{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T19:32:10Z","timestamp":1776454330270,"version":"3.51.2"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,1,30]],"date-time":"2022-01-30T00:00:00Z","timestamp":1643500800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,30]],"date-time":"2022-01-30T00:00:00Z","timestamp":1643500800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s13198-021-01585-y","type":"journal-article","created":{"date-parts":[[2022,1,30]],"date-time":"2022-01-30T15:02:17Z","timestamp":1643554937000},"page":"28-34","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Utilization of IoT-assisted computational strategies in wireless sensor networks\u00a0for smart infrastructure\u00a0management"],"prefix":"10.1007","volume":"15","author":[{"given":"K. M","family":"Karthick Raghunath","sequence":"first","affiliation":[]},{"given":"Manjula Sanjay","family":"Koti","sequence":"additional","affiliation":[]},{"given":"R.","family":"Sivakami","sequence":"additional","affiliation":[]},{"given":"V.","family":"Vinoth Kumar","sequence":"additional","affiliation":[]},{"given":"Grande","family":"NagaJyothi","sequence":"additional","affiliation":[]},{"given":"V.","family":"Muthukumaran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,30]]},"reference":[{"key":"1585_CR1","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1016\/j.scs.2018.01.053","volume":"38","author":"BN Silva","year":"2018","unstructured":"Silva BN, Khan M, Han K (2018) Towards sustainable smart cities: a review of trends, architectures, components, and open challenges in smart cities. Sustain Cities Soc 38:697\u2013713","journal-title":"Sustain Cities Soc"},{"issue":"1","key":"1585_CR2","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1002\/ett.2704","volume":"25","author":"C Perera","year":"2014","unstructured":"Perera C, Zaslavsky A, Christen P, D. (2014) Georgakopoulos, sensing as a service model for smart cities supported by internet of things. Trans Emerg Telecommun Technol 25(1):81\u201393","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"1","key":"1585_CR3","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/JIOT.2017.2647881","volume":"4","author":"D Minoli","year":"2017","unstructured":"Minoli D, Sohraby K, Occhiogrosso B (2017) IoT considerations, requirements, and architectures for smart buildings\u2014Energy optimization and next-generation building management systems. IEEE Internet Things J 4(1):269\u2013283","journal-title":"IEEE Internet Things J"},{"issue":"13","key":"1585_CR4","doi-asserted-by":"publisher","first-page":"5397","DOI":"10.1109\/JSEN.2016.2557345","volume":"16","author":"G Shahzad","year":"2016","unstructured":"Shahzad G, Yang H, Ahmad AW, Lee C (2016) Energy-efficient intelligent street lighting system using traffic-adaptive control. IEEE Sens J 16(13):5397\u20135405","journal-title":"IEEE Sens J"},{"key":"1585_CR5","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener Comput Syst 29:1645\u20131660","journal-title":"Future Gener Comput Syst"},{"issue":"23","key":"1585_CR6","doi-asserted-by":"publisher","first-page":"7649","DOI":"10.1109\/JSEN.2017.2725638","volume":"17","author":"H Habibzadeh","year":"2017","unstructured":"Habibzadeh H, Qin Z, Soyata T, Kantarci B (2017) Large-scale distributed dedicated and non-dedicated smart city sensing systems. IEEE Sens J 17(23):7649\u20137658","journal-title":"IEEE Sens J"},{"issue":"12","key":"1585_CR7","doi-asserted-by":"publisher","first-page":"22372","DOI":"10.3390\/s141222372","volume":"14","author":"Z Ji","year":"2014","unstructured":"Ji Z, Ganchev I, O\u2019Droma M et al (2014) A cloud-based car parking middleware for IoT-based smart cities: design and implementation. Sensors 14(12):22372\u201322393","journal-title":"Sensors"},{"key":"1585_CR8","doi-asserted-by":"crossref","unstructured":"Nair K, Kulkarni J, Warde M, Dave Z, Rawalgaonkar V, Gore G, Joshi J, (2015) Optimizing power consumption in iot based wireless sensor networks using bluetooth low energy, in: 2015 International conference on green computing and internet of things, ICGCIoT, IEEE, pp 589\u2013593","DOI":"10.1109\/ICGCIoT.2015.7380533"},{"key":"1585_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-019-06525-5","volume":"108","author":"P Mohamed Shakeel","year":"2019","unstructured":"Mohamed Shakeel P, Baskar S, Selvakumar S (2019) Retrieving multiple patient information