{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T16:14:03Z","timestamp":1757780043141,"version":"3.28.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T00:00:00Z","timestamp":1699574400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T00:00:00Z","timestamp":1699574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s11760-023-02834-2","type":"journal-article","created":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T10:02:03Z","timestamp":1699610523000},"page":"1317-1327","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive graphical routing methodology for reducing traffic overhead in wireless sensor networks"],"prefix":"10.1007","volume":"18","author":[{"given":"C.","family":"Sureshkumar","sequence":"first","affiliation":[]},{"given":"S.","family":"Sabena","sequence":"additional","affiliation":[]},{"given":"L.","family":"Sai Ramesh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,10]]},"reference":[{"key":"2834_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11276-016-1412-y","volume":"24","author":"NT Tam","year":"2018","unstructured":"Tam, N.T., Hai, D.T., Son, L.H., Vinh, L.T.: Improving lifetime and network connections of 3D wireless sensor networks based on fuzzy clustering and particle swarm optimization. Wirel. Netw. 24, 1\u201314 (2018)","journal-title":"Wirel. Netw."},{"issue":"12","key":"2834_CR2","doi-asserted-by":"publisher","first-page":"5796","DOI":"10.1109\/TWC.2009.12.090220","volume":"8","author":"WJ Liu","year":"2009","unstructured":"Liu, W.J., Feng, K.T.: Three-dimensional greedy anti-void routing for wireless sensor networks. IEEE Trans. Wirel. Commun. 8(12), 5796\u20135800 (2009)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"2834_CR3","doi-asserted-by":"crossref","unstructured":"Bechkit, W., Koudil, M., Challal, Y., Bouabdallah, A., Souici, B. and Benatchba, K., 2012, July. A new Weighted Shortest Path Tree for Convergecast Traffic Routing in WSN. In computers and communications (ISCC), 2012 IEEE symposium on (pp. 000187\u2013000192). IEEE","DOI":"10.1109\/ISCC.2012.6249291"},{"issue":"1","key":"2834_CR4","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1049\/iet-wss.2012.0150","volume":"4","author":"D Kumar","year":"2013","unstructured":"Kumar, D.: Performance analysis of energy efficient clustering protocols for maximising lifetime of wireless sensor networks. IET Wirel. Sens. Syst. 4(1), 9\u201316 (2013)","journal-title":"IET Wirel. Sens. Syst."},{"issue":"1","key":"2834_CR5","doi-asserted-by":"publisher","first-page":"834784","DOI":"10.1155\/2012\/834784","volume":"8","author":"J Kabara","year":"2012","unstructured":"Kabara, J., Calle, M.: MAC protocols used by wireless sensor network and a general method of performance evaluation. Int. J. Distrib. Sens. Netw. 8(1), 834784 (2012). https:\/\/doi.org\/10.1155\/2012\/834784","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"2834_CR6","doi-asserted-by":"crossref","unstructured":"Hassanein, H. and Luo, J.: Reliable energy aware routing in wireless sensor networks. In: Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems (pp. 54\u201364). IEEE (2006)","DOI":"10.1109\/DSSNS.2006.10"},{"key":"2834_CR7","unstructured":"Weber, V.: Smart sensor networks: Technologies and applications for green growth. In: Proceedings of the 2009 OECD Conference on ICTs Environment and Climate Change, May 27\u201328, 2009, OECD Publishing, Helsingor, Denmark, pp: l -48 (2009)"},{"key":"2834_CR8","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MIM.2009.4811133","volume":"12","author":"C Alippi","year":"2009","unstructured":"Alippi, C., Anastasi, G., Di Francesco, M., Roveri, M.: Energy management in wireless sensor networks with energy-hungry sensors. Instrumen. Measur. Mag. 12, 16\u201323 (2009)","journal-title":"Instrumen. Measur. Mag."