{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:58:44Z","timestamp":1769752724907,"version":"3.49.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T00:00:00Z","timestamp":1753833600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T00:00:00Z","timestamp":1753833600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12083-025-02074-w","type":"journal-article","created":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T11:23:30Z","timestamp":1753874610000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cross-layer optimization in wireless sensor networks for energy-efficient multimedia transmission"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-3942-1297","authenticated-orcid":false,"given":"Milind Babarao","family":"Waghmare","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2645-2414","authenticated-orcid":false,"given":"Prashant N.","family":"Chatur","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2994-2400","authenticated-orcid":false,"given":"Kamlesh A.","family":"Waghmare","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8226-3713","authenticated-orcid":false,"given":"Ravi V.","family":"Mante","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,30]]},"reference":[{"key":"2074_CR1","doi-asserted-by":"crossref","unstructured":"Kadiravan G, Sujatha P, Asvany T, Punithavathi R, Elhoseny M, Pustokhina IV, Pustokhin DA, Shankar K (2021) Metaheuristic clustering protocol for healthcare data collection in mobile wireless multimedia sensor networks. Comput Mater Continua 66(3):3215\u20133231","DOI":"10.32604\/cmc.2021.013034"},{"issue":"1","key":"2074_CR2","first-page":"1628537","volume":"2022","author":"KS Adu-Manu","year":"2022","unstructured":"Adu-Manu KS, Engmann F, Sarfo-Kantanka G, Baiden GE, Dulemordzi BA (2022) WSN protocols and security challenges for environmental monitoring applications: a survey. J Sens 2022(1):1628537","journal-title":"J Sens"},{"issue":"10","key":"2074_CR3","first-page":"9517","volume":"7","author":"J Du","year":"2020","unstructured":"Du J, Yu FR, Lu G, Wang J, Jiang J, Chu X (2020) MEC-assisted immersive VR video streaming over terahertz wireless networks: a deep reinforcement learning approach. IEEE Int Things J 7(10):9517\u20139529","journal-title":"IEEE Int Things J"},{"issue":"7","key":"2074_CR4","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.3390\/s19071565","volume":"19","author":"BS Kim","year":"2019","unstructured":"Kim BS, Kim KI, Shah B, Chow F, Kim KH (2019) WSNfor big data systems. Sensors 19(7):1565","journal-title":"Sensors"},{"key":"2074_CR5","doi-asserted-by":"crossref","unstructured":"Singh S, Devgon R (2019) Analysis of encryption and lossless compression techniques for secure data transmission. In 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS), pp 1\u20135. IEEE","DOI":"10.1109\/CCOMS.2019.8821637"},{"key":"2074_CR6","doi-asserted-by":"publisher","first-page":"102292","DOI":"10.1016\/j.adhoc.2020.102292","volume":"109","author":"I Jemili","year":"2020","unstructured":"Jemili I, Ghrab D, Belghith A, Mosbah M (2020) Cross-layer adaptive multipath routing for multimedia WSN under duty cycle mode. Ad Hoc Netw 109:102292","journal-title":"Ad Hoc Netw"},{"key":"2074_CR7","doi-asserted-by":"publisher","first-page":"88418","DOI":"10.1109\/ACCESS.2019.2926206","volume":"7","author":"A Yazici","year":"2019","unstructured":"Yazici A, Koyuncu M, Sert SA, Yilmaz T (2019) A fusion-based framework for wireless multimedia sensor networks in surveillance applications. IEEE Access 7:88418\u201388434","journal-title":"IEEE Access"},{"issue":"4","key":"2074_CR8","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s10776-022-00567-6","volume":"29","author":"MA Matheen","year":"2022","unstructured":"Matheen MA, Sundar S (2022) IoT multimedia sensors for energy efficiency and security: a review of QoS aware and methods in wireless multimedia sensor networks. Int J Wireless Inf Networks 29(4):407\u2013418","journal-title":"Int J Wireless Inf Networks"},{"issue":"8","key":"2074_CR9","doi-asserted-by":"publisher","first-page":"1721","DOI":"10.1109\/JSAC.2019.2927088","volume":"37","author":"Xi Zhang","year":"2019","unstructured":"Zhang Xi, Zhu Q (2019) Information-centric virtualization for software-defined statistical QoS provisioning over 5G multimedia big data wireless networks. IEEE J Sel Areas Commun 37(8):1721\u20131738","journal-title":"IEEE J Sel Areas Commun"},{"key":"2074_CR10","doi-asserted-by":"publisher","first-page":"39852","DOI":"10.1109\/ACCESS.2019.2907157","volume":"7","author":"WU