{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T10:36:17Z","timestamp":1760524577471},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T00:00:00Z","timestamp":1705449600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T00:00:00Z","timestamp":1705449600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s12083-023-01587-6","type":"journal-article","created":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T13:02:00Z","timestamp":1705496520000},"page":"701-721","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["SEE2PK: Secure and energy efficient protocol based on pairwise key for hierarchical wireless sensor network"],"prefix":"10.1007","volume":"17","author":[{"given":"Anurag","family":"Shukla","sequence":"first","affiliation":[]},{"given":"Sarsij","family":"Tripathi","sequence":"additional","affiliation":[]},{"given":"Mohit","family":"Sajwan","sequence":"additional","affiliation":[]},{"given":"Deepak","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,17]]},"reference":[{"key":"1587_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S00607-021-00996-W","volume":"2021","author":"Z Hajipour","year":"2021","unstructured":"Hajipour Z, Barati H (2021) EELRP: energy efficient layered routing protocol in wireless sensor networks. Comput 2021:1\u201321. https:\/\/doi.org\/10.1007\/S00607-021-00996-W","journal-title":"Comput"},{"key":"1587_CR2","doi-asserted-by":"publisher","first-page":"2142","DOI":"10.1007\/S12083-022-01342-3","volume":"15","author":"E Kiamansouri","year":"2022","unstructured":"Kiamansouri E, Barati H, Barati A (2022) A two-level clustering based on fuzzy logic and content-based routing method in the internet of things. Peer Peer Netw Appl 15:2142\u20132159. https:\/\/doi.org\/10.1007\/S12083-022-01342-3","journal-title":"Peer Peer Netw Appl"},{"issue":"4","key":"1587_CR3","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/S00607-018-0623-8","volume":"101","author":"S Sedighian Kashi","year":"2018","unstructured":"Sedighian Kashi S (2018) Area coverage of heterogeneous wireless sensor networks in support of Internet of Things demands. Computing 101(4):363\u2013385. https:\/\/doi.org\/10.1007\/S00607-018-0623-8","journal-title":"Computing"},{"key":"1587_CR4","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/J.COMCOM.2017.06.010","volume":"110","author":"SM Mohamed","year":"2017","unstructured":"Mohamed SM, Hamza HS, Saroit IA (2017) Coverage in mobile wireless sensor networks (M-WSN): A survey. Comput Commun 110:133\u2013150. https:\/\/doi.org\/10.1016\/J.COMCOM.2017.06.010","journal-title":"Comput Commun"},{"key":"1587_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S10723-022-09619-W\/METRICS","volume":"20","author":"M Ataei Nezhad","year":"2022","unstructured":"Ataei Nezhad M, Barati H, Barati A (2022) An authentication-based secure data aggregation method in internet of things. J. Grid Comput. 20:1\u201328. https:\/\/doi.org\/10.1007\/S10723-022-09619-W\/METRICS","journal-title":"J. Grid Comput."},{"key":"1587_CR6","doi-asserted-by":"publisher","unstructured":"Huang X (2022) A data-driven WSN security threat analysis model based on cognitive computing. J Sensors 2022. https:\/\/doi.org\/10.1155\/2022\/5013905","DOI":"10.1155\/2022\/5013905"},{"key":"1587_CR7","doi-asserted-by":"publisher","first-page":"e4764","DOI":"10.1002\/DAC.4764","volume":"34","author":"S Mishra","year":"2021","unstructured":"Mishra S, Yaduvanshi R, Dubey K, Rajpoot P (2021) ESS-IBAA: Efficient, short, and secure ID-based authentication algorithm for wireless sensor network. Int J Commun Syst 34:e4764. https:\/\/doi.org\/10.1002\/DAC.4764","journal-title":"Int J Commun Syst"},{"key":"1587_CR8","doi-asserted-by":"publisher","first-page":"2445","DOI":"10.1007\/S00607-020-00823-8","volume":"102","author":"R Sahay","year":"2020","unstructured":"Sahay R, Geethakumari G, Mitra B (2020) A novel blockchain based framework to secure IoT-LLNs against routing attacks. Computing 102:2445\u20132470. https:\/\/doi.org\/10.1007\/S00607-020-00823-8","journal-title":"Computing"},{"key":"1587_CR9","doi-asserted-by":"publisher","unstructured":"Murugeshwari