{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T11:23:52Z","timestamp":1770463432061,"version":"3.49.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,3,29]],"date-time":"2023-03-29T00:00:00Z","timestamp":1680048000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,29]],"date-time":"2023-03-29T00:00:00Z","timestamp":1680048000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11277-023-10376-6","type":"journal-article","created":{"date-parts":[[2023,3,29]],"date-time":"2023-03-29T15:03:00Z","timestamp":1680102180000},"page":"2149-2173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["An Improvement of DV-Hop Localization Algorithm Based on Improved Adaptive Genetic Algorithm for Wireless Sensor Networks"],"prefix":"10.1007","volume":"130","author":[{"given":"Haibin","family":"Sun","sequence":"first","affiliation":[]},{"given":"Hongxing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ziran","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,29]]},"reference":[{"issue":"4","key":"10376_CR1","doi-asserted-by":"publisher","first-page":"3149","DOI":"10.1007\/s11277-021-08391-6","volume":"119","author":"AB Feroz Khan","year":"2021","unstructured":"Feroz Khan, A. B., & Anandharaj, G. (2021). A cognitive energy efficient and trusted routing model for the security of wireless sensor networks: CEMT. Wireless Personal Communications, 119(4), 3149\u20133159. https:\/\/doi.org\/10.1007\/s11277-021-08391-6","journal-title":"Wireless Personal Communications"},{"issue":"8","key":"10376_CR2","doi-asserted-by":"publisher","first-page":"185496","DOI":"10.1109\/ACCESS.2019.2960633","volume":"7","author":"K Haseeb","year":"2019","unstructured":"Haseeb, K., Islam, N., Almogren, A., & Ud Din, I. (2019). Intrusion prevention framework for secure routing in WSN-based mobile internet of things. IEEE Access, 7(8), 185496\u2013185505. https:\/\/doi.org\/10.1109\/ACCESS.2019.2960633","journal-title":"IEEE Access"},{"issue":"12","key":"10376_CR3","doi-asserted-by":"publisher","first-page":"1575","DOI":"10.1007\/s42452-019-1628-4","volume":"1","author":"AB Feroz Khan","year":"2019","unstructured":"Feroz Khan, A. B., & Anandharaj, G. (2019). A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the IoT environment: CKMT. SN Applied Sciences, 1(12), 1575. https:\/\/doi.org\/10.1007\/s42452-019-1628-4","journal-title":"SN Applied Sciences"},{"issue":"2","key":"10376_CR4","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.eij.2020.05.004","volume":"22","author":"AB Feroz Khan","year":"2020","unstructured":"Feroz Khan, A. B., & Anandharaj, G. (2020). AHKM: An improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in IoT. Egyptian Informatics Journal, 22(2), 119\u2013124. https:\/\/doi.org\/10.1016\/j.eij.2020.05.004","journal-title":"Egyptian Informatics Journal"},{"issue":"8","key":"10376_CR5","doi-asserted-by":"publisher","first-page":"4512","DOI":"10.1109\/JSEN.2019.2962613","volume":"20","author":"K Chen","year":"2020","unstructured":"Chen, K., Tan, G., Cao, J., Lu, M., & Fan, X. (2020). Modeling and improving the energy performance of GPS receivers for location services. IEEE Sensors Journal, 20(8), 4512\u20134523. https:\/\/doi.org\/10.1109\/JSEN.2019.2962613","journal-title":"IEEE Sensors Journal"},{"key":"10376_CR6","doi-asserted-by":"publisher","unstructured":"Oguntala, G., Abd-Alhameed, R., Jones, S., Noras, J., Patwary, M., & Rodriguez, J. (2018). Indoor location identification technologies for real-time IoT-based applications: An inclusive survey. Computer Science Review, 30, 55\u201379. https:\/\/doi.org\/10.1016\/j.cosrev.2018.09.001","DOI":"10.1016\/j.cosrev.2018.09.001"},{"key":"10376_CR7","doi-asserted-by":"publisher","first-page":"102327","DOI":"10.1016\/j.adhoc.2020.102327","volume":"111","author":"T