},{"key":"2834_CR9","doi-asserted-by":"crossref","unstructured":"Wang, Z., Zhang, D., Alfandi, O. and Hogrefe, D.: Efficient geographical 3D routing for Wireless Sensor Networks in smart spaces. In: Internet Communications (BCFIC Riga), 2011 Baltic Congress on Future (pp. 168\u2013172). IEEE (2011)","DOI":"10.1109\/BCFIC-RIGA.2011.5733230"},{"issue":"4","key":"2834_CR10","doi-asserted-by":"publisher","first-page":"1377","DOI":"10.1007\/s11277-018-5644-2","volume":"100","author":"Yu Xiuwu","year":"2018","unstructured":"Xiuwu, Yu., Feng, Z., Lixing, Z., Qin, L.: Novel data fusion algorithm based on event-driven and dempster-shafer evidence theory. Wirel. Pers. Commun. 100(4), 1377\u20131391 (2018)","journal-title":"Wirel. Pers. Commun."},{"issue":"7","key":"2834_CR11","doi-asserted-by":"publisher","first-page":"3037","DOI":"10.1109\/TCOMM.2017.2694006","volume":"65","author":"TM Getu","year":"2017","unstructured":"Getu, T.M., Ajib, W., Yeste-Ojeda, O.A.: Tensor-based efficient multi-interferer RFI excision algorithms for SIMO systems. IEEE Trans. Commun. 65(7), 3037\u20133052 (2017)","journal-title":"IEEE Trans. Commun."},{"issue":"4","key":"2834_CR12","doi-asserted-by":"publisher","first-page":"1393","DOI":"10.1007\/s11277-018-5645-1","volume":"100","author":"GU Mali","year":"2018","unstructured":"Mali, G.U., Gautam, D.K.: Shortest path evaluation in wireless network using fuzzy logic. Wirel. Pers. Commun. 100(4), 1393\u20131404 (2018)","journal-title":"Wirel. Pers. Commun."},{"key":"2834_CR13","doi-asserted-by":"crossref","unstructured":"Liu, Y, F. Jiang, H Liu and J. Wu, 2012. SC-MAC: A sender-centric asynchronous MAC protocol for burst traffic in wireless sensor networks. In: Proceedings of the 18th Asia-Pacific Conference on Communications (APCC\u2019l 2), October 15\u201317, 2012, IEEE, Jeju Island, South Korea, ISBN: 978-1-4673-4726-6, pp: 848\u2013853","DOI":"10.1109\/APCC.2012.6388202"},{"issue":"3","key":"2834_CR14","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s12083-016-0524-6","volume":"10","author":"TG Nguyen","year":"2017","unstructured":"Nguyen, T.G., So-In, C., Nguyen, N.G., Phoemphon, S.: A novel energy-efficient clustering protocol with area coverage awareness for wireless sensor networks. Peer-to-Peer Netw. Appl. 10(3), 519\u2013536 (2017)","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"1","key":"2834_CR15","first-page":"15","volume":"4","author":"M Yoon","year":"2013","unstructured":"Yoon, M., Kim, Y.K., Chang, J.W.: An energy-efficient routing protocol using message success rate in wireless sensor networks. JoC 4(1), 15\u201322 (2013)","journal-title":"JoC"},{"issue":"2","key":"2834_CR16","first-page":"184","volume":"9","author":"Z Guoxing","year":"2011","unstructured":"Guoxing, Z., Weisong, S.: Design and implementation of TARF: a trust aware routing framework for wireless sensor networks. IEEE Trans. Depend. Sec. Comput. 9(2), 184\u2013197 (2011)","journal-title":"IEEE Trans. Depend. Sec. Comput."},{"issue":"5","key":"2834_CR17","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/s12083-017-0585-1","volume":"11","author":"Z Wang","year":"2018","unstructured":"Wang, Z., Zhang, L., Zheng, Z., Wang, J.: Energy balancing RPL protocol with multipath for wireless sensor networks. Peer-to-Peer Netw. Appl. 11(5), 1085\u20131100 (2018)","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"1","key":"2834_CR18","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TSUSC.2017.2666844","volume":"2","author":"D Djenouri","year":"2017","unstructured":"Djenouri, D., Bagaa, M.: Energy-aware constrained relay node deployment for sustainable wireless sensor networks. IEEE Trans. Sust. Comput. 