{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T11:44:23Z","timestamp":1774525463702,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T00:00:00Z","timestamp":1645401600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T00:00:00Z","timestamp":1645401600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11277-022-09632-y","type":"journal-article","created":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T20:20:19Z","timestamp":1645474819000},"page":"1753-1781","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Secret Dynamic Key Authentication and Decision Trust Secure Routing Framework for Internet of Things Based WSN"],"prefix":"10.1007","volume":"125","author":[{"given":"Uma","family":"Meena","sequence":"first","affiliation":[]},{"given":"Promila","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,21]]},"reference":[{"issue":"3","key":"9632_CR1","doi-asserted-by":"publisher","first-page":"751","DOI":"10.3390\/s18030751","volume":"18","author":"J Tang","year":"2018","unstructured":"Tang, J., Liu, A., Zhang, J., Xiong, N. N., Zeng, Z., & Wang, T. (2018). A trust-based secure routing scheme using the traceback approach for energy-harvesting wireless sensor networks. Sensors, 18(3), 751.","journal-title":"Sensors"},{"issue":"4","key":"9632_CR2","doi-asserted-by":"publisher","first-page":"4228","DOI":"10.1002\/dac.4228","volume":"33","author":"I Batra","year":"2020","unstructured":"Batra, I., Verma, S., & Alazab, M. (2020). A lightweight IoT-based security framework for inventory automation using wireless sensor network. International Journal of Communication Systems, 33(4), 4228.","journal-title":"International Journal of Communication Systems"},{"issue":"3","key":"9632_CR3","doi-asserted-by":"publisher","first-page":"2135","DOI":"10.1007\/s11277-020-07469-x","volume":"114","author":"S Sujanthi","year":"2020","unstructured":"Sujanthi, S., & Kalyani, S. N. (2020). SecDL: QoS-aware secure deep learning approach for dynamic cluster-based routing in WSN assisted IoT. Wireless Personal Communications, 114(3), 2135\u20132169.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"9632_CR4","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/s12652-018-0949-2","volume":"11","author":"Q Zhang","year":"2020","unstructured":"Zhang, Q., & Xu, D. (2020). Security authentication technology based on dynamic Bayesian network in Internet of Things. Journal of Ambient Intelligence and Humanized Computing, 11(2), 573\u2013580.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"9632_CR5","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.1016\/j.procs.2018.04.289","volume":"131","author":"T Yang","year":"2018","unstructured":"Yang, T., Xiangyang, X., Peng, L., Tonghui, L., & Leina, P. (2018). A secure routing of wireless sensor networks based on trust evaluation model. Procedia Computer Science, 131, 1156\u20131163.","journal-title":"Procedia Computer Science"},{"key":"9632_CR6","doi-asserted-by":"publisher","first-page":"102022","DOI":"10.1016\/j.adhoc.2019.102022","volume":"97","author":"BD Deebak","year":"2020","unstructured":"Deebak, B. D., & Al-Turjman, F. (2020). A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Networks, 97, 102022.","journal-title":"Ad Hoc Networks"},{"issue":"21","key":"9632_CR7","doi-asserted-by":"publisher","first-page":"4174","DOI":"10.3390\/en12214174","volume":"12","author":"K Haseeb","year":"2019","unstructured":"Haseeb, K., Almogren, A., Islam, N., Ud Din, I., & Jan, Z. (2019). An energy-efficient and secure routing protocol for intrusion avoidance in IoT-based WSN. Energies, 12(21), 4174.","journal-title":"Energies"},{"key":"9632_CR8","first-page":"1","volume":"14","author":"R Pothumarti","year":"2021","unstructured":"Pothumarti, R., Jain, K., & Krishnan, P. (2021). A lightweight authentication scheme for 5G mobile communications: A dynamic key approach. Journal of Ambient Intelligence and Humanized Computing, 14, 1\u20139.