{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T00:03:49Z","timestamp":1772669029242,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T00:00:00Z","timestamp":1742860800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T00:00:00Z","timestamp":1742860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s12083-025-01951-8","type":"journal-article","created":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:25:07Z","timestamp":1743146707000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Security-aware, Red fox optimization-based cluster-based routing in wireless sensor network"],"prefix":"10.1007","volume":"18","author":[{"given":"Sameer","family":"Dixit","sequence":"first","affiliation":[]},{"given":"Shaima","family":"Qureshi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,25]]},"reference":[{"key":"1951_CR1","doi-asserted-by":"publisher","first-page":"105788","DOI":"10.1016\/j.asoc.2019.105788","volume":"85","author":"S Verma","year":"2019","unstructured":"Verma S, Sood N, Sharma AK (2019) Genetic algorithm-based optimized cluster head selection for single and multiple data sinks in heterogeneous wireless sensor network. Appl Soft Comput 85:105788","journal-title":"Appl Soft Comput"},{"issue":"16","key":"1951_CR2","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4553","volume":"33","author":"S Kaur","year":"2020","unstructured":"Kaur S, Grewal V (2020) A novel approach for particle swarm optimization-based clustering with dual sink mobility in wireless sensor network. Int J Commun Syst 33(16):e4553","journal-title":"Int J Commun Syst"},{"key":"1951_CR3","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.tcs.2022.07.011","volume":"930","author":"GV Gurram","year":"2022","unstructured":"Gurram GV, Shariff NC, Biradar RL (2022) A secure energy aware meta-heuristic routing protocol (seamhr) for sustainable iot-wireless sensor network (wsn). Theoret Comput Sci 930:63\u201376","journal-title":"Theoret Comput Sci"},{"issue":"1","key":"1951_CR4","doi-asserted-by":"publisher","first-page":"44","DOI":"10.15575\/join.v3i1.207","volume":"3","author":"S Rahmadika","year":"2018","unstructured":"Rahmadika S, Ramdania DR, Harika M (2018) Security analysis on the decentralized energy trading system using blockchain technology. Jurnal Online Informatika 3(1):44\u201347","journal-title":"Jurnal Online Informatika"},{"key":"1951_CR5","doi-asserted-by":"publisher","first-page":"83537","DOI":"10.1109\/ACCESS.2023.3303113","volume":"11","author":"MA Elsadig","year":"2023","unstructured":"Elsadig MA (2023) Detection of denial-of-service attack in wireless sensor networks: A lightweight machine learning approach. IEEE Access 11:83537\u201383552","journal-title":"IEEE Access"},{"key":"1951_CR6","doi-asserted-by":"crossref","unstructured":"Krishna KP, Thirumuru R (2023) Energy efficient and multi-hop routing for constrained wireless sensor networks. Sustainable Computing: Informatics and Systems, page 100866","DOI":"10.1016\/j.suscom.2023.100866"},{"issue":"4","key":"1951_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LSENS.2021.3063326","volume":"5","author":"L Harn","year":"2021","unstructured":"Harn L, Hsu CF, Xia Z, He Z (2021) Lightweight aggregated data encryption for wireless sensor networks (wsns). IEEE Sensors Letters 5(4):1\u20134","journal-title":"IEEE Sensors Letters"},{"issue":"3","key":"1951_CR8","doi-asserted-by":"publisher","first-page":"1675","DOI":"10.1007\/s11277-024-11353-3","volume":"136","author":"V Anusuya Devi","year":"2024","unstructured":"Anusuya Devi V, Sampradeepraj T (2024) End-to-end self-organizing intelligent security model for wireless sensor network based on a hybrid (aes-rsa) cryptography. Wireless Pers Commun 136(3):1675\u20131703","journal-title":"Wireless Pers Commun"},{"key":"1951_CR9","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.aej.2023.03.061","volume":"72","author":"S Urooj","year":"2023","unstructured":"Urooj S, Lata S, Ahmad S, Mehfuz S, Kalathil S (2023) Cryptographic data security for reliable wireless sensor network. Alex Eng J 72:37\u201350","journal-title":"Alex Eng J"},{"key":"1951_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2024.102283","volume":"63","author":"L Zheng","year":"2024","unstructured":"Zheng L (2024) An improved localization approach based on sybil attack for wsn. Physical Communication 63:102283","journal-title":"Physical Communication"},{"key":"1951_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114107","volume":"166","author":"D Po\u0142ap","year":"2021","unstructured":"Po\u0142ap D, Wo\u017aniak M (2021) Red fox optimization algorithm. Expert Syst Appl 166:114107","journal-title":"Expert Syst Appl"},{"key":"1951_CR12","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/j.compeleceng.2016.09.016","volume":"56","author":"T Bhatia","year":"2016","unstructured":"Bhatia T, Kansal S, Goel S, Verma AK (2016) A genetic algorithm based distance-aware routing protocol for wireless sensor networks. Comput Electr Eng 56:441\u2013455","journal-title":"Comput Electr Eng"},{"key":"1951_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2020.100772","volume":"60","author":"BM Sahoo","year":"2021","unstructured":"Sahoo BM, Pandey HM, Amgoth T (2021) Gapso-h: A hybrid approach towards optimizing the cluster based routing in wireless sensor network. Swarm Evol Comput 60:100772","journal-title":"Swarm Evol Comput"},{"key":"1951_CR14","doi-asserted-by":"crossref","unstructured":"Dogra R, Rani S, Sharma B, Verma S, Anand D, Chatterjee P (2021) A novel dynamic clustering approach for energy hole mitigation in internet of things-based wireless sensor network. Int J Commun Syst 34(9):e4806","DOI":"10.1002\/dac.4806"},{"key":"1951_CR15","unstructured":"Pokhrel