B, Sabatini SA, Jose L, Padmapriya S (2022) Effective data aggregation in WSN for enhanced security and data privacy. SSRG Int J Electr Electron Eng 9:1\u201310. https:\/\/doi.org\/10.14445\/23488379\/IJEEE-V9I11P101","DOI":"10.14445\/23488379\/IJEEE-V9I11P101"},{"key":"1587_CR10","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/TDSC.2006.2","volume":"3","author":"W Du","year":"2006","unstructured":"Du W, Deng J, Han YS (2006) A key predistribution scheme for sensor networks using deployment knowledge. IEEE Trans Dependable Secur Comput 3:62\u201377. https:\/\/doi.org\/10.1109\/TDSC.2006.2","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"1587_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2287196","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Xu L, Xiang Y, Huang X (2013) A matrix-based pairwise key establishment scheme for wireless mesh networks using per deployment knowledge. IEEE Trans Emerg Top Comput. https:\/\/doi.org\/10.1109\/TETC.2013.2287196","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"1587_CR12","doi-asserted-by":"publisher","unstructured":"Sharma V, Rajpoot P, Gupta A, Dubey K, Pandey N, Verma N (2019) Heterogeneous clustering for energy optimization in wireless sensor networks. 2019 Proc 9th Int Conf Cloud Comput Data Sci. Eng Conflu 92\u201399. https:\/\/doi.org\/10.1109\/CONFLUENCE.2019.8776933","DOI":"10.1109\/CONFLUENCE.2019.8776933"},{"key":"1587_CR13","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/S00607-009-0036-9","volume":"85","author":"J Jaworski","year":"2009","unstructured":"Jaworski J, Ren M, Rybarczyk K (2009) Random key predistribution for wireless sensor networks using deployment knowledge. Computing 85:57\u201376. https:\/\/doi.org\/10.1007\/S00607-009-0036-9","journal-title":"Computing"},{"key":"1587_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0494-4","author":"S Singh","year":"2017","unstructured":"Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-017-0494-4","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1587_CR15","doi-asserted-by":"publisher","first-page":"1526","DOI":"10.3390\/APP13031526","volume":"13","author":"M Dener","year":"2023","unstructured":"Dener M, Orman A (2023) BBAP-WSN: A new blockchain-based authentication protocol for wireless sensor networks. Appl Sci 13:1526. https:\/\/doi.org\/10.3390\/APP13031526","journal-title":"Appl Sci"},{"key":"1587_CR16","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/S11276-018-1812-2","volume":"26","author":"P Rajpoot","year":"2018","unstructured":"Rajpoot P, Dwivedi P (2018) Optimized and load balanced clustering for wireless sensor networks to increase the lifetime of WSN using MADM approaches, Wirel. Networks 26:215\u2013251. https:\/\/doi.org\/10.1007\/S11276-018-1812-2","journal-title":"Networks"},{"key":"1587_CR17","doi-asserted-by":"publisher","unstructured":"Saravanakumar P, Sundararajan TVP, Dhanaraj RK, Nisar K, Memon FH, Ibrahim AABA (2022) Lamport certificateless signcryption deep neural networks for data aggregation security in WSN. Intell Autom Soft Comput 33:1835\u20131847. https:\/\/doi.org\/10.32604\/IASC.2022.018953.","DOI":"10.32604\/IASC.2022.018953"},{"key":"1587_CR18","doi-asserted-by":"publisher","unstructured":"Li X, Liu S, Kumari S, Chen CM (2022) PSAP-WSN: A provably secure authentication protocol for 5g-based wireless sensor networks. Comput Model Eng Sci 135:711\u2013732. https:\/\/doi.org\/10.32604\/CMES.2022.022667","DOI":"10.32604\/CMES.2022.022667"},{"issue":"7","key":"1587_CR19","doi-asserted-by":"publisher","first-page":"1653","DOI":"10.1007\/S00607-020-00817-6","volume":"102","author":"A Mosavifard","year":"2020","unstructured":"Mosavifard A, Barati H (2020) An energy-aware clustering and two-level routing method in wireless sensor networks. Computing 102(7):1653\u20131671. https:\/\/doi.org\/10.1007\/S00607-020-00817-6","journal-title":"Computing"},{"key":"1587_CR20","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TETC.2017.2737789","volume":"6750","author":"S Tahir","year":"2017","unstructured":"Tahir