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"9632_CR9","first-page":"115","volume":"20","author":"M Elhoseny","year":"2019","unstructured":"Elhoseny, M., & Hassanien, A. E. (2019). Secure data transmission in WSN: An overview. Dynamic Wireless Sensor Networks, 20, 115\u2013143.","journal-title":"Dynamic Wireless Sensor Networks"},{"key":"9632_CR10","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1016\/j.future.2017.10.026","volume":"92","author":"S Athmani","year":"2019","unstructured":"Athmani, S., Bilami, A., & Boubiche, D. E. (2019). EDAK: An efficient dynamic authentication and key management mechanism for heterogeneous WSNs. Future Generation Computer Systems, 92, 789\u2013799.","journal-title":"Future Generation Computer Systems"},{"key":"9632_CR11","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1016\/j.future.2017.08.044","volume":"82","author":"G Han","year":"2018","unstructured":"Han, G., Zhou, L., Wang, H., Zhang, W., & Chan, S. (2018). A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things. Future Generation Computer Systems, 82, 689\u2013697.","journal-title":"Future Generation Computer Systems"},{"key":"9632_CR12","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1016\/j.future.2018.05.065","volume":"109","author":"A Nanda","year":"2020","unstructured":"Nanda, A., Nanda, P., He, X., Jamdagni, A., & Puthal, D. (2020). A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks. Future Generation Computer Systems, 109, 521\u2013530.","journal-title":"Future Generation Computer Systems"},{"key":"9632_CR13","doi-asserted-by":"crossref","unstructured":"Jerbi, W., Guermazi, A., Trabelsi, H. (2020). A Secure Routing Protocol in Heterogeneous Networks for Internet of Things. In2020 International Wireless Communications and Mobile Computing (IWCMC), IEEE, 571\u2013576","DOI":"10.1109\/IWCMC48107.2020.9148502"},{"key":"9632_CR14","doi-asserted-by":"publisher","first-page":"71404","DOI":"10.1109\/ACCESS.2018.2879360","volume":"6","author":"L Yang","year":"2018","unstructured":"Yang, L., Lu, Y., Liu, S., Guo, T., & Liang, Z. (2018). A dynamic behavior monitoring game-based trust evaluation scheme for clustering in wireless sensor networks. IEEE Access, 6, 71404\u201371412.","journal-title":"IEEE Access"},{"issue":"3","key":"9632_CR15","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s40860-018-0062-5","volume":"4","author":"PK Dhillon","year":"2018","unstructured":"Dhillon, P. K., & Kalra, S. (2018). Multi-factor user authentication scheme for IoT-based healthcare services. Journal of Reliable Intelligent Environments, 4(3), 141\u2013160.","journal-title":"Journal of Reliable Intelligent Environments"},{"key":"9632_CR16","unstructured":"Alzubaidi, W.K., Shaker, S.H. Secure routing scheme for clustered wireless sensor network (WSN)."},{"key":"9632_CR17","first-page":"1","volume":"10","author":"AS Reegan","year":"2021","unstructured":"Reegan, A. S., & Kabila, V. (2021). Highly secured cluster based WSN using novel FCM and enhanced ECC-ElGamal encryption in IoT. Wireless Personal Communications, 10, 1\u20137.","journal-title":"Wireless Personal Communications"},{"key":"9632_CR18","first-page":"1","volume":"14","author":"S Pradeep","year":"2021","unstructured":"Pradeep, S., Muthurajkumar, S., Ganapathy, S., & Kannan, A. (2021). A matrix translation and elliptic curve based cryptosystem for secured data communications in WSNs. Wireless Personal Communications, 14, 1\u201320.","journal-title":"Wireless Personal Communications"},{"key":"9632_CR19","doi-asserted-by":"publisher","first-page":"102448","DOI":"10.1016\/j.adhoc.2021.102448","volume":"115","author":"OA Khashan","year":"2021","unstructured":"Khashan, O. A., Ahmad, R., & Khafajah, N. M. (2021). An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Networks, 115, 102448.","journal-title":"Ad Hoc Networks"},{"issue":"3","key":"9632_CR20","doi-asserted-by":"publisher","first-page":"1517","DOI":"10.1007\/s11277-020-07113-8","volume":"112","author":"C Sureshkumar","year":"2020","unstructured":"Sureshkumar, C., & Sabena, S. (2020). Fuzzy-based secure authentication and clustering algorithm for improving the energy efficiency in wireless sensor networks. Wireless Personal Communications, 112(3), 1517\u20131536.