{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T14:23:23Z","timestamp":1763389403465},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T00:00:00Z","timestamp":1612828800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T00:00:00Z","timestamp":1612828800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evol. Intel."],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s12065-021-00570-5","type":"journal-article","created":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T02:17:08Z","timestamp":1612923428000},"page":"1605-1617","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Cuddle death algorithm using ABC for detecting unhealthy nodes in wireless sensor networks"],"prefix":"10.1007","volume":"15","author":[{"given":"R. S.","family":"Raghav","sequence":"first","affiliation":[]},{"given":"U.","family":"Prabu","sequence":"additional","affiliation":[]},{"given":"M.","family":"Rajeswari","sequence":"additional","affiliation":[]},{"given":"D.","family":"Saravanan","sequence":"additional","affiliation":[]},{"given":"Kalaipriyan","family":"Thirugnanasambandam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,9]]},"reference":[{"key":"570_CR1","doi-asserted-by":"publisher","first-page":"103261","DOI":"10.1016\/j.micpro.2020.103261","volume":"79","author":"S Manimurugan","year":"2020","unstructured":"Manimurugan S et al (2020) Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system. Microprocess Microsyst 79:103261","journal-title":"Microprocess Microsyst"},{"key":"570_CR2","doi-asserted-by":"publisher","first-page":"102094","DOI":"10.1016\/j.adhoc.2020.102094","volume":"101","author":"X Zhang","year":"2020","unstructured":"Zhang X, Xiaohui Lu, Zhang X (2020) Mobile wireless sensor network lifetime maximization by using evolutionary computing methods. Ad Hoc Netw 101:102094","journal-title":"Ad Hoc Netw"},{"key":"570_CR3","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.jpdc.2019.09.013","volume":"135","author":"S Garg","year":"2020","unstructured":"Garg S et al (2020) En-ABC: an ensemble artificial bee colony based anomaly detection scheme for cloud environment. J Parallel Distrib Comput 135:219\u2013233","journal-title":"J Parallel Distrib Comput"},{"key":"570_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.dt.2020.05.022","author":"C Pang","year":"2020","unstructured":"Pang C, Xu G, Zhang Y (2020) A new energy efficient management approach for wireless sensor networks in target tracking. Defence Technol. https:\/\/doi.org\/10.1016\/j.dt.2020.05.022","journal-title":"Defence Technol"},{"key":"570_CR5","doi-asserted-by":"publisher","first-page":"107251","DOI":"10.1016\/j.comnet.2020.107251","volume":"176","author":"S Dwivedi","year":"2020","unstructured":"Dwivedi S, Vardhan M, Tripathi S (2020) An effect of chaos grasshopper optimization algorithm for protection of network infrastructure. Comput Netw 176:107251","journal-title":"Comput Netw"},{"key":"570_CR6","doi-asserted-by":"crossref","unstructured":"Singh M, Mehta G, Vaid C, Oberoi P (2012) Detection of malicious node in wireless sensor network based on data mining. In:\n2012 International Conference on Computing Sciences, IEEE, pp 291\u2013294","DOI":"10.1109\/ICCS.2012.24"},{"issue":"9","key":"570_CR7","doi-asserted-by":"publisher","first-page":"1536","DOI":"10.3390\/s16091536","volume":"16","author":"DA Guimaraes","year":"2016","unstructured":"Guimaraes DA, Sakai LJ, Alberti AM, De Souza RAA (2016) Increasing the lifetime of mobile wsns via dynamic optimization of sensor node communication activity. Sensors 16(9):1536","journal-title":"Sensors"},{"key":"570_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.12.006","author":"B Rambabu","year":"2019","unstructured":"Rambabu B, Reddy AV, Janakiraman S (2019) Hybrid Artificial Bee Colony and Monarchy Butterfly Optimization Algorithm (HABC-MBOA)-based cluster head selection for WSNs. J King Saud Univ Comput Inf Sci. https:\/\/doi.org\/10.1016\/j.jksuci.2019.12.006","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"570_CR9","doi-asserted-by":"publisher","first-page":"102439","DOI":"10.1016\/j.jnca.2019.102439","volume":"147","author":"P Le Nguyen","year":"2019","unstructured":"Le Nguyen P, Nguyen K, Vu H, Ji Y (2019) TELPAC: A time and energy efficient protocol for locating and patching coverage holes in WSNs. J Netw Comput Appl 147:102439","journal-title":"J Netw