S, Ruj S, Rahulamathavan Y, Rajarajan M, Glackin C (2017) A new secure and lightweight searchable encryption scheme over encrypted cloud data. IEEE Trans Emerg Top Comput 6750:30\u201333. https:\/\/doi.org\/10.1109\/TETC.2017.2737789","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"1587_CR21","doi-asserted-by":"publisher","first-page":"91","DOI":"10.4018\/ijisp.201907010106","volume":"13","author":"AS Shukla","year":"2019","unstructured":"Shukla AS, Tripathi S (2019) A matrix-based pair-wise key establishment for secure and energy efficient WSN-assisted IoT. Int J Inf Secur Priv 13:91\u2013105. https:\/\/doi.org\/10.4018\/ijisp.201907010106","journal-title":"Int J Inf Secur Priv"},{"key":"1587_CR22","doi-asserted-by":"publisher","first-page":"2611","DOI":"10.1007\/s11277-020-07167-8","volume":"112","author":"A Shukla","year":"2020","unstructured":"Shukla A, Tripathi S (2020) An effective relay node selection technique for energy efficient WSN-assisted IoT. Wirel Pers Commun 112:2611\u20132641. https:\/\/doi.org\/10.1007\/s11277-020-07167-8","journal-title":"Wirel Pers Commun"},{"key":"1587_CR23","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.3233\/JIFS-169674","volume":"35","author":"A Shukla","year":"2018","unstructured":"Shukla A, Tripathi S (2018) An optimal relay node selection technique to support green internet of things. J Intell Fuzzy Syst 35:1301\u20131314. https:\/\/doi.org\/10.3233\/JIFS-169674","journal-title":"J Intell Fuzzy Syst"},{"key":"1587_CR24","doi-asserted-by":"publisher","first-page":"3471","DOI":"10.1007\/s11276-020-02277-4","volume":"26","author":"A Shukla","year":"2020","unstructured":"Shukla A, Tripathi S (2020) A multi-tier based clustering framework for scalable and energy efficient WSN-assisted IoT network, Wirel. Networks 26:3471\u20133493. https:\/\/doi.org\/10.1007\/s11276-020-02277-4","journal-title":"Networks"},{"key":"1587_CR25","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1007\/S11276-021-02876-9\/METRICS","volume":"28","author":"A Shukla","year":"2022","unstructured":"Shukla A, Singh D, Sajwan M, Verma A, Kumar A (2022) A source location privacy preservation scheme in WSN-assisted IoT network by randomized ring and confounding transmission, Wirel. Networks 28:827\u2013852. https:\/\/doi.org\/10.1007\/S11276-021-02876-9\/METRICS","journal-title":"Networks"},{"key":"1587_CR26","doi-asserted-by":"publisher","first-page":"11145","DOI":"10.1007\/S11042-022-12157-Y\/METRICS","volume":"81","author":"A Shukla","year":"2022","unstructured":"Shukla A, Singh D, Sajwan M, Kumar M, Kumari D, Kumar A, Panthi M (2022) SLP-RRFPR: a source location privacy protection scheme based on random ring and limited hop fake packet routing for wireless sensor networks. Multimed Tools Appl 81:11145\u201311185. https:\/\/doi.org\/10.1007\/S11042-022-12157-Y\/METRICS","journal-title":"Multimed Tools Appl"},{"key":"1587_CR27","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/TMC.2004.41","volume":"3","author":"O Younis","year":"2004","unstructured":"Younis O, Fahmy S (2004) HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Trans Mob Comput 3:366\u2013379. https:\/\/doi.org\/10.1109\/TMC.2004.41","journal-title":"IEEE Trans Mob Comput"},{"key":"1587_CR28","doi-asserted-by":"publisher","first-page":"e5076","DOI":"10.1002\/DAC.5076","volume":"35","author":"P Alimoradi","year":"2022","unstructured":"Alimoradi P, Barati A, Barati H (2022) A hierarchical key management and authentication method for wireless sensor networks. Int J Commun Syst 35:e5076. https:\/\/doi.org\/10.1002\/DAC.5076","journal-title":"Int J Commun Syst"},{"key":"1587_CR29","doi-asserted-by":"publisher","unstructured":"Yadav AK, Rajpoot P, Kumar P, Dubey K, Singh SH, Verma KR (2019) Multi parameters based heterogeneous clustering algorithm for energy optimization in WSN. 2019 Proc 9th Int Conf Cloud Comput Data Sci Eng Conflu 587\u2013592. https:\/\/doi.org\/10.1109\/CONFLUENCE.2019.8776966","DOI":"10.1109\/CONFLUENCE.2019.8776966"},{"key":"1587_CR30","doi-asserted-by":"publisher","unstructured":"Blom R (1985) An optimal