{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:41:27Z","timestamp":1776116487731,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:00:00Z","timestamp":1743033600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:00:00Z","timestamp":1743033600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100006261","name":"Taif University","doi-asserted-by":"publisher","award":["TU-DSPP-2024-68"],"award-info":[{"award-number":["TU-DSPP-2024-68"]}],"id":[{"id":"10.13039\/501100006261","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s12083-025-01946-5","type":"journal-article","created":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T06:50:29Z","timestamp":1743317429000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Resilient wireless sensor networks in industrial contexts via energy-efficient optimization and trust-based secure routing"],"prefix":"10.1007","volume":"18","author":[{"given":"Avaneesh","family":"Singh","sequence":"first","affiliation":[]},{"given":"Atul","family":"Raj","sequence":"additional","affiliation":[]},{"given":"Preeti","family":"Rani","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Khatibi","sequence":"additional","affiliation":[]},{"given":"Horiya","family":"Aldeeb","sequence":"additional","affiliation":[]},{"given":"Piyush Kumar","family":"Shukla","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Sabry","sequence":"additional","affiliation":[]},{"given":"Mohamed M.","family":"Hassan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,27]]},"reference":[{"issue":"4","key":"1946_CR1","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1016\/j.comnet.2006.10.002","volume":"51","author":"IF Akyildiz","year":"2007","unstructured":"Akyildiz IF, Melodia T, Chowdhury KR (2007) A survey on wireless multimedia sensor networks. Comput Netw 51(4):921\u2013960","journal-title":"Comput Netw"},{"key":"1946_CR2","doi-asserted-by":"crossref","unstructured":"Feng J, Koushanfar F, Potkonjak M (2002) System-architectures for sensor networks issues, alternatives, and directions. InProceedings. IEEE Int Conf Computer Design: VLSI in Computers and Processors 226-231","DOI":"10.1109\/ICCD.2002.1106775"},{"issue":"08","key":"1946_CR3","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MC.2004.93","volume":"37","author":"D Culler","year":"2004","unstructured":"Culler D, Estrin D, Srivastava M (2004) Guest editors\u2019 introduction: Overview of sensor networks. Computer 37(08):41\u201349","journal-title":"Computer"},{"key":"1946_CR4","unstructured":"Raja K et al. (2006) Sensor Cubes: A modular, ultra-compact, power-aware platform for sensor networks. Int Conf Inform Process Sensor Netw (IPSN SPOTS)"},{"key":"1946_CR5","doi-asserted-by":"publisher","unstructured":"Maksymyuk T, Beshley M, Klymash M, Petrenko O, Matsevityi Y (2018) Eavesdropping-resilient wireless communication system based on modified OFDM\/QAM air interface. 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET), Lviv-Slavske, Ukraine: IEEE, 1127\u20131130. https:\/\/doi.org\/10.1109\/TCSET.2018.8336392","DOI":"10.1109\/TCSET.2018.8336392"},{"key":"1946_CR6","doi-asserted-by":"crossref","unstructured":"Qin B, Liu S (2013) Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter. In Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, Proceedings, Part II 19, Springer, 381\u2013400","DOI":"10.1007\/978-3-642-42045-0_20"},{"issue":"4","key":"1946_CR7","first-page":"793","volume":"38","author":"J Xu","year":"2015","unstructured":"Xu J, Wen QY, Wang DY (2015) A new message authentication code based on hash function and block cipher. Chin J Comput 38(4):793\u2013803","journal-title":"Chin J Comput"},{"issue":"6","key":"1946_CR8","doi-asserted-by":"publisher","first-page":"4131","DOI":"10.1109\/TII.2020.3006137","volume":"17","author":"W Fang","year":"2020","unstructured":"Fang W, Cui N, Chen W, Zhang W, Chen Y (2020) A trust-based security system for data collection in smart city. IEEE Trans Ind Inform 17(6):4131\u20134140","journal-title":"IEEE Trans Ind Inform"},{"issue":"6","key":"1946_CR9","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4270","volume":"34","author":"SB Sasi","year":"2021","unstructured":"Sasi SB, Santhosh R (2021) Multiobjective