Rahman","year":"2019","unstructured":"Rahman WU, Choi YS, Chung K (2019) Performance evaluation of video streaming application over CoAP in IoT. IEEE Access 7:39852\u201339861","journal-title":"IEEE Access"},{"issue":"13","key":"2074_CR11","doi-asserted-by":"publisher","first-page":"4602","DOI":"10.3390\/s21134602","volume":"21","author":"S Yamagiwa","year":"2021","unstructured":"Yamagiwa S, Ichinomiya Y (2021) Stream-based visually lossless data compression applying variable bit-length ADPCM encoding. Sensors 21(13):4602","journal-title":"Sensors"},{"issue":"1","key":"2074_CR12","doi-asserted-by":"publisher","first-page":"14","DOI":"10.3390\/asi3010014","volume":"3","author":"D Kandris","year":"2020","unstructured":"Kandris D, Nakas C, Vomvas D, Koulouras G (2020) Applications of wireless sensor networks: an up-to-date survey. Appl Syst Innov 3(1):14","journal-title":"Appl Syst Innov"},{"issue":"4","key":"2074_CR13","doi-asserted-by":"publisher","first-page":"2307","DOI":"10.1007\/s11276-019-02083-7","volume":"26","author":"S Rani","year":"2020","unstructured":"Rani S, Ahmed SH, Rastogi R (2020) Dynamic clustering approach based on wireless sensor networks genetic algorithm for IoT applications. Wireless Netw 26(4):2307\u20132316","journal-title":"Wireless Netw"},{"issue":"1","key":"2074_CR14","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1109\/COMST.2019.2958784","volume":"22","author":"AA Barakabitze","year":"2019","unstructured":"Barakabitze AA, Barman N, Ahmad A, Zadtootaghaj S, Sun L, Martini MG, Atzori L (2019) QoE management of multimedia streaming services in future networks: a tutorial and survey. IEEE Commun Surv Tutor 22(1):526\u2013565","journal-title":"IEEE Commun Surv Tutor"},{"key":"2074_CR15","doi-asserted-by":"crossref","unstructured":"Janakamma C, Hegde NP (2023) Reliable transmission of multimedia data over wireless sensor networks. In Proceedings of Third International Conference on Advances in Computer Engineering and Communication Systems: ICACECS 2022, pp 91\u2013100. Singapore, Springer Nature Singapore","DOI":"10.1007\/978-981-19-9228-5_9"},{"issue":"11","key":"2074_CR16","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/CC.2017.8233654","volume":"14","author":"T Wang","year":"2017","unstructured":"Wang T, Wen CK, Wang H, Gao F, Jiang T, Jin S (2017) Deep learning for wireless physical layer: opportunities and challenges. China Communications 14(11):92\u2013111","journal-title":"China Communications"},{"key":"2074_CR17","doi-asserted-by":"crossref","unstructured":"Bistarelli S, Imparato A, Santini F (2024) A TCP-based covert channel with integrity check and retransmission. Int J Inf Secur 23:1\u201332","DOI":"10.1007\/s10207-024-00879-z"},{"issue":"1","key":"2074_CR18","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s11277-021-08433-z","volume":"120","author":"VK Quy","year":"2021","unstructured":"Quy VK, Nam VH, Linh DM, Ban NT, Han ND (2021) A survey of QoS-aware routing protocols for the MANET-WSN convergence scenarios in IoT networks. Wireless Pers Commun 120(1):49\u201362","journal-title":"Wireless Pers Commun"},{"key":"2074_CR19","doi-asserted-by":"crossref","unstructured":"Negra R, Jemili I, Belghith A, Mosbah M (2019) MTM-MAC: medical traffic management MAC protocol for handling healthcare applications in WBANs. In Ad-Hoc, Mobile, and Wireless Networks: 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1\u20133, 2019, Proceedings 18, pp 483\u2013497. Springer International Publishing","DOI":"10.1007\/978-3-030-31831-4_33"},{"issue":"24","key":"2074_CR20","doi-asserted-by":"publisher","first-page":"8165","DOI":"10.3390\/s24248165","volume":"24","author":"QH Ta","year":"2024","unstructured":"Ta QH, Ta VK, Nguyen TT, Oh H (2024) A WSN and LoRa hybrid multimedia transmission protocol for scalar data and image transmission. Sensors 24(24):8165","journal-title":"Sensors"},{"key":"2074_CR21","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s11276-017-1542-x","volume":"25","author":"D Pyeon","year":"2019","unstructured":"Pyeon D, Yoon H (2019) An efficient multi-path pipeline transmission for a bulk data transfer in IEEE 802.15. 