{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T17:56:53Z","timestamp":1773079013843,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T00:00:00Z","timestamp":1583107200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T00:00:00Z","timestamp":1583107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s12652-020-01724-6","type":"journal-article","created":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T10:03:02Z","timestamp":1583143382000},"page":"4681-4693","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["RETRACTED ARTICLE: Energy efficient data transmission in WSN thru compressive slender penetrative etiquette"],"prefix":"10.1007","volume":"11","author":[{"given":"Vandana","family":"Reddy","sequence":"first","affiliation":[]},{"given":"P.","family":"Gayathri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,2]]},"reference":[{"issue":"2","key":"1724_CR1","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/TNSM.2013.043013.120282","volume":"10","author":"H Al-Hamadi","year":"2013","unstructured":"Al-Hamadi H, Chen R (2013) Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks. IEEE Trans Netw Serv Manag 10(2):189\u2013203","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"7","key":"1724_CR2","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1016\/j.comcom.2013.01.006","volume":"36","author":"M Amadeo","year":"2013","unstructured":"Amadeo M, Molinaro A, Ruggeri G (2013) E-CHANET: routing, forwarding and transport in Information-Centric multihop wireless networks. Comput Commun 36(7):792\u2013803","journal-title":"Comput Commun"},{"issue":"2","key":"1724_CR3","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.comcom.2011.09.009","volume":"35","author":"N Amini","year":"2012","unstructured":"Amini N, Vahdatpour A, Xu W, Gerla M, Sarrafzadeh M (2012) Cluster size optimization in sensor networks with decentralized cluster-based protocols. Comput Commun 35(2):207\u2013220","journal-title":"Comput Commun"},{"issue":"2","key":"1724_CR4","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/TCOMM.2012.031912.110179","volume":"9","author":"F Bao","year":"2012","unstructured":"Bao F, Chen R, Chang M, Cho JH (2012) Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans Netw Serv Manage 9(2):169\u2013183","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"7","key":"1724_CR5","doi-asserted-by":"publisher","first-page":"1950","DOI":"10.1016\/j.asoc.2011.04.007","volume":"12","author":"AA Bara\u2019a","year":"2012","unstructured":"Bara\u2019a AA, Khalil EA (2012) A new evolutionary based routing protocol for clustered heterogeneous wireless sensor networks. Appl Soft Comput 12(7):1950\u20131957","journal-title":"Appl Soft Comput"},{"issue":"1","key":"1724_CR6","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s11276-015-0951-y","volume":"22","author":"PK Batra","year":"2016","unstructured":"Batra PK, Kant K (2016) LEACH-MAC: a new cluster head selection algorithm for wireless sensor networks. wireless Netw 22(1):49\u201360","journal-title":"wireless Netw"},{"key":"1724_CR7","doi-asserted-by":"publisher","first-page":"3182","DOI":"10.1109\/ACCESS.2016.2576475","volume":"4","author":"GS Brar","year":"2016","unstructured":"Brar GS, Rani S, Chopra V, Malhotra R, Song H, Ahmed SH (2016) Energy efficient direction-based PDORP routing protocol for WSN. IEEE Access 4:3182\u20133194","journal-title":"IEEE Access"},{"issue":"1","key":"1724_CR8","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","volume":"16","author":"I Butun","year":"2014","unstructured":"Butun I, Morgera DS, Sankar R (2014) A survey of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutor 16(1):266\u2013282","journal-title":"IEEE Commun Surv Tutor"},{"issue":"11","key":"1724_CR9","doi-asserted-by":"publisher","first-page":"1903","DOI":"10.1109\/JPROC.2010.2068530","volume":"98","author":"P Corke","year":"2010","unstructured":"Corke P, Wark T, Jurdak R, Wen H, Valencia P, Moore D (2010) Environmental wireless sensor networks. Proc IEEE 98(11):1903\u20131917","journal-title":"Proc IEEE"},{"issue":"4","key":"1724_CR10","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1049\/iet-wss.2012.0034","volume":"2","author":"PD Dahnil","year":"2012","unstructured":"Dahnil PD, Singh YP, Ho CK (2012) Topology-controlled adaptive