routing protocol for wireless sensor network optimization using ant colony conveyance algorithm. Int J Commun Syst 34(6):e4270","journal-title":"Int J Commun Syst"},{"issue":"2","key":"1946_CR10","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1615\/TelecomRadEng.2024054002","volume":"84","author":"SK Zelani","year":"2025","unstructured":"Zelani SK, Babu DN, Surendra D, Rahman MZU (2025) Energy-efficient ant routing algorithm for optimized path selection network longevity in wireless sensor networks. Telecommun Radio Eng 84(2):21\u201342. https:\/\/doi.org\/10.1615\/TelecomRadEng.2024054002","journal-title":"Telecommun Radio Eng"},{"key":"1946_CR11","doi-asserted-by":"publisher","first-page":"3797","DOI":"10.1016\/j.proeng.2012.06.435","volume":"38","author":"A Kumar","year":"2012","unstructured":"Kumar A, Thomas A (2012) Energy efficiency and network lifetime maximization in wireless sensor networks using improved ant colony optimization. Procedia Eng 38:3797\u20133805","journal-title":"Procedia Eng"},{"issue":"5","key":"1946_CR12","doi-asserted-by":"publisher","first-page":"2931","DOI":"10.1007\/s11276-019-02014-6","volume":"25","author":"S AlQahtani","year":"2019","unstructured":"AlQahtani S, Alotaibi A (2019) A route stability-based multipath QoS routing protocol in cognitive radio ad hoc networks. Wirel Netw 25(5):2931\u20132951. https:\/\/doi.org\/10.1007\/s11276-019-02014-6","journal-title":"Wirel Netw"},{"issue":"3","key":"1946_CR13","first-page":"1243","volume":"9","author":"GEP Kumar","year":"2016","unstructured":"Kumar GEP, Baskaran K, Blessing RE, Lydia M (2016) Evaluation of hybrid trust models using ant colony optimization in wireless sensor networks. Int J Smart Sens Intell Syst 9(3):1243\u20131260","journal-title":"Int J Smart Sens Intell Syst"},{"issue":"2","key":"1946_CR14","first-page":"64","volume":"1","author":"M Ahmed","year":"2012","unstructured":"Ahmed M, Boudhir AA, Bouhorma M (2012) New routing algorithm based on ACO approach for lifetime optimization in wireless sensor networks. Int J 1(2):64\u201367","journal-title":"Int J"},{"key":"1946_CR15","volume-title":"Using Ant Colony Agents for Designing Energy-Efficient Protocols for Wireless Adhoc and Sensor Networks","author":"I Woungang","year":"2012","unstructured":"Woungang I, Dhurandher SK, Obaidat MS (2012) Using Ant Colony Agents for Designing Energy-Efficient Protocols for Wireless Adhoc and Sensor Networks. Academic Press, Handbook of Green Information and Communication Systems"},{"issue":"22","key":"1946_CR16","doi-asserted-by":"publisher","first-page":"28261","DOI":"10.1109\/JSEN.2023.3321417","volume":"23","author":"G Kaur","year":"2023","unstructured":"Kaur G, Bhattacharya M (Nov.2023) Intelligent fault diagnosis for AIT-based smart farming applications. IEEE Sens J 23(22):28261\u201328269. https:\/\/doi.org\/10.1109\/JSEN.2023.3321417","journal-title":"IEEE Sens J"},{"key":"1946_CR17","doi-asserted-by":"crossref","unstructured":"Halabi T, Zulkernine M (2019) Trust-based cooperative game model for secure collaboration in the internet of vehicles. In ICC 2019\u20132019 IEEE International Conference on Communications (ICC), IEEE, 1\u20136","DOI":"10.1109\/ICC.2019.8762069"},{"key":"1946_CR18","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.compeleceng.2015.03.030","volume":"44","author":"MR Abdmeziem","year":"2015","unstructured":"Abdmeziem MR, Tandjaoui D (2015) An end-to-end secure key management protocol for e-health applications. Comput Electr Eng 44:184\u2013197","journal-title":"Comput Electr Eng"},{"issue":"2","key":"1946_CR19","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s12083-024-01810-y","volume":"18","author":"H Alsuwat","year":"2025","unstructured":"Alsuwat H, Alsuwat E (2025) Energy-aware and efficient cluster head selection and routing in wireless sensor networks using improved artificial bee Colony algorithm. Peer-Peer Netw Appl 18(2):65. https:\/\/doi.org\/10.1007\/s12083-024-01810-y","journal-title":"Peer-Peer Netw Appl"},{"issue":"10","key":"1946_CR20","doi-asserted-by":"publisher","first-page":"15385","DOI":"10.1109\/TVT.2024.3400880","volume":"73","author":"G Kaur","year":"2024","unstructured":"Kaur G, Bhattacharya M (2024) Green fault tolerant AIoT-enabled mobile sink data collection scheme in sensor networks. IEEE Trans Veh Technol 73(10):15385\u201315394. https:\/\/doi.org\/10.1109\/TVT.2024.3400880","journal-title":"IEEE Trans Veh Technol"},{"key":"1946_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102197","volume":"103","author":"J Jasper","year":"2021","unstructured":"Jasper J (2021) A secure routing scheme to mitigate attack in wireless adhoc sensor network. Comput Secur 103:102197","journal-title":"Comput Secur"},{"key":"1946_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-020-01884-1","volume":"2021","author":"W Fang","year":"2021","unstructured":"Fang W, Zhang W, Chen W, Liu J, Ni Y, Yang Y (2021) MSCR: Multidimensional secure clustered routing scheme in hierarchical wireless sensor networks. EURASIP J Wirel Commun Netw 2021:1\u201320","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"1946_CR23","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.compeleceng.2016.01.002","volume":"59","author":"C-H Liu","year":"2017","unstructured":"Liu C-H, Chung Y-F (2017) Secure user authentication scheme for wireless healthcare sensor networks. Comput Electr Eng 59:250\u2013261","journal-title":"Comput Electr Eng"},{"issue":"17\u201318","key":"1946_CR24","doi-asserted-by":"publisher","first-page":"10345","DOI":"10.1007\/s00500-024-09795-9","volume":"28","author":"S Subramani","year":"2024","unstructured":"Subramani S, Selvi M (2024) Intrusion detection system and fuzzy ant colony optimization based secured routing in wireless sensor networks. Soft Comput 28(17\u201318):10345\u201310367. https:\/\/doi.org\/10.1007\/s00500-024-09795-9","journal-title":"Soft Comput"},{"key":"1946_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119448","volume":"216","author":"N Kumar","year":"2023","unstructured":"Kumar N, Rani P, Kumar V, Verma PK, Koundal D (2023) TEEECH: Three-Tier Extended Energy Efficient Clustering Hierarchy Protocol for Heterogeneous Wireless Sensor Network. Expert Syst Appl 216:119448","journal-title":"Expert Syst Appl"},{"issue":"20","key":"1946_CR26","doi-asserted-by":"publisher","first-page":"20053","DOI":"10.1109\/JSEN.2022.3200597","volume":"22","author":"N Kumar","year":"2022","unstructured":"Kumar N, Rani P, Kumar V, Athawale SV, Koundal D (2022) THWSN: Enhanced energy-efficient clustering approach for three-tier heterogeneous wireless sensor networks. IEEE Sens J 22(20):20053\u201320062","journal-title":"IEEE Sens J"},{"key":"1946_CR27","first-page":"2","volume":"10","author":"WR Heinzelman","year":"2000","unstructured":"Heinzelman WR, Chandrakasan A, Balakrishnan H (2000) Energy-efficient communication protocol for wireless microsensor networks. Proc 33rd Annual Hawaii Int Conf Syst Sci IEEE 10:2","journal-title":"Proc 33rd Annual Hawaii Int Conf Syst Sci IEEE"},{"issue":"4","key":"1946_CR28","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"WB Heinzelman","year":"2002","unstructured":"Heinzelman WB, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun 1(4):660","journal-title":"IEEE Trans Wirel Commun"},{"key":"1946_CR29","doi-asserted-by":"crossref","unstructured":"Slijepcevic S, Potkonjak M (2001) Power efficient organization of wireless sensor networks. In ICC 2001. IEEE international conference on communications. Conference record (Cat. No. 01CH37240), IEEE, 472\u2013476","DOI":"10.1109\/ICC.2001.936985"},{"key":"1946_CR30","doi-asserted-by":"crossref","unstructured":"Kaushik I, Sharma N (2020) Black hole attack and its security measure in wireless sensors networks. Handb Wirel Sens Netw Issues Chall Curr Scenar 401\u2013416","DOI":"10.1007\/978-3-030-40305-8_20"},{"key":"1946_CR31","doi-asserted-by":"crossref","unstructured":"Banga S, Arora H, Sankhla S, Sharma G, Jain B (2020) Performance analysis of hello flood attack in wsn. Proc Int Conf Commun Comput Technol ICCCT-2019, Springer, 335\u2013342","DOI":"10.1007\/978-981-15-5077-5_30"},{"issue":"1","key":"1946_CR32","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s12083-018-0654-0","volume":"12","author":"A Zahedi","year":"2019","unstructured":"Zahedi A, Parma F (2019) An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-Peer Netw Appl 