{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:31:21Z","timestamp":1772119881290,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1007\/s11277-024-11289-8","type":"journal-article","created":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T03:02:07Z","timestamp":1718852527000},"page":"469-487","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["PathGuard: Trustworthy Routing for Sustainable and Secure IoT-WSN Networks"],"prefix":"10.1007","volume":"136","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7557-1084","authenticated-orcid":false,"given":"Neeraj","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Sanjeev","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,20]]},"reference":[{"issue":"2","key":"11289_CR1","doi-asserted-by":"publisher","first-page":"87","DOI":"10.3390\/info12020087","volume":"12","author":"M Lombardi","year":"2021","unstructured":"Lombardi, M., Pascale, F., & Santaniello, D. (2021). Internet of Things: A general overview between architectures, protocols and applications. Information, 12(2), 87.","journal-title":"Information"},{"key":"11289_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99007-1_38","author":"H Aldowah","year":"2019","unstructured":"Aldowah, H., Rehman, S., & Umar, I. (2019). Security in Internet of Things: Issues. Challenges, and Solutions. https:\/\/doi.org\/10.1007\/978-3-319-99007-1_38","journal-title":"Challenges, and Solutions."},{"key":"11289_CR3","doi-asserted-by":"publisher","first-page":"161103","DOI":"10.1109\/ACCESS.2021.3131367","volume":"9","author":"S Lata","year":"2021","unstructured":"Lata, S., Mehfuz, S., & Urooj, S. (2021). Secure and reliable WSN for Internet of Things: Challenges and enabling technologies. IEEE Access, 9, 161103\u2013161128. https:\/\/doi.org\/10.1109\/ACCESS.2021.3131367","journal-title":"IEEE Access"},{"key":"11289_CR4","doi-asserted-by":"publisher","first-page":"108974","DOI":"10.1016\/j.measurement.2021.108974","volume":"178","author":"P Nayak","year":"2021","unstructured":"Nayak, P., Swetha, G. K., Gupta, S., & Madhavi, K. (2021). Routing in wireless sensor networks using machine learning techniques: Challenges and opportunities. Measurement, 178, 108974.","journal-title":"Measurement"},{"issue":"2","key":"11289_CR5","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1007\/s11277-021-08564-3","volume":"127","author":"DK Bangotra","year":"2022","unstructured":"Bangotra, D. K., Singh, Y., Selwal, A., Kumar, N., & Singh, P. K. (2022). A trust based secure intelligent opportunistic routing protocol for wireless sensor networks. Wireless Personal Communications, 127(2), 1045\u20131066.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"11289_CR6","first-page":"45","volume":"12","author":"KO Ibrahim","year":"2020","unstructured":"Ibrahim, K. O., & Abdulsahib, G. M. (2020). Energy efficient routing and reliable data transmission protocol in WSN. International Journal of Advance Soft Computing and its Applications, 12(3), 45\u201353.","journal-title":"International Journal of Advance Soft Computing and its Applications"},{"key":"11289_CR7","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/978-981-32-9949-8_48","volume":"1","author":"NA Azeez","year":"2020","unstructured":"Azeez, N. A., Bada, T. M., Misra, S., Adewumi, A., Vyver, C. V. D., & Ahuja, R. (2020). Intrusion detection and prevention systems: an updated review. Data Management, Analytics and Innovation: Proceedings of ICDMAI 2019, 1, 685\u2013696.","journal-title":"Data Management, Analytics and Innovation: Proceedings of ICDMAI 2019"},{"issue":"5","key":"11289_CR8","first-page":"3732","volume":"9","author":"R Bhandari","year":"2019","unstructured":"Bhandari, R., & Kirubanand, V. B. (2019). Enhanced encryption technique for secure iot data transmission. International Journal of Electrical and Computer Engineering, 9(5), 3732.","journal-title":"International Journal of Electrical and Computer Engineering"},{"issue":"6","key":"11289_CR9","doi-asserted-by":"publisher","first-page":"4186","DOI":"10.1109\/JIOT.2020.3031162","volume":"8","author":"SM Muzammal","year":"2021","unstructured":"Muzammal, S. M., Murugesan, R. K., & Jhanjhi, N. Z. (2021). A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches. IEEE Internet of Things Journal, 8(6), 4186\u20134210. https:\/\/doi.org\/10.1109\/JIOT.2020.3031162","journal-title":"IEEE Internet of Things Journal"},{"key":"11289_CR10","doi-asserted-by":"crossref","unstructured":"Alqarni, Hussain, Wael Alnahari, and Mohammad Tabrez Quasim (2021) Internet of things (IoT) security requirements: Issues related to sensors\u00a02021 National Computing Colleges Conference (NCCC). IEEE","DOI":"10.1109\/NCCC49330.2021.9428857"},{"key":"11289_CR11","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/3453176","volume":"2","author":"AI