{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T01:09:08Z","timestamp":1772068148316,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,5,9]],"date-time":"2018-05-09T00:00:00Z","timestamp":1525824000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402521"],"award-info":[{"award-number":["61402521"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20150721"],"award-info":[{"award-number":["BK20150721"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20161469"],"award-info":[{"award-number":["BK20161469"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20140068"],"award-info":[{"award-number":["BK20140068"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"China Postdoctoral Science Foundation under Grant","award":["2015M582786"],"award-info":[{"award-number":["2015M582786"]}]},{"name":"China Postdoctoral Science Foundation under Grant","award":["2016T91017"],"award-info":[{"award-number":["2016T91017"]}]},{"name":"Engineering Research Center of Jiangsu Province","award":["BM2014391"],"award-info":[{"award-number":["BM2014391"]}]},{"name":"Primary Research & Development Plan of Jiangsu Province","award":["BE2015728"],"award-info":[{"award-number":["BE2015728"]}]},{"name":"Primary Research & Development Plan of Jiangsu Province","award":["BE2016904"],"award-info":[{"award-number":["BE2016904"]}]},{"name":"National Key Research and Development Program","award":["2016YFC0800606"],"award-info":[{"award-number":["2016YFC0800606"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s12652-018-0810-7","type":"journal-article","created":{"date-parts":[[2018,5,9]],"date-time":"2018-05-09T11:25:28Z","timestamp":1525865128000},"page":"3109-3121","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["A reliable routing protocol against hotspots and burst for UASN-based fog systems"],"prefix":"10.1007","volume":"10","author":[{"given":"Chen","family":"Qiuli","sequence":"first","affiliation":[]},{"given":"Xianglin","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Dai","family":"Fei","sequence":"additional","affiliation":[]},{"given":"He","family":"Ming","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,9]]},"reference":[{"key":"810_CR1","doi-asserted-by":"publisher","unstructured":"Al-khatib AA, Hassan R (2017) Performance evaluation of AODV, DSDV, and DSR routing protocols in MANET using NS-2 simulator. In: International conference of reliable information and communication technology. Springer, Cham, pp\u00a0276\u2013284. \n                              https:\/\/doi.org\/10.1007\/978-3-319-59427-9_30","DOI":"10.1007\/978-3-319-59427-9_30"},{"issue":"1","key":"810_CR2","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1002\/dac.1327","volume":"26","author":"RS Al-Qassas","year":"2013","unstructured":"Al-Qassas RS, Ould-Khaoua M (2013) Performance comparison of end-to-end and on-the-spot traffic-aware techniques. Int J Commun Syst 26(1):13\u201333. \n                              https:\/\/doi.org\/10.1002\/dac.1327","journal-title":"Int J Commun Syst"},{"issue":"7","key":"810_CR3","doi-asserted-by":"publisher","first-page":"768936","DOI":"10.1155\/2014\/768936","volume":"10","author":"E Amiri","year":"2014","unstructured":"Amiri E, Keshavarz H, Alizadeh M, Zamani M, Khodadadi T (2014) Energy efficient routing in wireless sensor networks based on fuzzy ant colony optimization. Int J Distrib Sens Netw 10(7):768936. \n                              https:\/\/doi.org\/10.1155\/2014\/768936","journal-title":"Int J Distrib Sens Netw"},{"issue":"7","key":"810_CR4","doi-asserted-by":"publisher","first-page":"1950","DOI":"10.1016\/j.asoc.2011.04.007","volume":"12","author":"BA Attea","year":"2012","unstructured":"Attea BA, Khalil EA (2012) A new evolutionary based routing protocol for clustered heterogeneous wireless sensor networks. Appl Soft Comput J 12(7):1950\u20131957. \n                              https:\/\/doi.org\/10.1016\/j.asoc.2011.04.007","journal-title":"Appl Soft Comput J"},{"issue":"8","key":"810_CR5","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/TPAMI.2016.2608901","volume":"39","author":"XJ Chang","year":"2017","unstructured":"Chang XJ, Yu YL, Yang Y, Xing EP (2017) Semantic pooling for complex event analysis in untrimmed videos. IEEE Trans Pattern Anal Mach Intell 39(8):1617\u20131632. \n                              https:\/\/doi.org\/10.1109\/TPAMI.2016.2608901","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"810_CR6","doi-asserted-by":"publisher","unstructured":"Cheng