12(1):167\u2013176","journal-title":"Peer-Peer Netw Appl"},{"issue":"1","key":"1946_CR33","doi-asserted-by":"publisher","first-page":"299","DOI":"10.3390\/s140100299","volume":"14","author":"MA Adnan","year":"2013","unstructured":"Adnan MA, Razzaque MA, Ahmed I, Isnin IF (2013) Bio-mimic optimization strategies in wireless sensor networks: A survey. Sensors 14(1):299\u2013345","journal-title":"Sensors"},{"issue":"1","key":"1946_CR34","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/4235.585892","volume":"1","author":"M Dorigo","year":"1997","unstructured":"Dorigo M, Gambardella LM (1997) Ant colony system: a cooperative learning approach to the traveling salesman problem. IEEE Trans Evol Comput 1(1):53\u201366","journal-title":"IEEE Trans Evol Comput"},{"key":"1946_CR35","doi-asserted-by":"crossref","unstructured":"Gogu A, Nace D, Dilo A, Mertnia N (2011) Optimization problems in wireless sensor networks. Int Conf Complex, Intell, Softw Intens Syst, IEEE 302\u2013309","DOI":"10.1109\/CISIS.2011.50"},{"issue":"2","key":"1946_CR36","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/421084","volume":"9","author":"S Jabbar","year":"2013","unstructured":"Jabbar S, Iram R, Minhas AA, Shafi I, Khalid S, Ahmad M (2013) Intelligent optimization of wireless sensor networks through bio-inspired computing: survey and future directions. Int J Distrib Sens Netw 9(2):421084","journal-title":"Int J Distrib Sens Netw"},{"issue":"1","key":"1946_CR37","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.cie.2009.01.013","volume":"57","author":"C-S Ok","year":"2009","unstructured":"Ok C-S, Lee S, Mitra P, Kumara S (2009) Distributed energy balanced routing for wireless sensor networks. Comput Ind Eng 57(1):125\u2013135","journal-title":"Comput Ind Eng"},{"issue":"1","key":"1946_CR38","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/3477.484436","volume":"26","author":"M Dorigo","year":"1996","unstructured":"Dorigo M, Maniezzo V, Colorni A (1996) Ant system: optimization by a colony of cooperating agents. IEEE Trans Syst Man Cybern Part B Cybern 26(1):29\u201341","journal-title":"IEEE Trans Syst Man Cybern Part B Cybern"},{"issue":"1","key":"1946_CR39","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s11036-010-0287-x","volume":"17","author":"K Lin","year":"2012","unstructured":"Lin K, Lai C-F, Liu X, Guan X (2012) Energy efficiency routing with node compromised resistance in wireless sensor networks. Mob Netw Appl 17(1):75\u201389. https:\/\/doi.org\/10.1007\/s11036-010-0287-x","journal-title":"Mob Netw Appl"},{"issue":"1","key":"1946_CR40","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.cie.2009.01.013","volume":"57","author":"C-S Ok","year":"2009","unstructured":"Ok C-S, Lee S, Mitra P, Kumara S (2009) Distributed energy balanced routing for wireless sensor networks. Comput Ind Eng 57(1):125\u2013135. https:\/\/doi.org\/10.1016\/j.cie.2009.01.013","journal-title":"Comput Ind Eng"},{"issue":"1","key":"1946_CR41","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/TEM.2019.2953889","volume":"68","author":"M Rathee","year":"2021","unstructured":"Rathee M, Kumar S, Gandomi AH, Dilip K, Balusamy B, Patan R (2021) Ant colony optimization based quality of service aware energy balancing secure routing algorithm for wireless sensor networks. IEEE Trans Eng Manag 68(1):170\u2013182. https:\/\/doi.org\/10.1109\/TEM.2019.2953889","journal-title":"IEEE Trans Eng Manag"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01946-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01946-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01946-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T07:59:29Z","timestamp":1749283169000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01946-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,27]]},"references-count":41,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1946"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01946-5","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,27]]},"assertion":[{"value":"9 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This research contains no studies with human participants or animals performed by authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"132"}}