{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:22:47Z","timestamp":1776680567831,"version":"3.51.2"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T00:00:00Z","timestamp":1681948800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T00:00:00Z","timestamp":1681948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s11277-023-10434-z","type":"journal-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T11:21:41Z","timestamp":1681989701000},"page":"371-398","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":67,"title":["E-FEERP: Enhanced Fuzzy Based Energy Efficient Routing Protocol for Wireless Sensor Network"],"prefix":"10.1007","volume":"131","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4248-5782","authenticated-orcid":false,"given":"Vipul","family":"Narayan","sequence":"first","affiliation":[]},{"given":"A. K.","family":"Daniel","sequence":"additional","affiliation":[]},{"given":"Pooja","family":"Chaturvedi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,20]]},"reference":[{"key":"10434_CR1","doi-asserted-by":"publisher","unstructured":"Chaturvedi, P., & Daniel, A. K. (2015). An energy efficient node scheduling protocol for target coverage in wireless sensor networks. In 2015 Fifth International Conference on Communication Systems and Network Technologies (pp. 138\u2013142). IEEE. doi: https:\/\/doi.org\/10.1109\/CSNT.2015.10.","DOI":"10.1109\/CSNT.2015.10"},{"key":"10434_CR2","doi-asserted-by":"crossref","unstructured":"Narayan, V. & Daniel, A. K. (2020). Multi-Tier Cluster Based Smart Farming Using Wireless Sensor Network. In 2020 5th International Conference on Computing, Communication and Security (ICCCS), pp. 1\u20135.","DOI":"10.1109\/ICCCS49678.2020.9277072"},{"key":"10434_CR3","doi-asserted-by":"crossref","unstructured":"Narayan, V. & Daniel, A.K. (2021). RBCHS: Region-Based Cluster Head Selection Protocol in Wireless Sensor Network. In Proceedings of Integrated Intelligence Enable Networks and Computing, Springer, pp. 863\u2013869.","DOI":"10.1007\/978-981-33-6307-6_89"},{"key":"10434_CR4","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.jnca.2016.04.020","volume":"69","author":"AAA Ari","year":"2016","unstructured":"Ari, A. A. A., Yenke, B. O., Labraoui, N., Damakoa, I., & Gueroui, A. (2016). A power efficient cluster-based routing algorithm for wireless sensor networks: Honeybees swarm intelligence based approach. Journal of Network and Computer Applications, 69, 77\u201397.","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"10434_CR5","doi-asserted-by":"publisher","first-page":"2195","DOI":"10.1007\/s11277-019-06837-6","volume":"110","author":"S Famila","year":"2020","unstructured":"Famila, S., & Jawahar, A. (2020). Improved artificial bee Colony optimization-based clustering technique for WSNs. Wireless Personal Communications, 110(4), 2195\u20132212.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"10434_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.12694\/scpe.v22i1.1808","volume":"22","author":"V Narayan","year":"2021","unstructured":"Narayan, V., & Daniel, A. K. (2021). A novel approach for cluster head selection using trust function in wsn. Scalable Computing: Practice and Experience, 22(1), 1\u201313. https:\/\/doi.org\/10.12694\/scpe.v22i1.1808","journal-title":"Scalable Computing: Practice and Experience"},{"key":"10434_CR7","doi-asserted-by":"publisher","unstructured":"Narayan, V., Daniel, A. K., & Rai, A. K. (2020). Energy efficient two tier cluster based protocol for wireless sensor network. In 2020 International Conference on Electrical and Electronics Engineering (ICE3) (pp. 574\u2013579). IEEE. doi: https:\/\/doi.org\/10.1109\/ICE348803.2020.9122951.","DOI":"10.1109\/ICE348803.2020.9122951"},{"key":"10434_CR8","doi-asserted-by":"crossref","unstructured":"Faiz, M. & Daniel, A. K. (2021). Multi-criteria based cloud service selection model using fuzzy