Q, Gao CZ (2017) A cloud aided privacy-preserving profile matching scheme in mobile social networks. In: IEEE international conference on computational science and engineering. IEEE, Piscataway, pp\u00a0195\u2013198. \n                              https:\/\/doi.org\/10.1109\/CSE-EUC.2017.219","DOI":"10.1109\/CSE-EUC.2017.219"},{"issue":"1","key":"810_CR7","doi-asserted-by":"publisher","first-page":"795","DOI":"10.3390\/s140100795","volume":"14","author":"S Climent","year":"2014","unstructured":"Climent S, Sanchez A, Capella JV, Meratnia N, Serrano JJ (2014) Underwater acoustic wireless sensor networks: advances and future trends in physical, MAC and routing layers. Sensors 14(1):795\u2013833. \n                              https:\/\/doi.org\/10.3390\/s140100795","journal-title":"Sensors"},{"key":"810_CR8","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.jnca.2015.02.004","volume":"52","author":"RS Elhabyan","year":"2015","unstructured":"Elhabyan RS, Yagoub MC (2015) Two-tier particle swarm optimization protocol for clustering and routing in wireless sensor network. J Netw Comput Appl 52:116\u2013128. \n                              https:\/\/doi.org\/10.1016\/j.jnca.2015.02.004","journal-title":"J Netw Comput Appl"},{"key":"810_CR9","doi-asserted-by":"publisher","unstructured":"Fan JH, Wei XL, Wang TX, Lan T, Subramaniam S (2017) Deadline-aware task scheduling in a tiered IoT infrastructure. GLOBECOM 2017\u20132017, IEEE global communications conference. IEEE, Piscataway, pp\u00a01\u20137. \n                              https:\/\/doi.org\/10.1109\/GLOCOM.2017.8255037","DOI":"10.1109\/GLOCOM.2017.8255037"},{"issue":"2","key":"810_CR10","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1109\/COMST.2017.2657881","volume":"19","author":"SM Ghoreyshi","year":"2017","unstructured":"Ghoreyshi SM, Shahrabi A, Boutaleb T (2017) Void-handling techniques for routing protocols in underwater sensor networks: survey and challenges. IEEE Commun Surv Tutor 19(2):800\u2013827. \n                              https:\/\/doi.org\/10.1109\/COMST.2017.2657881","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"810_CR11","doi-asserted-by":"publisher","first-page":"155014771668697","DOI":"10.1177\/1550147716686979","volume":"13","author":"M He","year":"2017","unstructured":"He M, Liu FX, Miao Z, Zhou H, Chen QL (2017) A mechanism of topology optimization for underwater acoustic sensor networks based on autonomous underwater vehicles. Int J Distrib Sens Netw 13(1):1550147716686979. \n                              https:\/\/doi.org\/10.1177\/1550147716686979","journal-title":"Int J Distrib Sens Netw"},{"issue":"2","key":"810_CR12","doi-asserted-by":"publisher","first-page":"2348","DOI":"10.1016\/j.asoc.2010.08.014","volume":"11","author":"CJ Huang","year":"2011","unstructured":"Huang CJ, Wang YW, Liao HH, Lin CF, Hu KW, Chang TY (2011) A power-efficient routing protocol for underwater wireless sensor networks. Appl Soft Comput 11(2):2348\u20132355. \n                              https:\/\/doi.org\/10.1016\/j.asoc.2010.08.014","journal-title":"Appl Soft Comput"},{"issue":"3","key":"810_CR13","doi-asserted-by":"publisher","first-page":"618072","DOI":"10.1155\/2015\/618072","volume":"11","author":"F Kiani","year":"2015","unstructured":"Kiani F, Amiri E, Zamani M, Khodadadi T, Manaf AA (2015) Efficient intelligent energy routing protocol in wireless sensor networks. Int J Distrib Sens Netw 11(3):618072. \n                              https:\/\/doi.org\/10.1155\/2015\/618072","journal-title":"Int J Distrib Sens Netw"},{"issue":"6","key":"810_CR14","doi-asserted-by":"publisher","first-page":"7548","DOI":"10.3390\/s120607548","volume":"12","author":"N Kojic","year":"2012","unstructured":"Kojic N, Reljin I, Reljin B (2012) A neural networks-based hybrid routing protocol for wireless mesh networks. Sensors 12(6):7548\u20137575. \n                              https:\/\/doi.org\/10.3390\/s120607548","journal-title":"Sensors"},{"issue":"1","key":"810_CR15","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/S1570-8705(03)00014-3","volume":"1","author":"SB Lee","year":"2003","unstructured":"Lee SB, Cho J, Campbell AT (2003) A hotspot mitigation protocol for ad hoc networks. Ad Hoc Netw 1(1):87\u2013106. \n                              https:\/\/doi.org\/10.1016\/S1570-8705(03)00014-3","journal-title":"Ad Hoc Netw"},{"issue":"3","key":"810_CR16","doi-asserted-by":"publisher","first-page":"414","DOI":"10.3390\/s16030414","volume":"16","author":"N