clustering for uniformity and increased lifetime in wireless sensor networks. IET Wireless Sens Syst 2(4):318\u2013327","journal-title":"IET Wireless Sens Syst"},{"issue":"4","key":"1724_CR11","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1109\/JCN.2013.000073","volume":"15","author":"S Ganesh","year":"2013","unstructured":"Ganesh S, Amutha R (2013) Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms. J Commun Netw 15(4):422\u2013429","journal-title":"J Commun Netw"},{"issue":"2","key":"1724_CR12","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1016\/j.compeleceng.2013.08.003","volume":"40","author":"X Gu","year":"2014","unstructured":"Gu X, Jiguo Y, Dongxiao Y, Wang G, Lv Y (2014) ECDC: an energy and coverage-aware distributed clustering protocol for wireless sensor networks. Comput Electr Eng 40(2):384\u2013398","journal-title":"Comput Electr Eng"},{"issue":"70","key":"1724_CR13","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.future.2016.06.010","volume":"1","author":"Q Guo","year":"2017","unstructured":"Guo Q, Li X, Xu G, Feng Z (2017) MP-MID: multi-protocol oriented middleware-level intrusion detection method for wireless sensor networks. Future Gener Comput Syst 1(70):42\u201347","journal-title":"Future Gener Comput Syst"},{"key":"1724_CR14","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.cose.2016.06.007","volume":"62","author":"A Hassanzadeh","year":"2016","unstructured":"Hassanzadeh A, Zhaoyan X, Stoleru GG, Polychronakis M (2016) PRIDE: a practical intrusion detection system for resource constrained wireless mesh networks. Comput Secur 62:114\u2013132","journal-title":"Comput Secur"},{"key":"1724_CR15","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.ins.2011.03.014","volume":"231","author":"JY Huang","year":"2013","unstructured":"Huang JY, Liao IE, Chung YF, Chen KT (2013) Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining. Inform Sci 231:32\u201344","journal-title":"Inform Sci"},{"issue":"10","key":"1724_CR16","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1002\/dac.2438","volume":"27","author":"J Ibriq","year":"2014","unstructured":"Ibriq J, Mahgoub I (2014) HIKES: hierarchical key establishment scheme for wireless sensor networks. Int J Commun Syst 27(10):1825\u20131856","journal-title":"Int J Commun Syst"},{"issue":"8","key":"1724_CR17","doi-asserted-by":"publisher","first-page":"1851","DOI":"10.1007\/s11276-013-0570-4","volume":"19","author":"RC Jin","year":"2013","unstructured":"Jin RC, Gao T, Zou JY, Wang LD (2013) Passive cluster-based multipath routing protocol for wireless sensor networks. Wireless Netw 19(8):1851\u20131866","journal-title":"Wireless Netw"},{"issue":"2","key":"1724_CR18","first-page":"293","volume":"1","author":"C Karlof","year":"2013","unstructured":"Karlof C, Wagner D (2013) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2):293\u2013315","journal-title":"Ad Hoc Netw"},{"key":"1724_CR19","first-page":"332","volume-title":"SMART: secure multi-pAths routing for wireless sensor networks. In\u00a0International Conference on Ad-Hoc networks and wireless","author":"N Lasla","year":"2014","unstructured":"Lasla N, Derhab A, Ouadjaout A, Bagaa M, Challal Y (2014) SMART: secure multi-pAths routing for wireless sensor networks. In\u00a0International Conference on Ad-Hoc networks and wireless. Springer, Cham, pp 332\u2013345"},{"issue":"6","key":"1724_CR20","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1109\/JIOT.2016.2530682","volume":"3","author":"JS Lee","year":"2016","unstructured":"Lee JS, Kao TY (2016) An improved three-layer low-energy adaptive clustering hierarchy for wireless sensor networks. IEEE Internet Things J 3(6):951\u2013958","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"1724_CR21","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1109\/JSEN.2012.2227704","volume":"13","author":"Y Liao","year":"2013","unstructured":"Liao Y, Qi H, Li W (2013) Load-balanced clustering algorithm with distributed self-organization for wireless sensor networks. IEEE Sens J 13(5):1498\u20131506","journal-title":"IEEE Sens J"},{"issue":"2","key":"1724_CR22","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/2636344","volume":"47","author":"A Newell","year":"2015","unstructured":"Newell A, Yao H, Ryker A, Ho T, Nita-Rotaru C (2015) Node-capture