by using the virtual MIMO and path beacon in wireless body area network. Wirel Pers Commun 108:1\u201312","journal-title":"Wirel Pers Commun"},{"issue":"6","key":"1585_CR10","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2013.6525602","volume":"51","author":"P Vlacheas","year":"2013","unstructured":"Vlacheas P, Giaffreda R, Stavroulaki V, Kelaidonis D, Foteinos V, Poulios G, Moessner K et al (2013) Enabling smart cities through a cognitive management framework for the internet of things. IEEE Commun Mag 51(6):102\u2013111","journal-title":"IEEE Commun Mag"},{"issue":"8","key":"1585_CR11","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1166\/sl.2018.3993","volume":"16","author":"KM Karthick Raghunath","year":"2018","unstructured":"Karthick Raghunath KM, Rengarajan N (2018) Evolving optimal response time and synchronized communication on integrating fuzzy logic using infrared sensor and sound detecting sensor in WSN. Sensor Lett 16(8):606\u2013613. https:\/\/doi.org\/10.1166\/sl.2018.3993","journal-title":"Sensor Lett"},{"issue":"S4","key":"1585_CR12","doi-asserted-by":"publisher","first-page":"9737","DOI":"10.1007\/s10586-017-1473-4","volume":"22","author":"KM Karthick Raghunath","year":"2017","unstructured":"Karthick Raghunath KM, Rengarajan N (2017) Response time optimization with enhanced fault-tolerant wireless sensor network design for on-board rapid transit applications. Cluster Comp 22(S4):9737\u20139753. https:\/\/doi.org\/10.1007\/s10586-017-1473-4","journal-title":"Cluster Comp"},{"issue":"4","key":"1585_CR13","doi-asserted-by":"publisher","first-page":"2359","DOI":"10.1007\/s11277-019-06525-5","volume":"108","author":"P Mohamed Shakeel","year":"2019","unstructured":"Mohamed Shakeel P, Baskar S, Selvakumar S (2019) Retrieving multiple patient information by using the virtual mimo and path beacon in wireless body area network. Wirel Personal Commun 108(4):2359\u20132370. https:\/\/doi.org\/10.1007\/s11277-019-06525-5","journal-title":"Wirel Personal Commun"},{"issue":"1","key":"1585_CR14","doi-asserted-by":"publisher","first-page":"60","DOI":"10.4018\/IJeC.2021010104","volume":"17","author":"KV Vinoth","year":"2021","unstructured":"Vinoth KV, Ramamoorthy S, Dhilip KV, Prabu M, Balajee JM (2021) Design and evaluation of wi-fi offloading mechanism in heterogeneous networks: Int J e-Collaboration 17(1):60\u201370.https:\/\/doi.org\/10.4018\/IJeC.2021010104","journal-title":"Int J e-Collaboration"},{"issue":"4","key":"1585_CR15","doi-asserted-by":"publisher","first-page":"47","DOI":"10.4018\/ijitpm.2021100105","volume":"12","author":"V Muthukumaran","year":"2021","unstructured":"Muthukumaran V, Kumar VV, Joseph RB, Munirathanam M, Jeyakumar B (2021) Improving network security based on trust-aware routing protocols using long short-term memory-queuing segment-routing algorithms. Int J Inform Technol Project Manag 12(4):47\u201360. https:\/\/doi.org\/10.4018\/ijitpm.2021100105","journal-title":"Int J Inform Technol Project Manag"},{"issue":"6","key":"1585_CR16","doi-asserted-by":"publisher","first-page":"2059","DOI":"10.1166\/jctn.2018.7407","volume":"15","author":"K Maithili","year":"2018","unstructured":"Maithili K, Vinothkumar V, Latha P (2018) Analyzing the security mechanisms to prevent unauthorized access in cloud and network security. J Comput Theor Nanosci 15(6):2059\u20132063. https:\/\/doi.org\/10.1166\/jctn.2018.7407","journal-title":"J Comput Theor Nanosci"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-021-01585-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-021-01585-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-021-01585-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T17:05:43Z","timestamp":1706720743000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-021-01585-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,30]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["1585"],"URL":"https:\/\/doi.org\/10.1007\/s13198-021-01585-y","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,30]]},"assertion":[{"value":"6 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflict of interest between authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"There is no animals and humans involved in this research.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human participants and\/or animals"}},{"value":"No consent.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}