Chen","year":"2021","unstructured":"Chen, T., Sun, L., Wang, Z., Wang, Y., Zhao, Z., & Zhao, P. (2021). An enhanced nonlinear iterative localization algorithm for DV_Hop with uniform calculation criterion. Ad Hoc Networks, 111, 102327. https:\/\/doi.org\/10.1016\/j.adhoc.2020.102327","journal-title":"Ad Hoc Networks"},{"issue":"2","key":"10376_CR8","doi-asserted-by":"publisher","first-page":"289","DOI":"10.3390\/electronics11020289","volume":"11","author":"J Du","year":"2022","unstructured":"Du, J., Yuan, C., Yue, M., & Ma, T. (2022). A novel localization algorithm based on RSSI and multilateration for indoor environments. Electronics, 11(2), 289. https:\/\/doi.org\/10.3390\/electronics11020289","journal-title":"Electronics"},{"key":"10376_CR9","doi-asserted-by":"publisher","first-page":"108113","DOI":"10.1016\/j.sigpro.2021.108113","volume":"186","author":"J Shi","year":"2021","unstructured":"Shi, J., Wang, G., & Jin, L. (2021). Moving source localization using TOA and FOA measurements with imperfect synchronization. Signal Processing, 186, 108113. https:\/\/doi.org\/10.1016\/j.sigpro.2021.108113","journal-title":"Signal Processing"},{"issue":"4","key":"10376_CR10","doi-asserted-by":"publisher","first-page":"1715","DOI":"10.1007\/s11227-016-1877-6","volume":"73","author":"R Shahbazian","year":"2017","unstructured":"Shahbazian, R., & Ghorashi, S. (2017). Distributed cooperative target detection and localization in decentralized wireless sensor networks. The Journal of Supercomputing, 73(4), 1715\u20131732. https:\/\/doi.org\/10.1007\/s11227-016-1877-6","journal-title":"The Journal of Supercomputing"},{"key":"10376_CR11","doi-asserted-by":"publisher","first-page":"27629","DOI":"10.1109\/ACCESS.2018.2836898","volume":"6","author":"Y Yuan","year":"2018","unstructured":"Yuan, Y., Huo, L., Wang, Z., & Hogrefe, D. (2018). Secure APIT localization scheme against sybil attacks in distributed wireless sensor networks. IEEE Access, 6, 27629\u201327636. https:\/\/doi.org\/10.1109\/ACCESS.2018.2836898","journal-title":"IEEE Access"},{"issue":"4","key":"10376_CR12","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/s11235-021-00837-3","volume":"78","author":"AM Abbas","year":"2021","unstructured":"Abbas, A. M. (2021). Analysis of weighted centroid-based localization scheme for wireless sensor networks. Telecommunication Systems, 78(4), 595\u2013607. https:\/\/doi.org\/10.1007\/s11235-021-00837-3","journal-title":"Telecommunication Systems"},{"issue":"1\u20134","key":"10376_CR13","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1023\/A:1023403323460","volume":"22","author":"D Niculescu","year":"2003","unstructured":"Niculescu, D., & Nath, B. (2003). DV based positioning in ad hoc networks. Journal of Telecommunication Systems, 22(1\u20134), 267\u2013280. https:\/\/doi.org\/10.1023\/A:1023403323460","journal-title":"Journal of Telecommunication Systems"},{"issue":"3","key":"10376_CR14","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.1007\/s11276-020-02533-7","volume":"27","author":"A Kaushik","year":"2021","unstructured":"Kaushik, A., Lobiyal, D. K., & Kumar, S. (2021). Improved 3-dimensional DV-hop localization algorithm based on information of nearby nodes. Wireless Networks, 27(3), 1801\u20131819. https:\/\/doi.org\/10.1007\/s11276-020-02533-7","journal-title":"Wireless Networks"},{"issue":"4","key":"10376_CR15","doi-asserted-by":"publisher","first-page":"5011","DOI":"10.1007\/s11277-016-3727-5","volume":"96","author":"J Mass-Sanchez","year":"2017","unstructured":"Mass-Sanchez, J., Ruiz-Ibarra, E., Cortez-Gonz\u00e1lez, J., Espinoza-Ruiz, A., & Castro, L. A. (2017). Weighted hyperbolic DV-hop positioning node localization algorithm in WSNs. Wireless Personal Communications, 96(4), 5011\u20135033. https:\/\/doi.org\/10.1007\/s11277-016-3727-5","journal-title":"Wireless Personal Communications"},{"issue":"5","key":"10376_CR16","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1109\/TEVC.2014.2355174","volume":"19","author":"M-H Tayarani-N","year":"2015","unstructured":"Tayarani-N, M.