logic for QoS. In International Conference on Advanced Network Technologies and Intelligent Computing, pp. 153\u2013167.","DOI":"10.1007\/978-3-030-96040-7_12"},{"key":"10434_CR9","doi-asserted-by":"crossref","unstructured":"Mahmood, D., Javaid, N., Mahmood, S., Qureshi, S., Memon, A. M., & Zaman, T. (2013). MODLEACH: a variant of LEACH for WSNs. In 2013 Eighth international conference on broadband and wireless computing, communication and applications, pp. 158\u2013163.","DOI":"10.1109\/BWCCA.2013.34"},{"key":"10434_CR10","first-page":"55","volume":"2014","author":"JHB Neto","year":"2014","unstructured":"Neto, J. H. B., Rego, A., Cardoso, A. R., & Celestino, J. (2014). MH-LEACH: A distributed algorithm for multi-hop communication in wireless sensor networks. ICN, 2014, 55\u201361.","journal-title":"ICN"},{"key":"10434_CR11","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.comcom.2019.10.006","volume":"149","author":"R Thiagarajan","year":"2020","unstructured":"Thiagarajan, R. (2020). Energy consumption and network connectivity based on Novel-LEACH-POS protocol networks. Computer Communications, 149, 90\u201398.","journal-title":"Computer Communications"},{"issue":"11","key":"10434_CR12","doi-asserted-by":"publisher","first-page":"7399","DOI":"10.1007\/s00521-019-04251-4","volume":"32","author":"N Mittal","year":"2020","unstructured":"Mittal, N., Singh, U., Salgotra, R., & Bansal, M. (2020). An energy-efficient stable clustering approach using fuzzy-enhanced flower pollination algorithm for WSNs. Neural Computing and Applications, 32(11), 7399\u20137419.","journal-title":"Neural Computing and Applications"},{"key":"10434_CR13","doi-asserted-by":"crossref","unstructured":"Aslam, M., Shah, T., Javaid, N., Rahim, A., Rahman, Z., & Khan, Z. A. (2012). CEEC: Centralized energy efficient clustering a new routing protocol for WSNs. In 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp. 103\u2013105.","DOI":"10.1109\/SECON.2012.6275763"},{"key":"10434_CR14","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1016\/j.compeleceng.2015.06.019","volume":"48","author":"L Malathi","year":"2015","unstructured":"Malathi, L., Gnanamurthy, R. K., & Chandrasekaran, K. (2015). Energy efficient data collection through hybrid unequal clustering for wireless sensor networks. Computers & Electrical Engineering, 48, 358\u2013370.","journal-title":"Computers & Electrical Engineering"},{"key":"10434_CR15","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.compeleceng.2015.11.011","volume":"56","author":"G Ahmed","year":"2016","unstructured":"Ahmed, G., Zou, J., Fareed, M. M. S., & Zeeshan, M. (2016). Sleep-awake energy efficient distributed clustering algorithm for wireless sensor networks. Computers & Electrical Engineering, 56, 385\u2013398.","journal-title":"Computers & Electrical Engineering"},{"issue":"3","key":"10434_CR16","doi-asserted-by":"publisher","first-page":"S8","DOI":"10.1109\/MCOM.2005.1404592","volume":"43","author":"SD Muruganathan","year":"2005","unstructured":"Muruganathan, S. D., Ma, D. C. F., Bhasin, R. I., & Fapojuwo, A. O. (2005). A centralized energy-efficient routing protocol for wireless sensor networks. IEEE Communications Magazine, 43(3), S8-13.","journal-title":"IEEE Communications Magazine"},{"issue":"2","key":"10434_CR17","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1007\/s11277-020-07091-x","volume":"112","author":"ST Ahmed","year":"2020","unstructured":"Ahmed, S. T., Sandhya, M., & Sankar, S. (2020). TelMED: Dynamic user clustering resource allocation technique for MooM datasets under optimizing telemedicine network. Wireless Personal Communications, 112(2), 1061\u20131077.","journal-title":"Wireless Personal Communications"},{"issue":"20","key":"10434_CR18","doi-asserted-by":"publisher","first-page":"4579","DOI":"10.3390\/s19204579","volume":"19","author":"Y