{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:41:37Z","timestamp":1740148897163,"version":"3.37.3"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,9,5]],"date-time":"2020-09-05T00:00:00Z","timestamp":1599264000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,5]],"date-time":"2020-09-05T00:00:00Z","timestamp":1599264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evol. Intel."],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s12065-020-00478-6","type":"journal-article","created":{"date-parts":[[2020,9,5]],"date-time":"2020-09-05T09:02:41Z","timestamp":1599296561000},"page":"923-939","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A node to node security for sensor nodes implanted in cross cover multi-layer architecture using Mc-Nie algorithm"],"prefix":"10.1007","volume":"14","author":[{"given":"Kumar Babu","family":"Batta","sequence":"first","affiliation":[]},{"given":"Venkateswara Rao","family":"Gurrala","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6146-5272","authenticated-orcid":false,"given":"Vishnu Srinivasa Murthy","family":"Yarlagadda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,5]]},"reference":[{"key":"478_CR1","doi-asserted-by":"crossref","unstructured":"Ahmad A, Rathore MM, Paul A, Chen BW (2015) Data transmission scheme using mobile sink in static wireless sensor network. J Sens 2015)","DOI":"10.1155\/2015\/279304"},{"issue":"4","key":"478_CR2","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393\u2013422","journal-title":"Comput Netw"},{"issue":"1","key":"478_CR3","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s10916-010-9449-4","volume":"36","author":"M Al Ameen","year":"2012","unstructured":"Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93\u2013101","journal-title":"J Med Syst"},{"issue":"1","key":"478_CR4","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1186\/s13673-019-0198-1","volume":"9","author":"TA Alghamdi","year":"2019","unstructured":"Alghamdi TA (2019) Convolutional technique for enhancing security in wireless sensor networks against malicious nodes. Hum Cent Comput Inf Sci 9(1):38","journal-title":"Hum Cent Comput Inf Sci"},{"key":"478_CR5","unstructured":"Alkhatib AAA, Baicher GS (2012) Wireless sensor network architecture. In: 2012 International conference on computer networks and communication systems (CNCS 2012)"},{"key":"478_CR6","doi-asserted-by":"crossref","unstructured":"Arampatzis T, Lygeros J, Manesis S (2005) A survey of applications of wireless sensors and wireless sensor networks. In: Proceedings of the 2005 IEEE international symposium on, mediterrean conference on control and automation intelligent control, 2005, IEEE, pp 719\u2013724","DOI":"10.1109\/.2005.1467103"},{"issue":"3\u20134","key":"478_CR7","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1504\/IJSNET.2011.040236","volume":"9","author":"AP Azad","year":"2011","unstructured":"Azad AP, Chockalingam A (2011) Enhancing lifetime of wireless sensor networks using multiple data sinks. Int J Sens Netw 9(3\u20134):139\u2013157","journal-title":"Int J Sens Netw"},{"issue":"3","key":"478_CR8","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1002\/wcm.763","volume":"10","author":"T Banerjee","year":"2010","unstructured":"Banerjee T, Xie B, Jun JH, Agrawal DP (2010) Increasing lifetime of wireless sensor networks using controllable mobile cluster heads. Wirel Commun Mobile Comput 10(3):313\u2013336","journal-title":"Wirel Commun Mobile Comput"},{"key":"478_CR9","doi-asserted-by":"crossref","unstructured":"Barrenetxea G, Ingelrest F, Schaefer G, Vetterli M, Couach O, Parlange M (2008) Sensorscope: out-of-the-box environmental monitoring. In: Proceedings of the 7th international conference on Information processing in sensor networks, IEEE Computer Society, pp 332\u2013343","DOI":"10.1109\/IPSN.2008.28"},{"key":"478_CR10","doi-asserted-by":"crossref","unstructured":"Basagni