2(1), 30\u201342 (2017)","journal-title":"IEEE Trans. Sust. Comput."},{"key":"2834_CR19","doi-asserted-by":"crossref","unstructured":"Karp, B., Kung H.-T.: GPSR: greedy perimeter stateless routing for wireless networks. In: 243\u2013254ACM (2000)","DOI":"10.1145\/345910.345953"},{"issue":"3","key":"2834_CR20","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/JSEN.2015.2487140","volume":"16","author":"SF Rubeaai","year":"2016","unstructured":"Rubeaai, S.F., Al-Abd, M.A., Singh, B.K., Tepe, K.E.: 3D real-time routing protocol with tunable parameters for wireless sensor networks. IEEE Sens. J. 16(3), 843\u2013853 (2016)","journal-title":"IEEE Sens. J."},{"key":"2834_CR21","doi-asserted-by":"crossref","unstructured":"Giruka Venkata C., Singhal Mukesh. Angular routing protocol for mobile ad hoc networks. In: ICDCSW \u201805:551\u2013557IEEE Computer Society; Washington, DC, USA (2005)","DOI":"10.1109\/ICDCSW.2005.42"},{"key":"2834_CR22","doi-asserted-by":"crossref","unstructured":"Huang, M., Li, F. and Wang, Y.: Energy-efficient restricted greedy routing for three dimensional random wireless networks. In: International Conference on Wireless Algorithms, Systems, and Applications (pp. 95\u2013104). Springer Berlin Heidelberg (2010)","DOI":"10.1007\/978-3-642-14654-1_12"},{"issue":"11","key":"2834_CR23","doi-asserted-by":"publisher","first-page":"1076","DOI":"10.1016\/j.comcom.2004.01.012","volume":"27","author":"H Marc","year":"2004","unstructured":"Marc, H., Torsten, B., Thomas, B., Markus, W\u00e4Lchli.: BLR: beacon-less routing algorithm for mobile ad hoc networks. Comput. Commun. 27(11), 1076\u20131086 (2004)","journal-title":"Comput. Commun."},{"issue":"6","key":"2834_CR24","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1109\/TMC.2017.2771424","volume":"17","author":"H Huang","year":"2018","unstructured":"Huang, H., Yin, H., Min, G., Zhang, J., Wu, Y., Zhang, X.: Energy-aware dual-path geographic routing to bypass routing holes in wireless sensor networks. IEEE Trans. Mob. Comput. 17(6), 1339\u20131352 (2018)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"2","key":"2834_CR25","first-page":"215","volume":"15","author":"L Bing-Hong","year":"2015","unstructured":"Bing-Hong, L., Van-Trung, P., Bo-Yu, H., Shih-Wei, C.: Virtual-coordinate-based delivery-guaranteed routing protocol in three-dimensional wireless sensor networks. Wirel. Commun. Mobile Comput. 15(2), 215\u2013227 (2015)","journal-title":"Wirel. Commun. Mobile Comput."},{"key":"2834_CR26","doi-asserted-by":"publisher","first-page":"2891","DOI":"10.1109\/JSEN.2012.2204737","volume":"12","author":"L Jin-Shyan","year":"2012","unstructured":"Jin-Shyan, L., Wei-Liang, C.: Fuzzy-logic-based clustering approach for wireless sensor networks using energy predication. IEEE Sens. J. 12, 2891 (2012)","journal-title":"IEEE Sens. J."},{"key":"2834_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5653-1","author":"V Saranya","year":"2018","unstructured":"Saranya, V., Shankar, S., Kanagachidambaresan, G.R.: Energy efficient clustering scheme (EECS) for wireless sensor network with mobile sink. Wirel. Pers. Commun. (2018). https:\/\/doi.org\/10.1007\/s11277-018-5653-1","journal-title":"Wirel. Pers. Commun."},{"issue":"7","key":"2834_CR28","doi-asserted-by":"publisher","first-page":"1864","DOI":"10.1109\/TPDS.2013.240","volume":"25","author":"L Cheng","year":"2014","unstructured":"Cheng, L., Niu, J., Cao, J., Das, S.K., Gu, Y.: QoS aware geographic opportunistic routing in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(7), 1864\u20131875 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"4","key":"2834_CR29","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1016\/j.comcom.2007.10.037","volume":"31","author":"AE Abdallah","year":"2008","unstructured":"Abdallah, A.E., Fevens, T., Opatrny, J.: High delivery rate position-based routing algorithms for 3D ad hoc networks. Comput. Commun. 