class of symmetric key generation systems. In: Lect Notes Comput Sci (Including Subser Lect Notes Artif Intell Lect Notes Bioinformatics), Springer Verlag pp 335\u2013338. https:\/\/doi.org\/10.1007\/3-540-39757-4_22","DOI":"10.1007\/3-540-39757-4_22"},{"key":"1587_CR31","doi-asserted-by":"crossref","unstructured":"Du W, Deng J, Han YS, Varshney PK (2005) A pairwise key pre-distribution scheme for wireless sensor networks*","DOI":"10.1145\/1065545.1065548"},{"key":"1587_CR32","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2011.6163684","author":"A Parakh","year":"2011","unstructured":"Parakh A, Kak S (2011) Matrix based key agreement algorithms for sensor networks. Int Symp Adv Networks Telecommun Syst ANTS. https:\/\/doi.org\/10.1109\/ANTS.2011.6163684","journal-title":"Int Symp Adv Networks Telecommun Syst ANTS"},{"key":"1587_CR33","doi-asserted-by":"publisher","first-page":"1917","DOI":"10.1007\/S12083-021-01116-3","volume":"14","author":"E Yousefpoor","year":"2021","unstructured":"Yousefpoor E, Barati H, Barati A (2021) A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks. Peer-to-Peer Netw Appl 14:1917\u20131942. https:\/\/doi.org\/10.1007\/S12083-021-01116-3","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1587_CR34","doi-asserted-by":"publisher","unstructured":"Zhang X, Wang J (2016) An efficient key management scheme in hierarchical wireless sensor networks. 2015 Int Conf Comput Commun Secur ICCCS. https:\/\/doi.org\/10.1109\/CCCS.2015.7374122","DOI":"10.1109\/CCCS.2015.7374122"},{"key":"1587_CR35","unstructured":"Sukumar S (2013) Computational analysis of modified Blom\u2019s scheme. arXiv:1303.7457"},{"key":"1587_CR36","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/S12083-020-01004-2\/METRICS","volume":"14","author":"AN Shahbaz","year":"2021","unstructured":"Shahbaz AN, Barati H, Barati A (2021) Multipath routing through the firefly algorithm and fuzzy logic in wireless sensor networks. Peer Peer Netw Appl 14:541\u2013558. https:\/\/doi.org\/10.1007\/S12083-020-01004-2\/METRICS","journal-title":"Peer Peer Netw Appl"},{"key":"1587_CR37","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1007\/S12083-020-01025-X","volume":"14","author":"E Hasheminejad","year":"2021","unstructured":"Hasheminejad E, Barati H (2021) A reliable tree-based data aggregation method in wireless sensor networks. Peer Peer Netw Appl 14:873\u2013887. https:\/\/doi.org\/10.1007\/S12083-020-01025-X","journal-title":"Peer Peer Netw Appl"},{"key":"1587_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-1154-z","author":"SKSL Preeth","year":"2018","unstructured":"Preeth SKSL, Dhanalakshmi R, Kumar R, Shakeel PM (2018) An adaptive fuzzy rule based energy efficient clustering and immune-inspired routing protocol for WSN-assisted IoT system. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-018-1154-z","journal-title":"J Ambient Intell Humaniz Comput"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01587-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-023-01587-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01587-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T15:09:54Z","timestamp":1711465794000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-023-01587-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,17]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["1587"],"URL":"https:\/\/doi.org\/10.1007\/s12083-023-01587-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,17]]},"assertion":[{"value":"30 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This study was conducted in accordance with the ethical guidelines and regulations set forth by our institution and springer. All necessary approvals were obtained from the appropriate ethics committee before initiating the research. Informed consent was obtained from all participants included in the study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All participants provided consent for the publication of their data, ensuring the protection of their identity and confidentiality.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}