S, Carosi A, Petrioli C, Phillips CA (2008) Moving multiple sinks through wireless sensor networks for lifetime maximization. In: 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, IEEE, pp 523\u2013526","DOI":"10.1109\/MAHSS.2008.4660067"},{"issue":"5","key":"478_CR11","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1016\/j.cor.2011.06.013","volume":"39","author":"B Behdani","year":"2012","unstructured":"Behdani B, Yun YS, Smith JC, Xia Y (2012) Decomposition algorithms for maximizing the lifetime of wireless sensor networks with mobile sinks. Comput Oper Res 39(5):1054\u20131061","journal-title":"Comput Oper Res"},{"key":"478_CR12","doi-asserted-by":"crossref","unstructured":"Bysani LK, Turuk AK (2011) A survey on selective forwarding attack in wireless sensor networks. In: 2011 International conference on devices and communications (ICDeCom), IEEE, pp 1\u20135","DOI":"10.1109\/ICDECOM.2011.5738547"},{"issue":"4","key":"478_CR13","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1109\/TNET.2004.833122","volume":"12","author":"J Chang","year":"2004","unstructured":"Chang J, Tassiulas L (2004) Maximum lifetime routing in wireless sensor networks. IEEE\/ACM Trans Netw 12(4):609\u2013619","journal-title":"IEEE\/ACM Trans Netw"},{"key":"478_CR14","unstructured":"Chang JH, Tassiulas L (1999) Routing for maximum system lifetime in wireless ad-hoc networks. In: Proceedings of the annual allerton conference on communication control and computing, The University; 1998, vol 37, pp 1191\u20131200"},{"issue":"2","key":"478_CR15","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s11036-010-0260-8","volume":"16","author":"M Chen","year":"2011","unstructured":"Chen M, Gonzalez S, Vasilakos A, Cao H, Leung VC (2011) Body area networks: a survey. Mob Netw Appl 16(2):171\u2013193","journal-title":"Mob Netw Appl"},{"key":"478_CR16","doi-asserted-by":"crossref","unstructured":"Chen S, Yang G, Chen S (2010) A security routing mechanism against sybil attack for wireless sensor networks. In: 2010 International conference on communications and mobile computing, IEEE, vol\u00a01, pp 142\u2013146","DOI":"10.1109\/CMC.2010.265"},{"key":"478_CR17","doi-asserted-by":"crossref","unstructured":"Choi K, Yun M, Chae K, Kim M (2012) An enhanced key management using zigbee pro for wireless sensor networks. In: The international conference on information network 2012, IEEE, pp 399\u2013403","DOI":"10.1109\/ICOIN.2012.6164409"},{"issue":"4","key":"478_CR18","doi-asserted-by":"publisher","first-page":"3","DOI":"10.4316\/AECE.2013.04001","volume":"13","author":"F Chung-Shuo","year":"2013","unstructured":"Chung-Shuo F (2013) Rich: region-based intelligent cluster-head selection and node deployment strategy in concentric-based wsns. Adv Electr Comput Eng 13(4):3\u20138","journal-title":"Adv Electr Comput Eng"},{"issue":"8","key":"478_CR19","doi-asserted-by":"publisher","first-page":"760834","DOI":"10.1155\/2013\/760834","volume":"9","author":"HN Dai","year":"2013","unstructured":"Dai HN, Wang Q, Li D, Wong RCW (2013) On eavesdropping attacks in wireless sensor networks with directional antennas. Int J Distrib Sens Netw 9(8):760834","journal-title":"Int J Distrib Sens Netw"},{"issue":"1","key":"478_CR20","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/TIT.2014.2371915","volume":"61","author":"Y Ding","year":"2014","unstructured":"Ding Y (2014) On list-decodability of random rank metric codes and subspace codes. IEEE Trans Inf Theory 61(1):51\u201359","journal-title":"IEEE Trans Inf Theory"},{"key":"478_CR21","doi-asserted-by":"crossref","unstructured":"Doost R, Chowdhury KR, Di\u00a0Felice M (2010) Routing and link layer protocol design for sensor networks with wireless energy transfer. In: 2010 IEEE global telecommunications conference GLOBECOM 2010, IEEE, pp 1\u20135","DOI":"10.1109\/GLOCOM.2010.5683334"},{"key":"478_CR22","doi-asserted-by":"crossref","unstructured":"Dutta