{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:45:05Z","timestamp":1775666705950,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s11277-024-10983-x","type":"journal-article","created":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T03:29:12Z","timestamp":1712719752000},"page":"1665-1686","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Secure and Energy-Aware Data Transmission for IoT-WSNs with the Help of Cluster-Based Secure Optimal Routing"],"prefix":"10.1007","volume":"134","author":[{"given":"Vanita","family":"Verma","sequence":"first","affiliation":[]},{"given":"Vijay Kumar","family":"Jha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,10]]},"reference":[{"issue":"4","key":"10983_CR1","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.1007\/s11277-020-07108-5","volume":"112","author":"C SobinC","year":"2020","unstructured":"SobinC, C. (2020). A survey on architecture, protocols and challenges in IoT. Wireless Personal Communications, 112(4), 1383\u20131429.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"10983_CR2","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.jksuci.2016.10.003","volume":"30","author":"PP Ray","year":"2016","unstructured":"Ray, P. P. (2016). A survey on internet of things architectures. Journal of King Saud University-Computer and Information Sciences, 30(3), 291\u2013319.","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"issue":"3","key":"10983_CR3","first-page":"1","volume":"4","author":"M Talal","year":"2019","unstructured":"Talal, M., ZaidanA, A., ZaidanB, B., AlbahriA, S., AlamoodiA, H., AlbahriO, S., AlsalemM, A., LimC, K., TanK, L., ShirW, L., & MohammedK, I. (2019). Smart home-based IoT for real-time and secure remote healthmonitoring of triage and priority system using body sensors multi-driven systematic review. Journal of Medical Systems, 4(3), 1\u201334.","journal-title":"Journal of Medical Systems"},{"issue":"6","key":"10983_CR4","doi-asserted-by":"publisher","first-page":"1905","DOI":"10.1007\/s12083-020-00945-y","volume":"13","author":"A Prasanth","year":"2020","unstructured":"Prasanth, A., & Jayachitra, S. (2020). A novel multi-objective optimization strategy for enhancing quality of service in IoT-enabled WSN applications. Peer-to-Peer Networking and Applications, 13(6), 1905\u20131920.","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"10983_CR5","doi-asserted-by":"crossref","unstructured":"Mini Sharma, Aditya Tandon, Subhashini Narayan, and Bharat Bhushan, (2017) Classification and analysis of security attacks in WSNs and IEEE 802.15. 4 standards: A survey. In 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA)(Fall), IEEE, pp. 1\u20135,","DOI":"10.1109\/ICACCAF.2017.8344727"},{"key":"10983_CR6","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1016\/j.future.2021.06.049","volume":"125","author":"T Khan","year":"2021","unstructured":"Khan, T., Singh, K., Hasan, MohdHilmi, Ahmad, K., ReddyG, T., Mohan, S., & Ahmadian, A. (2021). ETERS a comprehensive energy aware trust-based efficient routingscheme for adversarial WSNs. Future Generation Computer Systems, 125, 921\u2013943.","journal-title":"Future Generation Computer Systems"},{"key":"10983_CR7","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/2081902","author":"M Carlos-Mancilla","year":"2016","unstructured":"Carlos-Mancilla, M., Lopez-Mellado, E., & Siller, M. (2016). Wireless sensor networks formation approaches and techniques. Journal of Sensors. https:\/\/doi.org\/10.1155\/2016\/2081902","journal-title":"Journal of Sensors"},{"issue":"7","key":"10983_CR8","doi-asserted-by":"publisher","first-page":"4513","DOI":"10.1007\/s11276-021-02748-2","volume":"27","author":"S Rajasoundaran","year":"2021","unstructured":"Rajasoundaran, S., Kumar, S. S., Selvi, M., Ganapathy, S., Rakesh, R., & Kannan, A. (2021). Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks. Wireless Networks, 27(7), 4513\u20134534.","journal-title":"Wireless Networks"},{"key":"10983_CR9","doi-asserted-by":"publisher","first-page":"13131","DOI":"10.1007\/s10586-017-1277-6","volume":"22","author":"M Kavitha","year":"2019","unstructured":"Kavitha, M., & Geetha, B. G. (2019). An efficient city energy management system with secure routing communication using WSN. Cluster Computing, 22, 13131\u201313142.","journal-title":"Cluster Computing"},{"issue":"5","key":"10983_CR10","doi-asserted-by":"publisher","first-page":"2858","DOI":"10.1007\/s12083-021-01115-4","volume":"14","author":"OI Khalaf","year":"2021","unstructured":"Khalaf, O. I., & Abdulsahib, G. M. (2021). Optimized dynamic storage of data (ODSD) in IoT based on blockchain for wireless sensor networks. Peer-to-Peer Networking and Applications, 14(5), 2858\u20132873.","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"10983_CR11","doi-asserted-by":"publisher","first-page":"4011","DOI":"10.1007\/s11276-020-02299-y","volume":"26","author":"DK Shende","year":"2020","unstructured":"Shende, D. K., & Sonavane, S. S. (2020). CrowWhale-ETR: CrowWhale optimization algorithm for energy and trust aware multicast routing in WSN for IoT applications. Wireless Networks, 26, 4011\u20134029.","journal-title":"Wireless Networks"},{"key":"10983_CR12","doi-asserted-by":"publisher","first-page":"103118","DOI":"10.1016\/j.jnca.2021.103118","volume":"190","author":"MS Yousefpoor","year":"2021","unstructured":"Yousefpoor, M. S., Yousefpoor, E., Barati, H., Barati, A., Movaghar, A., & Hosseinzadeh, M. (2021). Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review. Journal of Network and Computer Applications, 190, 103118.","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"10983_CR13","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1007\/s11276-019-02142-z","volume":"26","author":"S Abbasian Dehkordi","year":"2020","unstructured":"Abbasian Dehkordi, S., Farajzadeh, K., Rezazadeh, J., Farahbakhsh, R., Sandrasegaran, K., & Abbasian Dehkordi, M. (2020). A survey on data aggregation techniques in IoT sensor networks. Wireless Networks, 26(2), 1243\u20131263.","journal-title":"Wireless Networks"},{"issue":"1","key":"10983_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13174-018-0078-3","volume":"9","author":"LV Silva","year":"2018","unstructured":"Silva, L. V., Barbosa, P., Marinho, R., & Brito, A. (2018). Security and privacy aware data aggregation on cloud computing. Journal of Internet Services and Applications, 9(1), 1\u201313.","journal-title":"Journal of Internet Services and Applications"},{"issue":"1","key":"10983_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42452-021-04156-9","volume":"3","author":"SB Rachit","year":"2021","unstructured":"Rachit, S. B., & Ragiri, P. R. (2021). Security trends in internet of things a survey. SN Applied Sciences, 3(1), 1\u201314.","journal-title":"SN Applied Sciences"},{"issue":"3","key":"10983_CR16","doi-asserted-by":"publisher","first-page":"2149","DOI":"10.1007\/s11277-021-08764-x","volume":"126","author":"P Singh","year":"2022","unstructured":"Singh, P., Khari, M., & Vimal, S. (2022). EESSMT: An energy efficient hybrid scheme for securing mobile ad hoc networks using IoT. Wireless Personal Communications, 126(3), 2149\u20132173.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"10983_CR17","doi-asserted-by":"publisher","first-page":"1909","DOI":"10.1007\/s11277-020-07951-6","volume":"117","author":"RP Pingale","year":"2021","unstructured":"Pingale, R. P., & Shinde, S. N. (2021). Multi-objective sunflower based grey wolf optimization algorithm for multipath routing in IoT network. Wireless Personal Communications, 117(3), 1909\u20131930.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"10983_CR18","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/s11277-018-5850-y","volume":"102","author":"AV Dhumane","year":"2018","unstructured":"Dhumane, A. V., & Prasad, R. S. (2018). Fractional gravitational grey wolf optimization to multi-path data transmission in IoT. Wireless Personal Communications, 102(2), 411\u2013436.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"10983_CR19","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/s11277-021-08352-z","volume":"127","author":"SG Qureshi","year":"2022","unstructured":"Qureshi, S. G., & Shandilya, S. K. (2022). Novel fuzzy based crow search optimization algorithm for secure node-to-node data transmission in WSN. Wireless Personal Communications, 127(1), 577\u2013597.","journal-title":"Wireless Personal Communications"},{"key":"10983_CR20","doi-asserted-by":"publisher","first-page":"102022","DOI":"10.1016\/j.adhoc.2019.102022","volume":"97","author":"BD Deebak","year":"2020","unstructured":"Deebak, B. D., & Al-Turjman, F. (2020). A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Networks, 97, 102022.","journal-title":"Ad