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"9632_CR21","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.eij.2020.02.005","volume":"22","author":"S Nashwan","year":"2021","unstructured":"Nashwan, S. (2021). AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment. Egyptian Informatics Journal, 22(1), 15\u201326.","journal-title":"Egyptian Informatics Journal"},{"issue":"6","key":"9632_CR22","doi-asserted-by":"publisher","first-page":"837","DOI":"10.3390\/s16060837","volume":"16","author":"Y Lu","year":"2016","unstructured":"Lu, Y., Li, L., Peng, H., & Yang, Y. (2016). An energy efficient mutual authentication and key agreement scheme preserving anonymity for wireless sensor networks. Sensors, 16(6), 837.","journal-title":"Sensors"},{"issue":"11","key":"9632_CR23","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.3390\/s17112681","volume":"17","author":"L Xiong","year":"2017","unstructured":"Xiong, L., Peng, D., Peng, T., Liang, H., & Liu, Z. (2017). A lightweight anonymous authentication protocol with perfect forward secrecy for wireless sensor networks. Sensors, 17(11), 2681.","journal-title":"Sensors"},{"issue":"1","key":"9632_CR24","first-page":"258","volume":"6","author":"M Zhang","year":"2018","unstructured":"Zhang, M., & Song, J. S. (2018). An enhanced temporal-credential-based mutual authentication and key agreement scheme for wireless sensor network. Journal of Advances in Computer Networks, 6(1), 258.","journal-title":"Journal of Advances in Computer Networks"},{"issue":"6","key":"9632_CR25","doi-asserted-by":"publisher","first-page":"6047","DOI":"10.1007\/s12652-020-02169-7","volume":"12","author":"M Mathapati","year":"2020","unstructured":"Mathapati, M., Kumaran, T. S., Muruganandham, A., & Mathivanan, M. (2020). Secure routing scheme with multi-dimensional trust evaluation for wireless sensor network. Journal of Ambient Intelligence and Humanized Computing, 12(6), 6047\u20136055.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"4","key":"9632_CR26","doi-asserted-by":"publisher","first-page":"1637","DOI":"10.1007\/s11277-019-06788-y","volume":"110","author":"T Kalidoss","year":"2020","unstructured":"Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., & Kannan, A. (2020). QoS aware trust based routing algorithm for wireless sensor networks. Wireless Personal Communications, 110(4), 1637\u20131658.","journal-title":"Wireless Personal Communications"},{"issue":"9","key":"9632_CR27","doi-asserted-by":"publisher","first-page":"2013","DOI":"10.1109\/TIFS.2016.2570740","volume":"11","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013\u20132027.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"9632_CR28","doi-asserted-by":"publisher","first-page":"146","DOI":"10.7763\/JACN.2015.V3.157","volume":"3","author":"BM Thippeswamy","year":"2015","unstructured":"Thippeswamy, B. M., Reshma, S., Tejaswi, V., Shaila, K., Venugopal, K. R., & Patnaik, L. M. (2015). STEAR: Secure trust-aware energy-efcient adaptive routing in wireless sensor networks. Journal of Advances in Computer Networks, 3(2), 146\u2013149.","journal-title":"Journal of Advances in Computer Networks"},{"issue":"1","key":"9632_CR29","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1109\/JSYST.2020.2981049","volume":"15","author":"F Wu","year":"2020","unstructured":"Wu, F., Li, X., Xu, L., Vijayakumar, P., & Kumar, N. (2020). A novel three-factor authentication protocol for wireless sensor networks with IoT notion. IEEE Systems Journal, 15(1), 1120\u20131129.","journal-title":"IEEE Systems Journal"},{"key":"9632_CR30","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-981-13-8222-2_11","volume-title":"Advances in Computational Intelligence","author":"A Tabassum","year":"2020","unstructured":"Tabassum, A., Sadaf, S., Sinha, D., & Das, A. K. (2020). Secure anti-void energy-efficient routing (saveer) protocol for wsn-based iot network. Advances in Computational Intelligence (pp. 129\u2013142). Springer."