-H., Yao, X., & Xu, H. (2015). Meta-heuristic algorithms in car engine design: A literature survey. IEEE Transactions on Evolutionary Computation, 19(5), 609\u2013629. https:\/\/doi.org\/10.1109\/TEVC.2014.2355174","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"10376_CR17","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1016\/j.swevo.2018.06.010","volume":"44","author":"KR Opara","year":"2019","unstructured":"Opara, K. R., & Arabas, J. (2019). Differential evolution: A survey of theoretical analyses. Swarm and Evolutionary Computation, 44, 546\u2013558. https:\/\/doi.org\/10.1016\/j.swevo.2018.06.010","journal-title":"Swarm and Evolutionary Computation"},{"key":"10376_CR18","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.chemolab.2015.08.020","volume":"149","author":"F Marini","year":"2015","unstructured":"Marini, F., & Walczak, B. (2015). Particle swarm optimization (PSO). A tutorial. Chemometrics and Intelligent Laboratory Systems, 149, 153\u2013165. https:\/\/doi.org\/10.1016\/j.chemolab.2015.08.020","journal-title":"Chemometrics and Intelligent Laboratory Systems"},{"key":"10376_CR19","unstructured":"Holland, J. H. (1975). Adaptation in natural and artificial systems: An introductory analysis with applications to biology, control, and artificial intelligence. A Bradford Book."},{"issue":"4598","key":"10376_CR20","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1126\/science.220.4598.671","volume":"220","author":"S Kirkpatrick","year":"1983","unstructured":"Kirkpatrick, S., Gelatt, C. D., Jr., & Vecchi, M. P. (1983). Optimization by simulated annealing. Science, 220(4598), 671\u2013680.","journal-title":"Science"},{"issue":"2","key":"10376_CR21","doi-asserted-by":"publisher","first-page":"184","DOI":"10.3390\/math7020184","volume":"7","author":"P Wang","year":"2019","unstructured":"Wang, P., Xue, F., Li, H., Cui, Z., Xie, L., & Chen, J. (2019). A multi-objective DV-hop localization algorithm based on NSGA-II in internet of things. Mathematics, 7(2), 184. https:\/\/doi.org\/10.3390\/math7020184","journal-title":"Mathematics"},{"key":"10376_CR22","doi-asserted-by":"publisher","unstructured":"Sun, W., & Zhang, L. (2018). WSN location algorithm based on simulated annealing co-linearity DV-hop. In 2018 2nd IEEE advanced information management, communicates, electronic and automation control conference (IMCEC) (pp. 1518-1522). https:\/\/doi.org\/10.1109\/IMCEC.2018.8469558","DOI":"10.1109\/IMCEC.2018.8469558"},{"issue":"1","key":"10376_CR23","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s11235-013-9671-8","volume":"53","author":"Y Hu","year":"2013","unstructured":"Hu, Y., & Li, X. (2013). An improvement of DV-Hop localization algorithm for wireless sensor networks. Telecommunication Systems, 53(1), 13\u201318. https:\/\/doi.org\/10.1007\/s11235-013-9671-8","journal-title":"Telecommunication Systems"},{"issue":"2","key":"10376_CR24","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s11571-014-9324-y","volume":"9","author":"B Peng","year":"2015","unstructured":"Peng, B., & Li, L. (2015). An improved localization algorithm based on genetic algorithm in wireless sensor networks. Cognitive Neurodynamics, 9(2), 249\u2013256. https:\/\/doi.org\/10.1007\/s11571-014-9324-y","journal-title":"Cognitive Neurodynamics"},{"issue":"4","key":"10376_CR25","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/s11235-016-0196-9","volume":"64","author":"M Mehrabi","year":"2017","unstructured":"Mehrabi, M., Taheri, H., & Taghdiri, P. (2017). An