Li","year":"2016","unstructured":"Li N, Martinez JF, Meneses Chaus JM, Eckert M (2016) A survey on underwater acoustic sensor network routing protocols. Sensors 16(3):414. \n                              https:\/\/doi.org\/10.3390\/s16030414","journal-title":"Sensors"},{"issue":"3","key":"810_CR17","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.ins.2014.02.125","volume":"271","author":"H Liao","year":"2014","unstructured":"Liao H, Xu Z, Zeng XJ (2014) Distance and similarity measures for hesitant fuzzy linguistic term sets and their application in multi-criteria decision making. Inf Sci 271(3):125\u2013142. \n                              https:\/\/doi.org\/10.1016\/j.ins.2014.02.125","journal-title":"Inf Sci"},{"key":"810_CR18","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.jnca.2014.07.001","volume":"59","author":"Z Liu","year":"2016","unstructured":"Liu Z, Chen X, Yang J, Jia C, You I (2016) New order preserving encryption model for outsourced databases in cloud environments. J Netw Comput Appl 59:198\u2013207. \n                              https:\/\/doi.org\/10.1016\/j.jnca.2014.07.001","journal-title":"J Netw Comput Appl"},{"key":"810_CR19","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1016\/j.future.2017.02.024","volume":"78","author":"ZL Liu","year":"2018","unstructured":"Liu ZL, Li T, Li P, Jia C, Li J (2018) Verifiable searchable encryption with aggregate keys for data sharing system. Future Gener Comput Syst 78:778\u2013788. \n                              https:\/\/doi.org\/10.1016\/j.future.2017.02.024","journal-title":"Future Gener Comput Syst"},{"issue":"7","key":"810_CR20","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1002\/wcm.432","volume":"6","author":"MK Marina","year":"2006","unstructured":"Marina MK, Das SR (2006) Ad hoc on-demand multipath distance vector routing. Wirel Commun Mob Comput 6(7):969\u2013988. \n                              https:\/\/doi.org\/10.1002\/wcm.432","journal-title":"Wirel Commun Mob Comput"},{"key":"810_CR21","doi-asserted-by":"publisher","unstructured":"Nicolaou N, See A, Xie P, Cui JH, Maggiorini D (2007) Improving the robustness of location-based routing for underwater sensor networks. IEEE Oceans 2007-Europe, Piscataway, pp\u00a01\u20136. \n                              https:\/\/doi.org\/10.1109\/OCEANSE.2007.4302470","DOI":"10.1109\/OCEANSE.2007.4302470"},{"key":"810_CR22","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/978-981-10-4394-9_45","volume-title":"Advances in power systems and energy management","author":"SN Pari","year":"2018","unstructured":"Pari SN, Sathish M, Arumugam K (2018) An energy-efficient and reliable depth-based routing protocol for underwater wireless sensor network (ER-DBR). In: Advances in power systems and energy management. Springer, Singapore, pp\u00a0451\u2013463. \n                              https:\/\/doi.org\/10.1007\/978-981-10-4394-9_45"},{"issue":"4","key":"810_CR23","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1145\/190809.190336","volume":"24","author":"CE Perkins","year":"1994","unstructured":"Perkins CE, Bhagwat P (1994) Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Comput Commun Rev 24(4):234\u2013244. \n                              https:\/\/doi.org\/10.1145\/190809.190336","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"issue":"8","key":"810_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JIOT.2017.2775248","volume":"14","author":"J Shen","year":"2017","unstructured":"Shen J, Zhou T, Wei F, Sun X, Xiang Y (2017) Privacy-preserving and lightweight key agreement protocol for V2G in the social internet of things. IEEE Internet Things J 14(8):1\u201311. \n                              https:\/\/doi.org\/10.1109\/JIOT.2017.2775248","journal-title":"IEEE Internet Things J"},{"key":"810_CR25","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.jnca.2018.01.003","volume":"106","author":"J Shen","year":"2018","unstructured":"Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y (2018) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117\u2013123. \n                              https:\/\/doi.org\/10.1016\/j.jnca.2018.01.003","journal-title":"J Netw Comput Appl"},{"key":"810_CR26","doi-asserted-by":"publisher","unstructured":"Sun L, Li Z, Yan Q, Srisaan W, Pan Y (2017) SigPID: significant permission identification for android malware detection. In: International