N, Saxena A, Chellappan S (2010) Defending wireless sensor networks against adversarial localization. In: 2010 Eleventh international conference on mobile data management, IEEE, pp 336\u2013341","DOI":"10.1109\/MDM.2010.75"},{"key":"478_CR23","unstructured":"Feit S et al (1993) TCP\/IP: architecture, protocols, and implementation. McGraw-Hill"},{"key":"478_CR24","doi-asserted-by":"crossref","unstructured":"Gabidulin EM, Rashwan H, Honary B (2009) On improving security of gpt cryptosystems. In: 2009 IEEE international symposium on information theory, IEEE, pp 1110\u20131114","DOI":"10.1109\/ISIT.2009.5206029"},{"key":"478_CR25","unstructured":"Gaborit P, Murat G, Ruatta O, Z\u00e9mor G (2013) Low rank parity check codes and their application to cryptography. In: Proceedings of the workshop on coding and cryptography WCC, vol 2013"},{"issue":"3","key":"478_CR26","doi-asserted-by":"publisher","first-page":"984","DOI":"10.1109\/TWC.2008.060727","volume":"7","author":"M Gatzianas","year":"2008","unstructured":"Gatzianas M, Georgiadis L (2008) A distributed algorithm for maximum lifetime routing in sensor networks with mobile sink. IEEE Trans Wirel Commun 7(3):984\u2013994","journal-title":"IEEE Trans Wirel Commun"},{"key":"478_CR27","doi-asserted-by":"crossref","unstructured":"Granjal J, Monteiro E, Silva JS (2010) Enabling network-layer security on ipv6 wireless sensor networks. In: 2010 IEEE global telecommunications conference GLOBECOM 2010, IEEE, pp 1\u20136","DOI":"10.1109\/GLOCOM.2010.5684293"},{"key":"478_CR28","doi-asserted-by":"crossref","unstructured":"Gro\u00dfsch\u00e4dl J, Szekely A, Tillich S (2007) The energy cost of cryptographic key establishment in wireless sensor networks. In: Proceedings of the 2nd ACM symposium on Information, computer and communications security, pp 380\u2013382","DOI":"10.1145\/1229285.1229334"},{"issue":"3","key":"478_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MDSO.2006.19","volume":"7","author":"S Hadim","year":"2006","unstructured":"Hadim S, Mohamed N (2006) Middleware: middleware challenges and approaches for wireless sensor networks. IEEE Distrib Syst Online 7(3):1\u20131","journal-title":"IEEE Distrib Syst Online"},{"key":"478_CR30","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/1-84628-352-3_10","volume-title":"EC2ND 2005","author":"S Han","year":"2006","unstructured":"Han S, Chang E, Gao L, Dillon T (2006) Taxonomy of attacks on wireless sensor networks. EC2ND 2005. Springer, Berlin, pp 97\u2013105"},{"key":"478_CR31","doi-asserted-by":"crossref","unstructured":"Holland M, Wang T, Tavli B, Seyedi A, Heinzelman W (2011) Optimizing physical-layer parameters for wireless sensor networks. ACM Trans Sens Netw TOSN) 7(4):1\u201320","DOI":"10.1145\/1921621.1921622"},{"key":"478_CR32","doi-asserted-by":"crossref","unstructured":"Iyer YG, Gandham S, Venkatesan S (2005) Stcp: a generic transport layer protocol for wireless sensor networks. In: Proceedings. 14th International conference on computer communications and networks, 2005. ICCCN 2005, IEEE, pp 449\u2013454","DOI":"10.1109\/ICCCN.2005.1523908"},{"issue":"3","key":"478_CR33","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1023\/A:1027351723034","volume":"8","author":"H Janwa","year":"1996","unstructured":"Janwa H, Moreno O (1996) Mceliece public key cryptosystems using algebraic-geometric codes. Des Codes Cryptogr 8(3):293\u2013307","journal-title":"Des Codes Cryptogr"},{"issue":"6","key":"478_CR34","doi-asserted-by":"publisher","first-page":"1867","DOI":"10.1016\/j.compeleceng.2013.03.019","volume":"39","author":"SA Jeba","year":"2013","unstructured":"Jeba SA, Paramasivan B (2013) Energy efficient multipath data transfer scheme to mitigate false data injection attack in wireless sensor networks. Comput Electr Eng 39(6):1867\u20131879","journal-title":"Comput Electr