{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T23:21:57Z","timestamp":1778109717186,"version":"3.51.4"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T00:00:00Z","timestamp":1715731200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T00:00:00Z","timestamp":1715731200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The convergence of the Internet of Things (IoT) and Artificial Intelligence (AI) is significantly transforming the landscape of future networking. The Internet of Things (IoT) is a technological paradigm that encompasses embedded systems, wireless sensors, and automation, facilitating the integration of various applications ranging from smart homes to wearable devices. In addition, the advent of artificial intelligence (AI) amplifies this influence by providing data-driven analytics, optimising processes, and presenting novel opportunities for growth. Nevertheless, the widespread adoption of devices within Internet of Things (IoT) networks gives rise to apprehensions regarding increased energy consumption. In order to ensure the longevity of network operations, it is imperative to employ energy-efficient protocols for sensor nodes that possess limited power resources. One example of a protocol that demonstrates this concept is the Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. This protocol effectively divides networks into clusters and dynamically adjusts the cluster heads to optimise the transmission of data to the base stations. Our study enhances the LEACH protocol by incorporating digital twin simulation, thereby enhancing the efficiency of IoT systems. Virtual network models and AI analytics are employed to assess energy consumption and performance. Cache nodes play a crucial role within this framework as they collect data from cluster heads in order to transmit it to the base station. By leveraging artificial intelligence (AI) and simulation techniques, we are able to improve the energy efficiency and reliability of the Internet of Things (IoT) systems. The findings indicate a significant reduction of 83% in non-functioning nodes and a notable increase of 1.66 times in energy levels of nodes compared to conventional approaches. This study highlights a potential direction for energy-efficient, AI-enhanced Internet of Things (IoT) networking through the utilisation of the Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol.<\/jats:p>","DOI":"10.1007\/s42979-024-02778-5","type":"journal-article","created":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T13:02:47Z","timestamp":1715778167000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Artificial Intelligence in Next-Generation Networking: Energy Efficiency Optimization in IoT Networks Using Hybrid LEACH Protocol"],"prefix":"10.1007","volume":"5","author":[{"given":"Surbhi Bhatia","family":"Khan","sequence":"first","affiliation":[]},{"given":"Ankit","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Arwa","family":"Mashat","sequence":"additional","affiliation":[]},{"given":"Dayananda","family":"Pruthviraja","sequence":"additional","affiliation":[]},{"given":"Mohammad Khalid","family":"Imam Rahmani","sequence":"additional","affiliation":[]},{"given":"Jimson","family":"Mathew","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,15]]},"reference":[{"key":"2778_CR1","unstructured":"O. Vermesan SINTEF, Norway, Dr. Peter Friess EU, Belgium, \u201cInternet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems\u201d, river publishers\u2019 series in communications, vol. 9, issue 4, pp. 25\u201330, 2013."},{"key":"2778_CR2","unstructured":"O. Vermesan SINTEF, Norway, Dr. Peter Friess EU, Belgium, \u201cInternet of Things\u2013From Research and Innovation to Market Deployment\u201d, river publishers\u2019 series in communications, vol. 15, issue 8, pp. 125\u2013130, 2014."},{"key":"2778_CR3","unstructured":"O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, \u201cInternet of Things Strategic Research Agenda\u201d, Chapter 2 in Internet of Things -Global Technological and Societal Trends, River Publishers, vol. 4, issue 1, pp. 54\u201366, 2011."},{"key":"2778_CR4","unstructured":"M. Serrano, Insight Centre for Data Analytics, Ireland, Omar Elloumi, Alcatel Lucent, France, Paul Murdock, Landis+Gyr, Switzerland, \u201cAlliance for Internet of Things Innovation, Semantic Interoperability\u201d, Release 2.0, AIOTI WG03 \u2013 IoT Standardisation, vol. 5, issue 5, pp. 15\u201330, 2015."},{"issue":"2","key":"2778_CR5","first-page":"18","volume":"9","author":"M Serrano","year":"2015","unstructured":"Serrano M, Barnaghi P, Cousin FCP. OvidiuVermesan, Peter Friess, \u201cInternet of Things Semantic Interoperability: Research Challenges, Best Practices, Recommendations and Next Steps.\u201d European research cluster on the internet of things, IERC. 2015;9(2):18\u201335.","journal-title":"European research cluster on the internet of things, IERC"},{"issue":"6","key":"2778_CR6","first-page":"16","volume":"11","author":"K Rose","year":"2015","unstructured":"Rose K, Eldridge S, Chapin L. The Internet of Things: An Overview Understanding the Issues and Challenges of a More Connected World. The Internet Society (ISOC). 