conference on malicious and unwanted software. IEEE, Piscataway, pp\u00a01\u20138. \n                              https:\/\/doi.org\/10.1109\/MALWARE.2016.7888730","DOI":"10.1109\/MALWARE.2016.7888730"},{"issue":"4","key":"810_CR27","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1002\/dac.2702","volume":"28","author":"V Torres-Padrosa","year":"2015","unstructured":"Torres-Padrosa V, Manzano M, Calle E, Marzo JL (2015) Community-based traffic preservation in telecommunication networks. Int J Commun Syst 28(4):762\u2013778. \n                              https:\/\/doi.org\/10.1002\/dac.2702","journal-title":"Int J Commun Syst"},{"issue":"2","key":"810_CR28","doi-asserted-by":"publisher","first-page":"222","DOI":"10.17706\/jcp.13.2.222-235","volume":"13","author":"TT Vo","year":"2018","unstructured":"Vo TT, Luong TN (2018) VRA-AODV: routing protocol detects Blackhole and Grayhole attacks in mobile ad hoc network. J Comput 13(2):222\u2013236. \n                              https:\/\/doi.org\/10.17706\/jcp.13.2.222-235","journal-title":"J Comput"},{"issue":"10","key":"810_CR29","doi-asserted-by":"publisher","first-page":"2251","DOI":"10.3390\/s17102251","volume":"17","author":"Z Wadud","year":"2017","unstructured":"Wadud Z, Hussain S, Javaid N, Bouk SH, Alrajeh N, Alabed MS, Guizani N (2017) An energy scaled and expanded vector-based forwarding scheme for industrial underwater acoustic sensor networks with sink mobility. Sensors 17(10):2251. \n                              https:\/\/doi.org\/10.3390\/s17102251","journal-title":"Sensors"},{"issue":"2","key":"810_CR30","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1109\/COMST.2016.2631146","volume":"19","author":"XL Wei","year":"2017","unstructured":"Wei XL, Wang QP, Wang TX, Fan JH (2017) Jammer localization in multi-hop wireless network: a comprehensive survey. IEEE Commun Surv Tutor 19(2):765\u2013799. \n                              https:\/\/doi.org\/10.1109\/COMST.2016.2631146","journal-title":"IEEE Commun Surv Tutor"},{"key":"810_CR31","doi-asserted-by":"publisher","unstructured":"Wu Y, Xu L, Lin X, Fang J (2017) A new routing protocol based on OLSR designed for UANET maritime search and rescue. In: International conference on internet of vehicles. Springer, Cham, pp\u00a079\u201391. \n                              https:\/\/doi.org\/10.1007\/978-3-319-72329-7_8","DOI":"10.1007\/978-3-319-72329-7_8"},{"key":"810_CR32","doi-asserted-by":"publisher","first-page":"1216","DOI":"10.1007\/11753810_111","volume-title":"VBF: vector-based forwarding protocol for underwater sensor networks","author":"P Xie","year":"2006","unstructured":"Xie P, Cui JH, Lao L (2006) VBF: vector-based forwarding protocol for underwater sensor networks. In: International conference on research in networking, Berlin, pp\u00a01216\u20131221. \n                              https:\/\/doi.org\/10.1007\/11753810_111"},{"key":"810_CR33","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-540-79549-0_7","volume-title":"DBR: depth-based routing for underwater sensor networks","author":"H Yan","year":"2008","unstructured":"Yan H, Shi ZJ, Cui JH (2008) DBR: depth-based routing for underwater sensor networks. In: International conference on research in networking, Springer, Berlin, pp\u00a072\u201386. \n                              https:\/\/doi.org\/10.1007\/978-3-540-79549-0_7"},{"key":"810_CR34","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.adhoc.2015.08.023","volume":"37","author":"H Yu","year":"2016","unstructured":"Yu H, Yao N, Wang T, Li G, Gao Z, Tan G (2016) WDFAD-DBR: weighting depth and forwarding area division DBR routing protocol for UASNs. Ad Hoc Netw 37:256\u2013282. \n                              https:\/\/doi.org\/10.1016\/j.adhoc.2015.08.023","journal-title":"Ad Hoc Netw"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-0810-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-018-0810-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-0810-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T05:46:58Z","timestamp":1569304018000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-018-0810-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,9]]},"references-count":34,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["810"],"URL":"https:\/\/doi.org\/10.1007\/s12652-018-0810-7","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,9]]},"assertion":[{"value":"24 January 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}