Eng"},{"issue":"12","key":"478_CR35","doi-asserted-by":"publisher","first-page":"1987","DOI":"10.1093\/comjnl\/bxr048","volume":"54","author":"ME Keskin","year":"2011","unstructured":"Keskin ME, Altinel IK, Aras N, Ersoy C (2011) Lifetime maximization in wireless sensor networks using a mobile sink with nonzero traveling time. Comput J 54(12):1987\u20131999","journal-title":"Comput J"},{"key":"478_CR36","unstructured":"Kim JL, Kim YS, Galvez L, Kim MJ, Lee N (2018) Mcnie: a code-based public-key cryptosystem. arXiv preprint arXiv:181205008"},{"key":"478_CR37","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1117\/12.581617","volume":"5611","author":"G Klager","year":"2004","unstructured":"Klager G (2004) Networked sensors for the combat forces. Unmanned\/Unattended Sensors and Sensor Networks, International Society for Optics and Photonics 5611:204\u2013214","journal-title":"Unmanned\/Unattended Sensors and Sensor Networks, International Society for Optics and Photonics"},{"issue":"11","key":"478_CR38","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1109\/JPROC.2010.2065210","volume":"98","author":"J Ko","year":"2010","unstructured":"Ko J, Lu C, Srivastava MB, Stankovic JA, Terzis A, Welsh M (2010) Wireless sensor networks for healthcare. Proc IEEE 98(11):1947\u20131960","journal-title":"Proc IEEE"},{"key":"478_CR39","doi-asserted-by":"crossref","unstructured":"Kocakulak M, Butun I (2017) An overview of wireless sensor networks towards internet of things. In: 2017 IEEE 7th annual computing and communication workshop and conference (CCWC), IEEE, pp 1\u20136","DOI":"10.1109\/CCWC.2017.7868374"},{"key":"478_CR40","doi-asserted-by":"crossref","unstructured":"Lee SH, Lee S, Song H, Lee HS (2009) Wireless sensor network design for tactical military applications: remote large-scale environments. In: MILCOM 2009-2009 IEEE Military communications conference, IEEE, pp 1\u20137","DOI":"10.1109\/MILCOM.2009.5379900"},{"key":"478_CR41","unstructured":"Li J, Mohapatra P (2005) An analytical model for the energy hole problem in many-to-one sensor networks. In: IEEE vehicular technology conference, Citeseer, vol\u00a062, p 2721"},{"issue":"3","key":"478_CR42","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1109\/18.915687","volume":"47","author":"P Loidreau","year":"2001","unstructured":"Loidreau P, Sendrier N (2001) Weak keys in the mceliece public-key cryptosystem. IEEE Trans Inf Theory 47(3):1207\u20131211","journal-title":"IEEE Trans Inf Theory"},{"key":"478_CR43","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1007\/3-540-36978-3_35","volume-title":"Information processing in sensor networks","author":"JD Lundquist","year":"2003","unstructured":"Lundquist JD, Cayan DR, Dettinger MD (2003) Meteorology and hydrology in yosemite national park: a sensor network application. Information processing in sensor networks. Springer, Berlin, pp 518\u2013528"},{"key":"478_CR44","unstructured":"Lupu TG, Rudas I, Demiralp M, Mastorakis N (2009) Main types of attacks in wireless sensor networks. In: WSEAS international conference proceedings. Recent advances in computer engineering, WSEAS, 9"},{"key":"478_CR45","doi-asserted-by":"crossref","unstructured":"Manju V, Sasi KM (2012) Detection of jamming style dos attack in wireless sensor network. In: 2nd IEEE international conference on parallel. Distributed and grid computing, IEEE, pp 563\u2013567","DOI":"10.1109\/PDGC.2012.6449882"},{"key":"478_CR46","unstructured":"Min J, Kim J, Kwon Y, Lee Y (2012) Multi-channel mac protocol for real-time monitoring of weapon flight test in wireless sensor network. In: Proceedings of the sixth international conference on sensor technologies and applications, pp 83\u201388"},{"issue":"3","key":"478_CR47","doi-asserted-by":"publisher","first-page":"1658","DOI":"10.1109\/SURV.2013.121313.00064","volume":"16","author":"S Movassaghi","year":"2014","unstructured":"Movassaghi S, Abolhasan M, Lipman J, Smith