Comput Appl"},{"key":"570_CR10","first-page":"222","volume":"59","author":"N Suma","year":"2014","unstructured":"Suma N, Purusothaman T (2014) Secure authentication based multipath routing protocol for WSNs. J Theor Appl Inf Technol 59:222\u2013231","journal-title":"J Theor Appl Inf Technol"},{"key":"570_CR11","doi-asserted-by":"publisher","first-page":"101965","DOI":"10.1016\/j.adhoc.2019.101965","volume":"95","author":"H Guo","year":"2019","unstructured":"Guo H, Gao Y, Xu T, Zhang X, Ye J (2019) A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks. Ad Hoc Netw 95:101965","journal-title":"Ad Hoc Netw"},{"key":"570_CR12","unstructured":"Subhaponmani S, Balakrishnan C (2014) SDRP and SSO mechanism for impersonation attack in wireless sensor networks. Int J Adv Res Comput Sci Technol"},{"key":"570_CR13","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1080\/0952813X.2015.1055825","volume":"28","author":"V Thiruppathy Kesavan","year":"2015","unstructured":"Thiruppathy Kesavan V, Radhakrishnan S (2015) Secure clustering and routing for heterogeneous mobile wireless sensor networks with dynamic key management. J Exp Theor Artif Intell 28:971\u2013988","journal-title":"J Exp Theor Artif Intell"},{"issue":"4","key":"570_CR14","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1080\/00207217.2014.936524","volume":"102","author":"M Kumar","year":"2015","unstructured":"Kumar M, Verma S, Lata K (2015) Secure data aggregation in wireless sensor networks using homomorphic encryption. Int J Electron 102(4):690\u2013702","journal-title":"Int J Electron"},{"issue":"10","key":"570_CR15","doi-asserted-by":"publisher","first-page":"1441","DOI":"10.1080\/00207217.2012.743093","volume":"100","author":"S Sharmila","year":"2013","unstructured":"Sharmila S, Umamaheswari G (2013) Node ID based detection of Sybil attack in mobile wireless sensor network. Int J Electron 100(10):1441\u20131454","journal-title":"Int J Electron"},{"issue":"3","key":"570_CR16","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1080\/00207217.2015.1036803","volume":"103","author":"VK Verma","year":"2016","unstructured":"Verma VK, Singh S, Pathak NP (2016) Impact of malicious servers over trust and reputation models in wireless sensor networks. Int J Electron 103(3):530\u2013540","journal-title":"Int J Electron"},{"key":"570_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2013.04.002","volume":"37","author":"S Hamedheidari","year":"2013","unstructured":"Hamedheidari S, Rafeh R (2013) A novel agent-based approach to detect sinkhole attacks in wireless sensor networks. Comput Secur 37:1\u201314","journal-title":"Comput Secur"},{"key":"570_CR18","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.jnca.2015.09.013","volume":"64","author":"HA Hashim","year":"2016","unstructured":"Hashim HA, Ayinde BO, Abido MA (2016) Optimal placement of relay nodes in wireless sensor network using artificial bee colony algorithm. Journal of Network and Computer Applications 64:239\u2013248","journal-title":"Journal of Network and Computer Applications"},{"key":"570_CR19","doi-asserted-by":"publisher","first-page":"106733","DOI":"10.1016\/j.compeleceng.2020.106733","volume":"86","author":"S Yousefi","year":"2020","unstructured":"Yousefi S et al (2020) An energy-efficient artificial bee colony-based clustering in the internet of things. Comput Electr Eng 86:106733","journal-title":"Comput Electr Eng"},{"key":"570_CR20","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.ins.2020.03.064","volume":"527","author":"H Wang","year":"2020","unstructured":"Wang H, Wang W, Xiao S, Cui Z, Xu M, Zhou X (2020) Improving Artificial Bee Colony algorithm using a new neighborhood selection mechanism. Inf Sci 527:227\u2013240","journal-title":"Inf Sci"},{"key":"570_CR21","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.asoc.2019.03.040","volume":"79","author":"E Saad","year":"2019","unstructured":"Saad E, Elhosseini MA, Haikal AY (2019) Culture-based artificial bee colony with heritage mechanism for optimization of wireless sensors network. Appl Soft Comput 79:59\u201373","journal-title":"Appl Soft Comput"},{"issue":"1","key":"570_CR22","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1186\/s13638-018-1264-5","volume":"2018","author":"G Liang","year":"2018","unstructured":"Liang G, Yu H (2018) Network selection algorithm for heterogeneous wireless networks based on