},{"issue":"6","key":"9632_CR31","doi-asserted-by":"publisher","first-page":"4011","DOI":"10.1007\/s11276-020-02299-y","volume":"26","author":"DK Shende","year":"2020","unstructured":"Shende, D. K., & Sonavane, S. S. (2020). CrowWhale-ETR: CrowWhale optimization algorithm for energy and trust aware multicast routing in WSN for IoT applications. Wireless Networks, 26(6), 4011\u20134029.","journal-title":"Wireless Networks"},{"issue":"2","key":"9632_CR32","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1007\/s12083-020-01038-6","volume":"14","author":"V Kavitha","year":"2021","unstructured":"Kavitha, V. (2021). Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment. Peer-to-Peer Networking and Applications, 14(2), 821\u2013836.","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"1","key":"9632_CR33","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s11276-015-0951-y","volume":"22","author":"PK Batra","year":"2016","unstructured":"Batra, P. K., & Kant, K. (2016). LEACH-MAC: A new cluster head selection algorithm for Wireless Sensor Networks. Wireless Networks, 22(1), 49\u201360.","journal-title":"Wireless Networks"},{"issue":"4","key":"9632_CR34","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.1007\/s11276-015-1176-9","volume":"23","author":"T Singh","year":"2017","unstructured":"Singh, T., Singh, J., & Sharma, S. (2017). Energy efficient secured routing protocol for MANETs. Wireless Networks, 23(4), 1001\u20131009.","journal-title":"Wireless Networks"},{"key":"9632_CR35","doi-asserted-by":"crossref","unstructured":"Wang, J., Wang, K., Niu, J., Liu, W. (2018). A K-medoids based clustering algorithm for wireless sensor networks. In2018 international workshop on advanced image technology (IWAIT), IEEE, 1\u20134.","DOI":"10.1109\/IWAIT.2018.8369769"},{"issue":"1","key":"9632_CR36","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TIM.2018.2836058","volume":"68","author":"D Binu","year":"2018","unstructured":"Binu, D., & Kariyappa, B. S. (2018). RideNN: A new rider optimization algorithm-based neural network for fault diagnosis in analog circuits. IEEE Transactions on Instrumentation and Measurement, 68(1), 2\u20136.","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"issue":"8","key":"9632_CR37","doi-asserted-by":"publisher","first-page":"e3514","DOI":"10.1002\/dac.3514","volume":"31","author":"AK Sutrala","year":"2018","unstructured":"Sutrala, A. K., Das, A. K., Kumar, N., Reddy, A. G., Vasilakos, A. V., & Rodrigues, J. J. (2018). On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC. International Journal of Communication Systems, 31(8), e3514.","journal-title":"International Journal of Communication Systems"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09632-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-022-09632-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09632-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,6]],"date-time":"2022-07-06T23:08:06Z","timestamp":1657148886000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-022-09632-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,21]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["9632"],"URL":"https:\/\/doi.org\/10.1007\/s11277-022-09632-y","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,21]]},"assertion":[{"value":"7 February 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors Dr. Uma Meena & Ms Promila Sharma declared that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Two authors have equal contributions.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Reviewer and Editors can publish this work.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}]}}