D, Jamalipour A (2014) Wireless body area networks: a survey. IEEE Commun Surv Tutor 16(3):1658\u20131686","journal-title":"IEEE Commun Surv Tutor"},{"issue":"2","key":"478_CR48","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/s00145-007-9003-9","volume":"21","author":"R Overbeck","year":"2008","unstructured":"Overbeck R (2008) Structural attacks for public key cryptosystems based on gabidulin codes. J Cryptol 21(2):280\u2013301","journal-title":"J Cryptol"},{"key":"478_CR49","doi-asserted-by":"crossref","unstructured":"Patel MM, Aggarwal A (2013) Security attacks in wireless sensor networks: a survey. In: 2013 International conference on intelligent systems and signal processing (ISSP), IEEE, pp 329\u2013333","DOI":"10.1109\/ISSP.2013.6526929"},{"key":"478_CR50","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/j.procs.2016.03.094","volume":"79","author":"S Patil","year":"2016","unstructured":"Patil S, Chaudhari S (2016) Dos attack prevention technique in wireless sensor networks. Proc Comput Sci 79:715\u2013721","journal-title":"Proc Comput Sci"},{"issue":"6","key":"478_CR51","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A Perrig","year":"2004","unstructured":"Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Commun ACM 47(6):53\u201357","journal-title":"Commun ACM"},{"issue":"5","key":"478_CR52","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/332833.332838","volume":"43","author":"GJ Pottie","year":"2000","unstructured":"Pottie GJ, Kaiser WJ (2000) Wireless integrated network sensors. Commun ACM 43(5):51\u201358","journal-title":"Commun ACM"},{"key":"478_CR53","volume-title":"Wireless sensor networks","author":"CS Raghavendra","year":"2006","unstructured":"Raghavendra CS, Sivalingam KM, Znati T (2006) Wireless sensor networks. Springer, Berlin"},{"key":"478_CR54","unstructured":"Ranjeetha S, Renuga N, Sharmila R (2017) Secure zone routing protocol for manet. In: International conference on emerging trends in engineering, science and sustainable technology (ICETSST-2017), pp 67\u201376"},{"key":"478_CR55","doi-asserted-by":"crossref","unstructured":"Reindl P, Nygard K, Du X (2010) Defending malicious collision attacks in wireless sensor networks. In: 2010 IEEE\/IFIP international conference on embedded and ubiquitous computing, IEEE, pp 771\u2013776","DOI":"10.1109\/EUC.2010.121"},{"key":"478_CR56","doi-asserted-by":"crossref","unstructured":"Saghar K, Kendall D, Bouridane A (2015) Raeed: a solution for hello flood attack. In: 2015 12th International Bhurban conference on applied sciences and technology (IBCAST), IEEE, pp 248\u2013253","DOI":"10.1109\/IBCAST.2015.7058512"},{"key":"478_CR57","doi-asserted-by":"crossref","unstructured":"Salehi SA, Razzaque M, Naraei P, Farrokhtala A (2013) Detection of sinkhole attack in wireless sensor networks. In: 2013 IEEE international conference on space science and communication (IconSpace), IEEE, pp 361\u2013365","DOI":"10.1109\/IconSpace.2013.6599496"},{"issue":"1","key":"478_CR58","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1109\/TII.2012.2187909","volume":"9","author":"IK Samaras","year":"2012","unstructured":"Samaras IK, Hassapis GD, Gialelis JV (2012) A modified dpws protocol stack for 6lowpan-based wireless sensor networks. IEEE Trans Ind Inform 9(1):209\u2013217","journal-title":"IEEE Trans Ind Inform"},{"key":"478_CR59","unstructured":"Shahzad F, Pasha M, Ahmad A (2017) A survey of active attacks on wireless sensor networks and their countermeasures. arXiv preprint arXiv:170207136"},{"key":"478_CR60","doi-asserted-by":"crossref","unstructured":"Sharma V, Hussain M (2017) Mitigating replay attack in wireless sensor network through assortment of packets. In: Proceedings of the first international conference on computational intelligence and informatics, Springer, Berlin, pp 221\u2013230","DOI":"10.1007\/978-981-10-2471-9_22"},{"key":"478_CR61","unstructured":"Shukla