Newaz","year":"2021","unstructured":"Newaz, A. I., Sikder, A. K., Rahman, M. A., & Uluagac, A. S. (2021). A survey on security and privacy issues in modern healthcare systems: Attacks and defences. ACM Transactions on Computing for Healthcare, 2, 21\u201344.","journal-title":"ACM Transactions on Computing for Healthcare"},{"issue":"16","key":"11289_CR12","doi-asserted-by":"publisher","first-page":"6215","DOI":"10.3390\/s22166215","volume":"22","author":"SM Muzammal","year":"2022","unstructured":"Muzammal, S. M., Murugesan, R. K., Jhanjhi, N. Z., Hossain, M. S., & Yassine, A. (2022). Trust and mobility-based protocol for secure routing in Internet of Things. Sensors (Basel), 22(16), 6215.","journal-title":"Sensors (Basel)"},{"key":"11289_CR13","unstructured":"Rani, A and Malik, A. (2022). A social relationship-based energy-efficient routing scheme for opportunistic Internet of Things, ICT Express, 8(2)."},{"issue":"7","key":"11289_CR14","doi-asserted-by":"publisher","first-page":"e0271277","DOI":"10.1371\/journal.pone.0271277","volume":"17","author":"D Arshad","year":"2022","unstructured":"Arshad, D., Asim, M., Tariq, N., Baker, T., Tawfik, H., & Al-Jumeily, O. (2022). THC-RPL: A lightweight trust-enabled routing in RPL-based IoT networks against Sybil attack. PLoS ONE, 17(7), e0271277.","journal-title":"PLoS ONE"},{"issue":"2","key":"11289_CR15","doi-asserted-by":"publisher","first-page":"4243","DOI":"10.3934\/mbe.2023198","volume":"20","author":"B Kiruthika","year":"2023","unstructured":"Kiruthika, B., & ShyamalaBharathi, P. (2023). Intelligent dynamic trust secure attacker detection routing for WSN-IoT networks. Mathematical Biosciences and Engineering, 20(2), 4243\u20134257.","journal-title":"Mathematical Biosciences and Engineering"},{"key":"11289_CR16","doi-asserted-by":"publisher","first-page":"100208","DOI":"10.1016\/j.iot.2020.100208","volume":"11","author":"SM Mostafa","year":"2020","unstructured":"Mostafa, S. M., Darwish, I. M., & Saadi, M. R. (2020). Improved lightweight security approach routing protocol in internet of things. Internet of Things, 11, 100208.","journal-title":"Internet of Things"},{"issue":"19","key":"11289_CR17","doi-asserted-by":"publisher","first-page":"18760","DOI":"10.1109\/JIOT.2022.3162106","volume":"9","author":"C Li","year":"2022","unstructured":"Li, C., Liu, Y., Xiao, J., & Zhou, J. (2022). MCEAACO-QSRP: A novel QoS-secure routing protocol for industrial Internet of Things. IEEE Internet of Things Journal, 9(19), 18760\u201318777.","journal-title":"IEEE Internet of Things Journal"},{"issue":"5","key":"11289_CR18","doi-asserted-by":"publisher","first-page":"9197","DOI":"10.3233\/JIFS-201633","volume":"40","author":"AR Rajeswari","year":"2021","unstructured":"Rajeswari, A. R., Kulothungan, K., Ganapathy, S., & Kannan, A. (2021). Trusted energy aware cluster based routing using fuzzy logic for WSN in IoT. Journal of Intelligent & Fuzzy Systems, 40(5), 9197\u20139211.","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"11289_CR19","doi-asserted-by":"crossref","unstructured":"Prathapchandran, K., and Janani T. (2021). A trust-based security model to detect misbehaving nodes in Internet of Things (IoT) environment using logistic regression.\u00a0Journal of physics: conference series. 1850(1).","DOI":"10.1088\/1742-6596\/1850\/1\/012031"},{"issue":"1","key":"11289_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-018-1174-6","volume":"2018","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Zhang, M., & Shu, W. (2018). An emerging intelligent optimization algorithm based on trust sensing model for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2018(1), 1\u201310.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"2","key":"11289_CR21","doi-asserted-by":"publisher","first-page":"1967","DOI":"10.32604\/cmc.2021.015259","volume":"68","author":"H Shahid","year":"2021","unstructured":"Shahid, H., Ashraf, H., Javed, H., Humayun, M., Jhanjhi, N., & AlZain, M. A. (2021). Energy optimised security against wormhole attack in iot-based wireless sensor networks. Computers, Materials & Continua, 68(2), 1967\u20131981.","journal-title":"Computers, Materials & Continua"},{"issue":"1","key":"11289_CR22","doi-asserted-by":"publisher","first-page":"1910","DOI":"10.1038\/s41598-023-28721-x","volume":"13","author":"T Khan","year":"2023","unstructured":"Khan, T., Singh, K., Ahmad, K., & Ahmad, K. A. B. (2023). A secure and dependable trust assessment (SDTS) scheme for industrial communication networks. Scientific Reports, 13(1), 1910.","journal-title":"Scientific Reports"},{"issue":"1","key":"11289_CR23","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1080\/23335777.2021.1933194","volume":"9","author":"B Rakesh","year":"2023","unstructured":"Rakesh, B. (2023). Novel authentication and secure trust based RPL routing in mobile sink supported Internet of Things. Cyber-Physical Systems, 9(1), 43\u201376.","journal-title":"Cyber-Physical Systems"},{"key":"11289_CR24","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1016\/j.future.2021.06.049","volume":"125","author":"T Khan","year":"2021","unstructured":"Khan, T., Singh, K., Hasan, M. H., Ahmad, K., Reddy, G. T., Mohan, S., & Ahmadian, A. (2021). ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs. Future Generation Computer Systems, 125, 921.","journal-title":"Future Generation Computer Systems"},{"issue":"7","key":"11289_CR25","doi-asserted-by":"publisher","first-page":"7361","DOI":"10.1109\/JSEN.2022.3152841","volume":"22","author":"Z Teng","year":"2022","unstructured":"Teng, Z., Du, C., Li, M., Zhang, H., & Zhu, W. (2022). A wormhole attack detection algorithm integrated with the node trust optimization model in WSNs. IEEE Sensors Journal, 22(7), 7361\u20137370.","journal-title":"IEEE Sensors Journal"},{"issue":"4","key":"11289_CR26","doi-asserted-by":"publisher","first-page":"2045","DOI":"10.3390\/app12042045","volume":"12","author":"H Alrahhal","year":"2022","unstructured":"Alrahhal, H., Fouda, M. E., Alsebti, S., et al. (2022). Utilising acknowledge for the trust in wireless sensor networks. Applied Sciences, 12(4), 2045.","journal-title":"Applied Sciences"},{"key":"11289_CR27","doi-asserted-by":"publisher","first-page":"120192","DOI":"10.1016\/j.eswa.2023.120192","volume":"225","author":"S Shen","year":"2023","unstructured":"Shen, S., Wu, X., Sun, P., Zhou, H., Wu, Z., & Yu, S. (2023). Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems. Expert Systems with Application, 225, 120192.","journal-title":"Expert Systems with Application"},{"issue":"5","key":"11289_CR28","doi-asserted-by":"publisher","first-page":"1228","DOI":"10.1109\/TPDS.2014.2320505","volume":"26","author":"J Jiang","year":"2015","unstructured":"Jiang, J., Han, G., Wang, F., Shu, L., & Guizani, M. (2015). An efficient distributed trust model for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(5), 1228\u20131237.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"11289_CR29","doi-asserted-by":"publisher","first-page":"1753","DOI":"10.1007\/s11277-022-09632-y","volume":"125","author":"U Meena","year":"2022","unstructured":"Meena, U., & Sharma, P. (2022). secret dynamic key authentication and decision trust secure routing framework for Internet of Things based WSN. Wireless Personal Communications, 125, 1753\u20131781.","journal-title":"Wireless Personal Communications"},{"key":"11289_CR30","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1007\/s11036-021-01859-6","volume":"27","author":"N Chandnani","year":"2022","unstructured":"Chandnani, N., & Khairnar, C. N. (2022). Bio-inspired multilevel security protocol for data aggregation and routing in IoT WSNs. Mobile Netw Appl, 27, 1030\u20131049.","journal-title":"Mobile Netw Appl"},{"key":"11289_CR31","doi-asserted-by":"crossref","unstructured":"Kumar N, Sharma S. (2023). IFMN model: An advanced classification architecture for intrusion detection with HYFSPSO method, Authorea Preprints.","DOI":"10.22541\/au.167989031.17885154\/v1"},{"issue":"2","key":"11289_CR32","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1007\/s11277-021-08564-3","volume":"127","author":"DK Bangotra","year":"2022","unstructured":"Bangotra, D. K., Singh, Y., Selwal, A., Kumar, N., & Singh, P. K. (2022). A trust based secure intelligent opportunistic routing protocol for wireless sensor networks. Wireless Personal Communications, 127(2), 1045\u20131066.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"11289_CR33","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.eij.2023.02.002","volume":"24","author":"B Su","year":"2023","unstructured":"Su, B., & Zhu, B. (2023). TBMOR: A lightweight trust-based model for secure routing of opportunistic networks. Egyptian Informatics Journal, 24(2), 205\u2013214.","journal-title":"Egyptian Informatics Journal"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11289-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11289-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11289-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T13:24:04Z","timestamp":1719321844000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11289-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["11289"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11289-8","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3039565\/v1","asserted-by":"object"}]},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5]]},"assertion":[{"value":"8 June 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Relation to the current work, the authors have not reported any conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}