resilient key establishment in sensor networks: design space and new protocols. ACM Comput Surv (CSUR) 47(2):24","journal-title":"ACM Comput Surv (CSUR)"},{"key":"1724_CR23","first-page":"138","volume":"4","author":"W Ouellette","year":"2016","unstructured":"Ouellette W, Getinet W (2016) Remote sensing for marine spatial planning and integrated coastal areas management: achievements, challenges, opportunities and future prospects. Remote Sens Appl 4:138\u2013157","journal-title":"Remote Sens Appl"},{"issue":"2","key":"1724_CR24","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/SURV.2012.062612.00084","volume":"15","author":"NA Pantazis","year":"2013","unstructured":"Pantazis NA, Nikolidakis SA, Vergados DD (2013) Energy-efficient routing protocols in wireless sensor networks: a survey. IEEE Commun Surv Tutor 15(2):551\u2013591","journal-title":"IEEE Commun Surv Tutor"},{"issue":"6","key":"1724_CR25","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1016\/j.asr.2013.06.007","volume":"52","author":"D Sanz","year":"2013","unstructured":"Sanz D, Barrientos A, Garz\u00f3n M, Rossi C, Mura M, Puccinelli D, Puiatti A et al (2013) Wireless sensor networks for planetary exploration: experimental assessment of communication and deployment. Adv Space Res 52(6):1029\u20131046","journal-title":"Adv Space Res"},{"key":"1724_CR26","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.jnca.2014.03.012","volume":"42","author":"S Shamshirband","year":"2014","unstructured":"Shamshirband S, Anuar NB, Kiah M, Rohani VA, Petkovi\u0107 D, Khan AN (2014) Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks. J Netw Comput Appl 42:102\u2013117","journal-title":"J Netw Comput Appl"},{"issue":"9","key":"1724_CR27","doi-asserted-by":"publisher","first-page":"2137","DOI":"10.1109\/TSP.2013.2239992","volume":"61","author":"KI Tsianos","year":"2013","unstructured":"Tsianos KI, Rabbat MG (2013) Multiscale gossip for efficient decentralized averaging in wireless packet networks. IEEE Trans Signal Process 61(9):2137\u20132149","journal-title":"IEEE Trans Signal Process"},{"issue":"2","key":"1724_CR28","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1016\/j.jnca.2012.12.001","volume":"36","author":"S Tyagi","year":"2013","unstructured":"Tyagi S, Kumar N (2013) A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks. J Netw Comput Appl 36(2):623\u2013645","journal-title":"J Netw Comput Appl"},{"issue":"59","key":"1724_CR29","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.jnca.2015.05.002","volume":"1","author":"Y Wang","year":"2016","unstructured":"Wang Y, Chen H, Wu X, Shu L (2016) An energy-efficient SDN based sleep scheduling algorithm for WSNs. J Netw Comput Appl 1(59):39\u201345","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"1724_CR30","doi-asserted-by":"publisher","first-page":"1242","DOI":"10.1109\/TII.2014.2306776","volume":"10","author":"H Yan","year":"2014","unstructured":"Yan H, Zhang Y, Pang Z, Da Li X (2014) Super frame planning and access latency of slotted MAC for industrial WSN in IoT environment. IEEE Trans Industr Inform 10(2):1242\u20131251","journal-title":"IEEE Trans Industr Inform"}],"updated-by":[{"DOI":"10.1007\/s12652-026-05057-8","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T00:00:00Z","timestamp":1773014400000}}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-01724-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-020-01724-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-01724-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T10:52:29Z","timestamp":1773053549000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-020-01724-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,2]]},"references-count":30,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["1724"],"URL":"https:\/\/doi.org\/10.1007\/s12652-020-01724-6","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,2]]},"assertion":[{"value":"22 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2026","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article has been retracted. Please see the Retraction Notice for more detail:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s12652-026-05057-8","URL":"https:\/\/doi.org\/10.1007\/s12652-026-05057-8","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}