireless sensor networks. Computational Science & its Applications- ICCSA, 2007, 275\u2013285, https:\/\/doi.org\/10.1007\/978-3-540-74477-1_27.","DOI":"10.1007\/978-3-540-74477-1_27"},{"key":"9541_CR29","doi-asserted-by":"publisher","unstructured":"Weichao, W., Fei, D., Qijian, X. (2009). An improvement of LEACH routing protocol based on trust for wireless sensor networks. 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009, 1\u20134. https:\/\/doi.org\/10.1109\/WICOM.2009.5303346.","DOI":"10.1109\/WICOM.2009.5303346"},{"key":"9541_CR30","doi-asserted-by":"publisher","unstructured":"Miglani, A., Bhatia, T., Goel, S. (2015). TRUST based energy efficient routing in LEACH for wireless sensor network. 2015 Global Conference on Communication Technologies (GCCT), 2015, 361\u2013365. https:\/\/doi.org\/10.1109\/GCCT.2015.7342684.","DOI":"10.1109\/GCCT.2015.7342684"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09541-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-022-09541-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09541-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T13:44:12Z","timestamp":1656596652000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-022-09541-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,15]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["9541"],"URL":"https:\/\/doi.org\/10.1007\/s11277-022-09541-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,15]]},"assertion":[{"value":"7 January 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 March 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have not disclosed any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Enquiries about data availability should be directed to the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data availability"}}]}}