Liu","year":"2019","unstructured":"Liu, Y., Wu, Q., Zhao, T., Tie, Y., Bai, F., & Jin, M. (2019). An improved energy-efficient routing protocol for wireless sensor networks. Sensors, 19(20), 4579.","journal-title":"Sensors"},{"key":"10434_CR19","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1016\/j.istruc.2021.11.012","volume":"35","author":"A Kaveh","year":"2022","unstructured":"Kaveh, A., & Hamedani, K. B. (2022). Improved arithmetic optimization algorithm and its application to discrete structural optimization. Structures, 35, 748\u2013764.","journal-title":"Structures"},{"key":"10434_CR20","doi-asserted-by":"publisher","first-page":"114570","DOI":"10.1016\/j.cma.2022.114570","volume":"391","author":"JO Agushaka","year":"2022","unstructured":"Agushaka, J. O., Ezugwu, A. E., & Abualigah, L. (2022). Dwarf mongoose optimization algorithm. Computer Methods in Applied Mechanics and Engineering, 391, 114570.","journal-title":"Computer Methods in Applied Mechanics and Engineering"},{"issue":"2","key":"10434_CR21","doi-asserted-by":"publisher","first-page":"1559","DOI":"10.1007\/s12652-020-02228-z","volume":"12","author":"M Safaldin","year":"2021","unstructured":"Safaldin, M., Otair, M., & Abualigah, L. (2021). Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 12(2), 1559\u20131576.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"2","key":"10434_CR22","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1007\/s11276-021-02866-x","volume":"28","author":"M Otair","year":"2022","unstructured":"Otair, M., Ibrahim, O. T., Abualigah, L., Altalhi, M., & Sumari, P. (2022). An enhanced grey wolf optimizer based particle swarm optimizer for intrusion detection system in wireless sensor networks. Wireless Networks, 28(2), 721\u2013744.","journal-title":"Wireless Networks"},{"issue":"1","key":"10434_CR23","first-page":"354","volume":"10","author":"C Fu","year":"2013","unstructured":"Fu, C., Jiang, Z., Wei, W. E. I., & Wei, A. (2013). An energy balanced algorithm of LEACH protocol in WSN. International Journal of Computer Science Issues, 10(1), 354.","journal-title":"International Journal of Computer Science Issues"},{"issue":"8","key":"10434_CR24","doi-asserted-by":"publisher","first-page":"996","DOI":"10.1049\/iet-com.2018.5546","volume":"13","author":"R Sharma","year":"2019","unstructured":"Sharma, R., Vashisht, V., & Singh, U. (2019). EEFCM-DE: Energy-efficient clustering based on fuzzy C means and differential evolution algorithm in WSNs. IET Communications, 13(8), 996\u20131007.","journal-title":"IET Communications"},{"issue":"4","key":"10434_CR25","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1109\/TC.2012.31","volume":"62","author":"LA Villas","year":"2012","unstructured":"Villas, L. A., Boukerche, A., Ramos, H. S., De Oliveira, H. A. B. F., de Araujo, R. B., & Loureiro, A. A. F. (2012). DRINA: A lightweight and reliable routing approach for in-network aggregation in wireless sensor networks. IEEE Transactions on Computers, 62(4), 676\u2013689.","journal-title":"IEEE Transactions on Computers"},{"key":"10434_CR26","doi-asserted-by":"publisher","unstructured":"Daniel, A. K., Faiz, M. (2022). Wireless Sensor Network Based Distribution and Prediction of Water Consumption in Residential Houses Using ANN. In Internet of Things and Connected Technologies. ICIoTCT 2021. Lecture Notes in Networks and Systems, vol. 32, pp. 107\u2013116, doi: https:\/\/doi.org\/10.1007\/978-3-030-94507-7_11.","DOI":"10.1007\/978-3-030-94507-7_11"},{"key":"10434_CR27","doi-asserted-by":"crossref","unstructured":"Narayan, V., Daniel, A. K. (2022). CHHP: Coverage optimization and hole healing protocol using sleep and wake-up concept for wireless sensor network. International Journal of System Assurance Engineering and Management, pp. 1\u201311.","DOI":"10.1007\/s13198-021-01538-5"},{"key":"10434_CR28","first-page":"8887","volume":"975","author":"S Mehta","year":"2015","unstructured":"Mehta, S., Vhatkar, S., & Atique, M. (2015). Comparative