Hoc Networks"},{"issue":"1","key":"10983_CR21","doi-asserted-by":"publisher","first-page":"1313","DOI":"10.1007\/s11277-021-08076-0","volume":"118","author":"AS Reegan","year":"2021","unstructured":"Reegan, A. S., & Kabila, V. (2021). Highly secured cluster based wsn using novel FCM and enhanced ECC-ElGamal encryption in IoT. Wireless Personal Communications, 118(1), 1313\u20131329.","journal-title":"Wireless Personal Communications"},{"key":"10983_CR22","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1007\/s11277-019-06422-x","volume":"108","author":"JK Jain","year":"2019","unstructured":"Jain, J. K. (2019). Secure and energy-efficient route adjustment model for internet of things. Wireless Personal Communications, 108, 633\u2013657.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"10983_CR23","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1007\/s11277-021-08564-3","volume":"127","author":"DK Bangotra","year":"2022","unstructured":"Bangotra, D. K., Singh, Y., Selwal, A., Kumar, N., & Singh, P. K. (2022). A trust based secure intelligent opportunistic routing protocol for wireless sensor networks. Wireless Personal Communications, 127(2), 1045\u20131066.","journal-title":"Wireless Personal Communications"},{"key":"10983_CR24","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1007\/s11277-021-08292-8","volume":"119","author":"M Cicio\u011flu","year":"2021","unstructured":"Cicio\u011flu, M., & \u00c7alhan, A. (2021). Energy efficiency solutions for IEEE 802.15. 6 based wireless body sensor networks. Wireless Personal Communications, 119, 1499\u20131513. https:\/\/doi.org\/10.1007\/s11277-021-08292-8","journal-title":"Wireless Personal Communications"},{"key":"10983_CR25","doi-asserted-by":"publisher","unstructured":"Ramalingam, S., Dhanasekaran, S., Sinnasamy, S. S., Salau, A. O., & Alagarsamy, M. (2024). Performance enhancement of efficient clustering and routing protocol for wireless sensor networks using improved elephant herd optimization algorithm. Wireless Networks, 1\u201317. https:\/\/doi.org\/10.1007\/s11276-023-03617-w","DOI":"10.1007\/s11276-023-03617-w"},{"key":"10983_CR26","first-page":"100744","volume":"27","author":"G Ravi","year":"2023","unstructured":"Ravi, G., Das, M. S., & Karmakonda, K. (2023). Reliable cluster based data aggregation scheme for IoT network using hybrid deep learning techniques. Measurement: Sensors, 27, 100744.","journal-title":"Measurement: Sensors"},{"key":"10983_CR27","doi-asserted-by":"publisher","unstructured":"Sharma, V., Beniwal, R., & Kumar, V. (2024). Multi-level trust-based secure and optimal IoT-WSN routing for environmental monitoring applications. In Journal of Supercomputing. Springer US. https:\/\/doi.org\/10.1007\/s11227-023-05875-z","DOI":"10.1007\/s11227-023-05875-z"},{"issue":"3","key":"10983_CR28","doi-asserted-by":"publisher","first-page":"2235","DOI":"10.1007\/s11277-021-08990-3","volume":"122","author":"M Tay","year":"2022","unstructured":"Tay, M., & Senturk, A. (2022). A new energy-aware cluster head selection algorithm for wireless sensor networks. Wireless Personal Communications, 122(3), 2235\u20132251. https:\/\/doi.org\/10.1007\/s11277-021-08990-3","journal-title":"Wireless Personal Communications"},{"issue":"9","key":"10983_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0218126620501418","volume":"29","author":"ME Bayrakdar","year":"2020","unstructured":"Bayrakdar, M. E. (2020). Energy-efficient technique for monitoring of agricultural areas with terrestrial wireless sensor networks. Journal of Circuits, Systems and Computers, 29(9), 1\u201317. https:\/\/doi.org\/10.1142\/S0218126620501418","journal-title":"Journal of Circuits, Systems and Computers"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-10983-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-10983-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-10983-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T12:14:04Z","timestamp":1713788044000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-10983-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["10983"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-10983-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2]]},"assertion":[{"value":"18 March 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent of publication"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}