service characteristics and user preferences. EURASIP J Wirel Commun Netw 2018(1):241","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"570_CR23","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1016\/j.procs.2020.04.096","volume":"171","author":"AS Yadav","year":"2020","unstructured":"Yadav AS, Khushboo K, Singh VK, Kushwaha DS (2020) Increasing efficiency of sensor nodes by clustering in section based hybrid routing protocol with artificial bee colony. Procedia Comput Sci 171:887\u2013896","journal-title":"Procedia Comput Sci"},{"issue":"3","key":"570_CR24","first-page":"748","volume":"2","author":"R Mitra","year":"2012","unstructured":"Mitra R, Khan T (2012) Secure and reliable data transmission in wireless sensor network: a survey. Int J Comput Eng Res 2(3):748\u2013754","journal-title":"Int J Comput Eng Res"},{"key":"570_CR25","doi-asserted-by":"publisher","first-page":"2439","DOI":"10.1007\/s11277-020-07158-9","volume":"112","author":"RS Raghav","year":"2020","unstructured":"Raghav RS, Thirugnansambandam K, Anguraj DK (2020) Beeware routing scheme for detecting network layer attacks in wireless sensor networks. Wirel Pers Commun 112:2439\u20132459","journal-title":"Wirel Pers Commun"},{"key":"570_CR26","doi-asserted-by":"publisher","first-page":"1951","DOI":"10.1080\/0305215X.2016.1145015","volume":"48","author":"AK Idrees","year":"2016","unstructured":"Idrees AK, Deschinkel K, Salomon M, Couturier R (2016) Perimeter based coverage optimization to improve lifetime in wireless sensor networks. Eng Optim 48:1951\u20131972","journal-title":"Eng Optim"},{"issue":"5","key":"570_CR27","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1080\/00207217.2013.794480","volume":"101","author":"AK Singh","year":"2014","unstructured":"Singh AK, Purohit N, Varma S (2014) Analysis of lifetime of wireless sensor network with base station moving on different paths. Int J Electron 101(5):605\u2013620","journal-title":"Int J Electron"},{"issue":"3","key":"570_CR28","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.2298\/CSIS130921068W","volume":"11","author":"G Wu","year":"2014","unstructured":"Wu G, Chen X, Yao L, Lee Y, Yim K (2014) An efficient wormhole attack detection method in wireless sensor networks. Comput Sci Inf Syst 11(3):1127\u20131141","journal-title":"Comput Sci Inf Syst"},{"issue":"2","key":"570_CR29","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1080\/07366981.2013.754207","volume":"47","author":"S Ould Amara","year":"2013","unstructured":"Ould Amara S, Beghdad R, Oussalah M (2013) Securing wireless sensor networks: a survey. EDPACS 47(2):6\u201329","journal-title":"EDPACS"},{"issue":"4","key":"570_CR30","doi-asserted-by":"publisher","first-page":"460","DOI":"10.3390\/s16040460","volume":"16","author":"K Saleem","year":"2016","unstructured":"Saleem K, Derhab A, Orgun MA, Al-Muhtadi J, Rodrigues JJ, Khalil MS, Ali Ahmed A (2016) Cost-effective encryption-based autonomous routing protocol for efficient and secure wireless sensor networks. Sensors 16(4):460","journal-title":"Sensors"},{"issue":"21","key":"570_CR31","doi-asserted-by":"publisher","first-page":"4642","DOI":"10.1080\/03610926.2012.735330","volume":"43","author":"B Gupta","year":"2014","unstructured":"Gupta B (2014) On secure communication in a sensor network. Commun Stat Theory Methods 43(21):4642\u20134649","journal-title":"Commun Stat Theory Methods"},{"issue":"3","key":"570_CR32","first-page":"50","volume":"7","author":"A Ibrahim","year":"2015","unstructured":"Ibrahim A, Rahman MM, Roy MC (2015) Detecting sinkhole attacks in wireless sensor network using hop count. Int J Comput Netw Inf Secur 7(3):50","journal-title":"Int J Comput Netw Inf Secur"},{"issue":"1","key":"570_CR33","doi-asserted-by":"publisher","first-page":"102","DOI":"10.15623\/ijret.2014.0301016","volume":"3","author":"PV Khandare","year":"2014","unstructured":"Khandare PV, Kulkarni NP (2014) Pe2a: public encryption with two ack approach to mitigate wormhole attack in WSN. IJRET Int J Res Eng Technol 3(1):102\u2013107","journal-title":"IJRET Int J Res Eng Technol"},{"issue":"10","key":"570_CR34","first-page":"794","volume":"1","author":"T Nidharshini","year":"2012","unstructured":"Nidharshini T, Janani V (2012) Detection of duplicate nodes in wireless sensor networks using sequential probability ratio testing. Int J Adv Res Comput Commun Eng 