study of BCDCP protocols in wireless sensor network. International Journal of Computers and Applications, 975, 8887.","journal-title":"International Journal of Computers and Applications"},{"issue":"11","key":"10434_CR29","doi-asserted-by":"publisher","first-page":"2044","DOI":"10.1109\/LCOMM.2013.100813.131109","volume":"17","author":"D Xie","year":"2013","unstructured":"Xie, D., Zhou, Q., You, X., Li, B., & Yuan, X. (2013). A novel energy-efficient cluster formation strategy: From the perspective of cluster members. IEEE Communications Letters, 17(11), 2044\u20132047.","journal-title":"IEEE Communications Letters"},{"key":"10434_CR30","doi-asserted-by":"crossref","unstructured":"Narayan, V. & Daniel, A. K. (2021). IOT Based Sensor Monitoring System for Smart Complex and Shopping Malls. In International Conference on Mobile Networks and Management, 2021, pp. 344\u2013354.","DOI":"10.1007\/978-3-030-94763-7_26"},{"key":"10434_CR31","doi-asserted-by":"crossref","unstructured":"Kulkarni, R. V., & Venayagamoorthy, G. K. (2010). Particle swarm optimization in wireless-sensor networks: A brief survey. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 41(2), 262\u2013267.","DOI":"10.1109\/TSMCC.2010.2054080"},{"issue":"3","key":"10434_CR32","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1109\/JSEN.2013.2290433","volume":"14","author":"J Yang","year":"2013","unstructured":"Yang, J., Zhang, H., Ling, Y., Pan, C., & Sun, W. (2013). Task allocation for wireless sensor network using modified binary particle swarm optimization. IEEE Sensors Journal, 14(3), 882\u2013892.","journal-title":"IEEE Sensors Journal"},{"issue":"1","key":"10434_CR33","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MCOM.2014.6710073","volume":"52","author":"YG Kim","year":"2014","unstructured":"Kim, Y. G., & Lee, M. J. (2014). Scheduling multi-channel and multi-timeslot in time constrained wireless sensor networks via simulated annealing and particle swarm optimization. IEEE Communications Magazine, 52(1), 122\u2013129.","journal-title":"IEEE Communications Magazine"},{"issue":"2","key":"10434_CR34","doi-asserted-by":"publisher","first-page":"467","DOI":"10.2174\/2666255813999200710133304","volume":"14","author":"P Chaturvedi","year":"2021","unstructured":"Chaturvedi, P., & Daniel, A. K. (2021). A hybrid protocol using fuzzy logic and rough set theory for target coverage. Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science), 14(2), 467\u2013476.","journal-title":"Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science)"},{"issue":"4","key":"10434_CR35","doi-asserted-by":"publisher","first-page":"377","DOI":"10.7763\/IJMLC.2012.V2.148","volume":"2","author":"MK Rafsanjani","year":"2012","unstructured":"Rafsanjani, M. K., & Dowlatshahi, M. B. (2012). Using gravitational search algorithm for finding near-optimal base station location in two-tiered WSNs. International Journal of Machine Learning and Computing, 2(4), 377.","journal-title":"International Journal of Machine Learning and Computing"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10434-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-023-10434-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10434-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T13:41:38Z","timestamp":1687786898000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-023-10434-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,20]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["10434"],"URL":"https:\/\/doi.org\/10.1007\/s11277-023-10434-z","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-1727704\/v1","asserted-by":"object"}]},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,20]]},"assertion":[{"value":"6 April 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest with this publication.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}