SR, Verma S, Garg S, Sharma AK, Choi J (2020) An intelligent clustering framework for massive communication of industrial sensors. IEEE Transactions on Industrial Informatics"},{"key":"1951_CR16","unstructured":"Avdhesh Yadav S, Poongoodi T (2025) A novel optimized routing technique to mitigate hot-spot problem (north) for wireless sensor network-based internet of things. International Journal of Communication Systems, page e5314"},{"issue":"5","key":"1951_CR17","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1109\/JSAC.2024.3365889","volume":"42","author":"Q Tang","year":"2024","unstructured":"Tang Q, Xie R, Fang Z, Huang T, Chen T, Zhang R, Yu FR (2024) Joint service deployment and task scheduling for satellite edge computing: A two-timescale hierarchical approach. IEEE J Sel Areas Commun 42(5):1063\u20131079","journal-title":"IEEE J Sel Areas Commun"},{"issue":"11","key":"1951_CR18","first-page":"6327","volume":"22","author":"Q Tang","year":"2023","unstructured":"Tang Q, Xie R, Yu FR, Chen T, Zhang R, Huang T, Liu Y (2023) Collective deep reinforcement learning for intelligence sharing in the internet of intelligence-empowered edge computing. IEEE Trans Mob Comput 22(11):6327\u20136342","journal-title":"IEEE Trans Mob Comput"},{"key":"1951_CR19","first-page":"19","volume":"4","author":"A Roshini","year":"2023","unstructured":"Roshini A, Kiran KVD (2023) Hierarchical energy efficient secure routing protocol for optimal route selection in wireless body area networks. Int J Intell Netw 4:19\u201328","journal-title":"Int J Intell Netw"},{"key":"1951_CR20","first-page":"3579","volume":"45","author":"S Gopinath","year":"2021","unstructured":"Gopinath S, Vinoth Kumar K, Elayaraja P, Parameswari A, Balakrishnan S, Thiruppathi M (2021) Sceer: secure cluster based efficient energy routing scheme for wireless sensor networks. Materials Today: Proceedings 45:3579\u20133584","journal-title":"Materials Today: Proceedings"},{"issue":"1","key":"1951_CR21","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/TEM.2019.2953889","volume":"68","author":"M Rathee","year":"2021","unstructured":"Rathee M, Kumar S, Gandomi AH, Dilip K, Balusamy B, Patan R (2021) Ant colony optimization based quality of service aware energy balancing secure routing algorithm for wireless sensor networks. IEEE Trans Eng Manage 68(1):170\u2013182","journal-title":"IEEE Trans Eng Manage"},{"issue":"13","key":"1951_CR22","doi-asserted-by":"publisher","first-page":"10539","DOI":"10.1109\/JIOT.2021.3121529","volume":"9","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Ren Q, Song K, Liu Y, Zhang T, Qian Y (2022) An energy-efficient multilevel secure routing protocol in iot networks. IEEE Internet Things J 9(13):10539\u201310553","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"1951_CR23","doi-asserted-by":"publisher","first-page":"13473","DOI":"10.1109\/TITS.2021.3124730","volume":"23","author":"S Verma","year":"2022","unstructured":"Verma S, Zeadally S, Kaur S, Sharma AK (2022) Intelligent and secure clustering in wireless sensor network (wsn)-based intelligent transportation systems. IEEE Trans Intell Transp Syst 23(8):13473\u201313481","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1951_CR24","doi-asserted-by":"publisher","first-page":"161096","DOI":"10.1109\/ACCESS.2024.3490498","volume":"12","author":"KM Ahmed","year":"2024","unstructured":"Ahmed KM, Shams R, Khan FH, Luque-Nieto MA (2024) Securing underwater wireless sensor networks: A review of attacks and mitigation techniques. IEEE Access 12:161096\u2013161133","journal-title":"IEEE Access"},{"issue":"29","key":"1951_CR25","doi-asserted-by":"publisher","first-page":"1950235","DOI":"10.1142\/S0217732319502353","volume":"34","author":"S Verma","year":"2019","unstructured":"Verma S, Sood N, Sharma AK (2019) Qos provisioning-based routing protocols using multiple data sink in iot-based wsn. Mod Phys Lett A 34(29):1950235","journal-title":"Mod Phys Lett A"},{"key":"1951_CR26","doi-asserted-by":"crossref","unstructured":"Sharma R, Vashisht V, Singh U (2020) eetmfo\/ga: a secure and energy efficient cluster head selection in wireless sensor networks. Telecommunication Systems, pages 1\u201316","DOI":"10.1007\/s11235-020-00654-0"},{"issue":"4","key":"1951_CR27","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1080\/2150704X.2020.1716409","volume":"11","author":"HD Nguyen","year":"2020","unstructured":"Nguyen HD, Pham VD, Nguyen QH, Pham VM, Pham MH, Vu VM, Bui QT (2020) An optimal search for neural network parameters using the salp swarm optimization algorithm: a landslide application. Remote Sensing Letters 11(4):353\u2013362","journal-title":"Remote Sensing Letters"},{"key":"1951_CR28","unstructured":"Rappaport TS et\u00a0al (1996) Wireless communications: principles and practice. Prentice Hall PTR New Jersey"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01951-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01951-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01951-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:31:19Z","timestamp":1746844279000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01951-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,25]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1951"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01951-8","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,25]]},"assertion":[{"value":"28 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This article contains no studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval and Consent to Participate"}},{"value":"All authors agree to publish the paper and related research results.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}],"article-number":"128"}}