J, Kumari B (2013) Security threats and defense approaches in wireless sensor networks: an overview. Int J Appl Innov Eng Manag IJAIEM) 2(3)"},{"issue":"3","key":"478_CR62","first-page":"23","volume":"7","author":"VP Singh","year":"2010","unstructured":"Singh VP, Jain S, Singhai J (2010) Hello flood attack and its countermeasures in wireless sensor networks. Int J Comput Sci Issues (IJCSI) 7(3):23","journal-title":"Int J Comput Sci Issues (IJCSI)"},{"key":"478_CR63","doi-asserted-by":"crossref","unstructured":"Thombre S, Islam RU, Andersson K, Hossain MS (2016) Performance analysis of an ip based protocol stack for wsns. In: 2016 IEEE conference on computer communications workshops (INFOCOM WKSHPS), IEEE, pp 360\u2013365","DOI":"10.1109\/INFCOMW.2016.7562102"},{"key":"478_CR64","unstructured":"\u0110uri\u0161i\u0107 MP, Tafa Z, Dimi\u0107 G, Milutinovi\u0107 V (2012) A survey of military applications of wireless sensor networks. In: 2012 Mediterranean conference on embedded computing (MECO), IEEE, pp 196\u2013199"},{"issue":"2","key":"478_CR65","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MIC.2006.26","volume":"10","author":"G Werner-Allen","year":"2006","unstructured":"Werner-Allen G, Lorincz K, Ruiz M, Marcillo O, Johnson J, Lees J, Welsh M (2006) Deploying a wireless sensor network on an active volcano. IEEE Internet Comput 10(2):18\u201325","journal-title":"IEEE Internet Comput"},{"issue":"3","key":"478_CR66","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MNET.2006.1637931","volume":"20","author":"W Xu","year":"2006","unstructured":"Xu W, Ma K, Trappe W, Zhang Y (2006) Jamming sensor networks: attack and defense strategies. IEEE Netw 20(3):41\u201347","journal-title":"IEEE Netw"},{"key":"478_CR67","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.1016\/j.procs.2018.04.289","volume":"131","author":"T Yang","year":"2018","unstructured":"Yang T, Xiangyang X, Peng L, Tonghui L, Leina P (2018) A secure routing of wireless sensor networks based on trust evaluation model. Proc Comput Sci 131:1156\u20131163","journal-title":"Proc Comput Sci"},{"key":"478_CR68","doi-asserted-by":"crossref","unstructured":"Zhang P, Koh JY, Lin S, Nevat I (2014) Distributed event detection under byzantine attack in wireless sensor networks. 2014 IEEE ninth international conference on intelligent sensors. Sensor networks and information processing (ISSNIP), IEEE, pp 1\u20136","DOI":"10.1109\/ISSNIP.2014.6827609"},{"issue":"6","key":"478_CR69","doi-asserted-by":"publisher","first-page":"406061","DOI":"10.1155\/2013\/406061","volume":"9","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Wu C, Cao J, Li X (2013) A secret sharing-based key management in hierarchical wireless sensor network. Int J Distrib Sens Netw 9(6):406061","journal-title":"Int J Distrib Sens Netw"},{"key":"478_CR70","unstructured":"Zhou M, Nie Zl (2010) Analysis and design of zigbee mac layers protocol. In: 2010 International conference on future information technology and management engineering, IEEE, vol\u00a02, pp 211\u2013215"}],"container-title":["Evolutionary Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-020-00478-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12065-020-00478-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-020-00478-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T06:45:13Z","timestamp":1723531513000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12065-020-00478-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,5]]},"references-count":70,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["478"],"URL":"https:\/\/doi.org\/10.1007\/s12065-020-00478-6","relation":{},"ISSN":["1864-5909","1864-5917"],"issn-type":[{"type":"print","value":"1864-5909"},{"type":"electronic","value":"1864-5917"}],"subject":[],"published":{"date-parts":[[2020,9,5]]},"assertion":[{"value":"21 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}