4 multi-hop networks. Wireless Netw 25:117\u2013130","journal-title":"Wireless Netw"},{"issue":"4","key":"2074_CR22","doi-asserted-by":"publisher","first-page":"3595","DOI":"10.11591\/ijece.v12i4.pp3595-3606","volume":"12","author":"MF Abbood","year":"2022","unstructured":"Abbood MF, Kadhim MF, Kadhim AR (2022) Improving multimedia data transmission quality in wireless multimedia sensor networks though priority-based data collection. Int J Elect Comput Eng 12(4):3595","journal-title":"Int J Elect Comput Eng"},{"key":"2074_CR23","doi-asserted-by":"crossref","unstructured":"Prakash V, Singh D, Pandey S, Singh S, Singh PK (2024) Energy-optimization route and cluster head selection using m-pso and ga in wireless sensor networks. Wirel Pers Commun 1\u201326","DOI":"10.1007\/s11277-024-11096-1"},{"key":"2074_CR24","doi-asserted-by":"publisher","first-page":"104892","DOI":"10.1016\/j.micpro.2023.104892","volume":"101","author":"S Singh","year":"2023","unstructured":"Singh S, Garg D, Malik A (2023) A novel cluster head selection algorithm based IoT enabled heterogeneous WSNs distributed architecture for smart city. Microprocess Microsyst 101:104892","journal-title":"Microprocess Microsyst"},{"key":"2074_CR25","doi-asserted-by":"crossref","unstructured":"Singh S, Malik A (2024) Analysis and performance evaluation of routing protocols using sink mobility in IoT-enabled wireless sensor networks. In IoT-enabled sensor networks: architecture, methodologies, security, and futuristic applications. Bentham science publishers, pp 67\u201380","DOI":"10.2174\/9789815049480124060007"},{"issue":"1","key":"2074_CR26","first-page":"1427","volume":"11","author":"S Singh","year":"2023","unstructured":"Singh S, Nandan AS, Sikka G, Malik A, Kumar N (2023) A genetic-algorithm-based dynamic transmission of data for communicable disease in IoMT environment. IEEE Int Things J 11(1):1427\u20131438","journal-title":"IEEE Int Things J"},{"issue":"2","key":"2074_CR27","doi-asserted-by":"publisher","first-page":"438","DOI":"10.3390\/sym15020438","volume":"15","author":"X Xue","year":"2023","unstructured":"Xue X, Shanmugam R, Palanisamy SK, Khalaf OI, Selvaraj D, Abdulsahib GM (2023) A hybrid cross-layer with harris-hawk-optimization-based efficient routing for wireless sensor networks. Symmetry 15(2):438","journal-title":"Symmetry"},{"issue":"4","key":"2074_CR28","doi-asserted-by":"publisher","first-page":"3125","DOI":"10.1007\/s11277-021-08866-6","volume":"121","author":"HB Mahajan","year":"2021","unstructured":"Mahajan HB, Badarla A (2021) Cross-layer protocol for WSN-assisted IoT smart farming applications using nature-inspired algorithm. Wireless Pers Commun 121(4):3125\u20133149","journal-title":"Wireless Pers Commun"},{"issue":"4","key":"2074_CR29","doi-asserted-by":"publisher","first-page":"68","DOI":"10.3390\/a12040068","volume":"12","author":"S Fan","year":"2019","unstructured":"Fan S (2019) A cross-layer optimization QoS scheme in wireless multimedia sensor networks. Algorithms 12(4):68","journal-title":"Algorithms"},{"key":"2074_CR30","doi-asserted-by":"publisher","first-page":"10031","DOI":"10.1109\/ACCESS.2022.3142859","volume":"10","author":"TM Shami","year":"2022","unstructured":"Shami TM, El-Saleh AA, Alswaitti M, Al-Tashi Q, Summakieh MA, Mirjalili Seyedali (2022) Particle swarm optimization: a comprehensive survey. IEEE Access 10:10031\u201310061","journal-title":"IEEE Access"},{"key":"2074_CR31","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.procs.2020.06.036","volume":"173","author":"SR Sangwan","year":"2020","unstructured":"Sangwan SR, Bhatia MPS (2020) Denigration bullying resolution using wolf search optimized online reputation rumor detection. Procedia Comput Sci 173:305\u2013314","journal-title":"Procedia Comput Sci"},{"key":"2074_CR32","doi-asserted-by":"crossref","unstructured":"Huang J, Asteris PG, Manafi Khajeh Pasha S, Mohammed AS, Hasanipanah M (2020) A new auto-tuning model for predicting the rock fragmentation: a cat swarm optimization algorithm. Eng Comput 38:2209\u20132220","DOI":"10.1007\/s00366-020-01207-4"},{"key":"2074_CR33","doi-asserted-by":"crossref","unstructured":"Ahmed AM, Rashid TA, Saeed SAM (2020) Cat swarm optimization algorithm: a survey and performance evaluation. Comput Intell Neurosci 2020(1):4854895","DOI":"10.1155\/2020\/4854895"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02074-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02074-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02074-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T06:38:36Z","timestamp":1760683116000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02074-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,30]]},"references-count":33,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2074"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02074-w","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,30]]},"assertion":[{"value":"9 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"257"}}