improved DV-Hop localization algorithm based on evolutionary algorithms. Telecommunication Systems, 64(4), 639\u2013647. https:\/\/doi.org\/10.1007\/s11235-016-0196-9","journal-title":"Telecommunication Systems"},{"issue":"5","key":"10376_CR26","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.3390\/s18051469","volume":"18","author":"O Cheikhrouhou","year":"2018","unstructured":"Cheikhrouhou, O., Bhatti, M. G., & Alroobaea, R. (2018). A hybrid DV-hop algorithm using RSSI for localization in large-scale wireless sensor networks. Sensors, 18(5), 1469. https:\/\/doi.org\/10.3390\/s18051469","journal-title":"Sensors"},{"issue":"4","key":"10376_CR27","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1080\/03772063.2018.1436472","volume":"65","author":"SP Singh","year":"2019","unstructured":"Singh, S. P., & Sharma, S. C. (2019). Implementation of a PSO based improved localization algorithm for wireless sensor networks. IETE Journal of Research, 65(4), 502\u2013514. https:\/\/doi.org\/10.1080\/03772063.2018.1436472","journal-title":"IETE Journal of Research"},{"key":"10376_CR28","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1016\/j.neucom.2020.04.156","volume":"458","author":"A Ouyang","year":"2021","unstructured":"Ouyang, A., Lu, Y., Liu, Y., Wu, M., & Peng, X. (2021). An improved adaptive genetic algorithm based on DV-Hop for locating nodes in wireless sensor networks. Neurocomputing, 458, 500\u2013510. https:\/\/doi.org\/10.1016\/j.neucom.2020.04.156","journal-title":"Neurocomputing"},{"key":"10376_CR29","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.comcom.2022.08.019","volume":"195","author":"TK Mohanta","year":"2022","unstructured":"Mohanta, T. K., & Das, D. K. (2022). Multiple objective optimization-based DV-Hop localization for spiral deployed wireless sensor networks using non-inertial opposition-based class topper optimization (NOCTO). Computer Communications, 195, 173\u2013186. https:\/\/doi.org\/10.1016\/j.comcom.2022.08.019","journal-title":"Computer Communications"},{"key":"10376_CR30","unstructured":"Goldberg, D. E. (1989). Genetic algorithms in search, optimization and machine learning. Addison-Wesley Longman."},{"issue":"4","key":"10376_CR31","first-page":"1042","volume":"35","author":"C Yang","year":"2019","unstructured":"Yang, C., Qian, Q., Wang, F., & Sun, M. (2019). Application of improved adaptive genetic algorithm in function optimization. Application Research of Computers, 35(4), 1042\u20131045.","journal-title":"Application Research of Computers"},{"issue":"2","key":"10376_CR32","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1145\/1149283.1149287","volume":"2","author":"G Zhou","year":"2006","unstructured":"Zhou, G., He, T., Krishnamurthy, S., & Stankovic, J. A. (2006). Models and solutions for radio irregularity in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 2(2), 221\u2013262. https:\/\/doi.org\/10.1145\/1149283.1149287","journal-title":"ACM Transactions on Sensor Networks (TOSN)"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10376-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-023-10376-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10376-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T13:18:53Z","timestamp":1684329533000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-023-10376-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,29]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["10376"],"URL":"https:\/\/doi.org\/10.1007\/s11277-023-10376-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,29]]},"assertion":[{"value":"21 March 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 March 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no confict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}