1(10):794\u2013798","journal-title":"Int J Adv Res Comput Commun Eng"},{"key":"570_CR35","doi-asserted-by":"crossref","unstructured":"Okdem S, Karaboga D, Ozturk C (2011) An application of wireless sensor network routing based on artificial bee colony algorithm. In 2011 IEEE congress of evolutionary computation (CEC). IEEE, pp 326\u2013330","DOI":"10.1109\/CEC.2011.5949636"},{"issue":"1","key":"570_CR36","doi-asserted-by":"publisher","first-page":"187","DOI":"10.3390\/s20010187","volume":"20","author":"Q Ren","year":"2020","unstructured":"Ren Q, Yao G (2020) An energy-efficient cluster head selection scheme for energy-harvesting wireless sensor networks. Sensors 20(1):187","journal-title":"Sensors"},{"issue":"2","key":"570_CR37","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s12065-019-00199-5","volume":"12","author":"I Benmessahel","year":"2019","unstructured":"Benmessahel I, Xie K, Chellal M, Semong T (2019) A new evolutionary neural networks based on intrusion detection systems using locust swarm optimization. Evol Intel 12(2):131\u2013146","journal-title":"Evol Intel"},{"key":"570_CR38","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/7057490","author":"Y Yue","year":"2016","unstructured":"Yue Y, Li J, Fan H, Qin Q (2016) Optimization-based artificial bee colony algorithm for data collection in large-scale mobile wireless sensor networks. J Sens. https:\/\/doi.org\/10.1155\/2016\/7057490","journal-title":"J Sens"},{"key":"570_CR39","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-019-00308-4","author":"J John","year":"2019","unstructured":"John J, Rodrigues P (2019) A survey of energy-aware cluster head selection techniques in wireless sensor network. Evol Intell. https:\/\/doi.org\/10.1007\/s12065-019-00308-4","journal-title":"Evol Intell"},{"issue":"1","key":"570_CR40","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1186\/s13638-019-1509-y","volume":"2019","author":"H Liang","year":"2019","unstructured":"Liang H, Yang S, Li L, Gao J (2019) Research on routing optimization of WSNs based on improved LEACH protocol. EURASIP J Wirel Commun Netw 2019(1):194","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"570_CR41","doi-asserted-by":"crossref","unstructured":"Ma J, Zhao Y (2020) An improved artificial bee colony algorithm with multiple search strategy. In: International conference on green, pervasive, and cloud computing. Springer, Cham, pp 92\u2013100","DOI":"10.1007\/978-3-030-64243-3_7"},{"key":"570_CR42","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-020-00496-4","author":"MBNB Mahaleh","year":"2020","unstructured":"Mahaleh MBNB, Mirroshandel SA (2020) Real-time application of swarm and evolutionary algorithms for line follower automated guided vehicles: a comprehensive study. Evol Intell. https:\/\/doi.org\/10.1007\/s12065-020-00496-4","journal-title":"Evol Intell"},{"issue":"3\u20134","key":"570_CR43","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s12065-018-0154-4","volume":"10","author":"J Kusyk","year":"2018","unstructured":"Kusyk J, Uyar MU, Sahin CS (2018) Survey on evolutionary computation methods for cybersecurity of mobile ad hoc networks. Evol Intel 10(3\u20134):95\u2013117","journal-title":"Evol Intel"},{"key":"570_CR44","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-020-00430-8","author":"K Sharma","year":"2020","unstructured":"Sharma K, Gupta PC, Sharma N (2020) Lima\u00e7on inspired artificial bee colony algorithm for numerical optimization. Evol Intell. https:\/\/doi.org\/10.1007\/s12065-020-00430-8","journal-title":"Evol Intell"}],"container-title":["Evolutionary Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-021-00570-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12065-021-00570-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-021-00570-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T18:29:35Z","timestamp":1659119375000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12065-021-00570-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,9]]},"references-count":44,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["570"],"URL":"https:\/\/doi.org\/10.1007\/s12065-021-00570-5","relation":{},"ISSN":["1864-5909","1864-5917"],"issn-type":[{"value":"1864-5909","type":"print"},{"value":"1864-5917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,9]]},"assertion":[{"value":"15 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}