31(4), 807\u2013817 (2008)","journal-title":"Comput. Commun."},{"key":"2834_CR30","doi-asserted-by":"crossref","unstructured":"Abdallah, A.E., Fevens, T., and Opatrny, J.: June. Power-aware 3D position-based routing algorithms for ad hoc networks. In: 2007 IEEE International Conference on Communications (pp. 3130\u20133135). IEEE (2007)","DOI":"10.1109\/ICC.2007.519"},{"key":"2834_CR31","doi-asserted-by":"crossref","unstructured":"Tang, L., Y. Sun, 0. Gurewitz and D.B. Johnson, 2011. PW-MAC: An energy-efficient predictive-wakeup MAC protocol for wireless sensor networks. Proceedings of the Conference on IEEE InfOCOM, 10\u201315, IEEE, Houston, Texas, ISBN: 978-l-4244-9921-2, pp 1305\u20131313 (2011)","DOI":"10.1109\/INFCOM.2011.5934913"},{"key":"2834_CR32","doi-asserted-by":"crossref","unstructured":"Braginsky, D. and Estrin, D.: September. Rumor routing algorithm for sensor networks. In: Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications (pp. 22\u201331). ACM (2002)","DOI":"10.1145\/570738.570742"},{"key":"2834_CR33","doi-asserted-by":"publisher","first-page":"e4768","DOI":"10.1002\/dac.4768","volume":"34","author":"S Sefati","year":"2021","unstructured":"Sefati, S., Abdi, M., Ghaffari, A.: Cluster-based data transmission scheme in wireless sensor networks using black hole and ant colony algorithms. Int. J. Commun. Syst. 34, e4768 (2021)","journal-title":"Int. J. Commun. Syst."},{"key":"2834_CR34","doi-asserted-by":"publisher","first-page":"3233","DOI":"10.1007\/s11277-017-3992-y","volume":"95","author":"DN Hossein","year":"2017","unstructured":"Hossein, D.N., Ali, G.: Protocol for controlling congestion in wireless sensor networks. Wirel. Pers. Commun. 95, 3233\u20133251 (2017)","journal-title":"Wirel. Pers. Commun."},{"key":"2834_CR35","doi-asserted-by":"publisher","first-page":"103622","DOI":"10.1016\/j.csi.2022.103622","volume":"82","author":"A Seyfollahi","year":"2022","unstructured":"Seyfollahi, A., Moodi, M., Ghaffari, A.: MFO-RPL: a secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications. Comput. Stand. Interf. 82, 103622 (2022)","journal-title":"Comput. Stand. Interf."},{"key":"2834_CR36","doi-asserted-by":"publisher","first-page":"1886","DOI":"10.1007\/s12083-020-00933-2","volume":"13","author":"A Seyfollahi","year":"2020","unstructured":"Seyfollahi, A., Ghaffari, A.: Reliable data dissemination for the internet of things using Harris hawks optimization. Peer-to-Peer Netw. Appl. 13, 1886\u20131902 (2020)","journal-title":"Peer-to-Peer Netw. Appl."}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02834-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-023-02834-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02834-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T20:22:31Z","timestamp":1730492551000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-023-02834-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,10]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["2834"],"URL":"https:\/\/doi.org\/10.1007\/s11760-023-02834-2","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"type":"print","value":"1863-1703"},{"type":"electronic","value":"1863-1711"}],"subject":[],"published":{"date-parts":[[2023,11,10]]},"assertion":[{"value":"4 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they do not have any conflict of interest. This research does not involve any human or animal participation. All authors have checked and agreed the submission.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}