2015;11(6):16\u201330.","journal-title":"The Internet Society (ISOC)"},{"key":"2778_CR7","unstructured":"B. Shanmuga Sundaram, \u201cA quantitative analysis of 802.11ah wireless standard,\u201d International Journal of Latest Research in Engineering and Technology, vol. 2, issue 7, pp. 25\u201330, 2016."},{"issue":"1","key":"2778_CR8","doi-asserted-by":"publisher","first-page":"83","DOI":"10.13052\/jicts2245-800X.115","volume":"1","author":"W Sun","year":"2013","unstructured":"Sun W, Choi M, Choi S. Ieee 802.11 ah: a long range 802.11 wlan at sub 1 ghz. J ICT Standard. 2013;1(1):83\u2013108.","journal-title":"J. ICT Standard"},{"issue":"7","key":"2778_CR9","doi-asserted-by":"publisher","first-page":"1655","DOI":"10.1016\/j.comcom.2006.12.020","volume":"30","author":"P Baronti","year":"2007","unstructured":"Baronti P, Pillai P, Chook VWC, Chessa S, Gotta A, Hu YF. Wireless sensor networks: a survey on the state of the art and the 802.15.4 and ZigBee standards. Comput Commun. 2007;30(7):1655\u201395.","journal-title":"Comput Commun"},{"key":"2778_CR10","doi-asserted-by":"crossref","unstructured":"H. Liu, M. Bolic, A. Nayak, and I. Stojmenovi\u00b4c, \u201cTaxonomy and challenges of the integration of RFID and wireless sensor networks,\u201d IEEE Network, vol. 22, no. 6, pp. 26\u201332, 2008.","DOI":"10.1109\/MNET.2008.4694171"},{"key":"2778_CR11","doi-asserted-by":"crossref","unstructured":"A. Mitrokotsa and C. Douligeris, \u201cIntegrated RFID and sensor networks: architectures and applications,\u201d in RFID and Sensor Networks: Architectures, Protocols, Security and Integrations, pp. 511\u2013535, Auerbach Publications, vol. 19, issue 4, pp. 18\u201356, 2009.","DOI":"10.1201\/9781420077780.pt3"},{"key":"2778_CR12","doi-asserted-by":"crossref","unstructured":"M. A. Chaqfeh and N. Mohamed, \u201cChallenges in middleware solutions for the internet of things\u201d, in Proceedings of the 13th International Conference on Collaboration Technologies and Systems (CTS \u201912), pp. 21\u201326, Denver, Colo, USA, May 2012.","DOI":"10.1109\/CTS.2012.6261022"},{"issue":"4","key":"2778_CR13","first-page":"25","volume":"9","author":"K Krishna","year":"2012","unstructured":"Krishna K, Ayan B, Mukherjee T, Gupta S. Ensuring safety, security, and sustainability of mission-critical cyber-physical systems. Proc IEEE. 2012;9(4):25\u201334.","journal-title":"Proc IEEE"},{"issue":"4","key":"2778_CR14","first-page":"17","volume":"6","author":"D Kushner","year":"2013","unstructured":"Kushner D. The Real Story of Stuxnet, How Kaspersky Lab tracked down the malware that stymied Iran\u2019s nuclear-fuel enrichment program. IEEE Spectr. 2013;6(4):17\u201330.","journal-title":"IEEE Spectr"},{"issue":"4","key":"2778_CR15","first-page":"17","volume":"11","author":"S Checkoway","year":"2011","unstructured":"Checkoway S, McCoy D, Kantor B, Anderson D, Shacham H, Savage S, Koscher K, Czeskis A, Roesner F, Kohno T. Comprehensive experimental analyses of automotive attack surfaces. USENIX Conference on Security. 2011;11(4):17\u201330.","journal-title":"USENIX Conference on Security"},{"issue":"4","key":"2778_CR16","first-page":"23","volume":"9","author":"M Annaswamy","year":"2016","unstructured":"Annaswamy M, Malekpour R, Baros S. Emerging research topics in control for smart infrastructures. Annu Rev Control. 2016;9(4):23\u201330.","journal-title":"Annu Rev Control"},{"issue":"2","key":"2778_CR17","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1108\/SASBE-01-2014-0003","volume":"3","author":"A Buckman","year":"2014","unstructured":"Buckman A, Myfield S, Beck M. What is a Smart Building? Smart and Sustainable Built Environment. 2014;3(2):92\u2013109.","journal-title":"Smart and Sustainable Built Environment"},{"key":"2778_CR18","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.apenergy.2012.05.020","volume":"99","author":"Z Wang","year":"2012","unstructured":"Wang Z, Wang L, Dounis A, Yang R. Multi-agent control system with information fusion-based comfort model for smart buildings. Appl Energy. 2012;99:247\u201354.","journal-title":"Appl Energy"},{"key":"2778_CR19","doi-asserted-by":"crossref","unstructured":"M. Sadiku, S. Musa, O. Momoh, \u201cCloud Computing: Opportunities and Challenges\u201d, Potentials, IEEE, Volume: 33, Issue: 1, 2014.","DOI":"10.1109\/MPOT.2013.2279684"},{"issue":"7","key":"2778_CR20","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","volume":"10","author":"D Miorandi","year":"2012","unstructured":"Miorandi D, Sicari S, De Pellegrini F, Chlamtac I. Internet of Things: Vision, applications and research challenges. Ad Hoc Netw. 2012;10(7):1497\u2013516.","journal-title":"Ad Hoc Netw"},{"key":"2778_CR21","unstructured":"Keyur K Patel, Sunil M Patel2, \u201cInternet of Things-IOT: Definition, Characteristics, Architecture, Enabling Technologies, Application & Future Challenges\u201d, IJESC, vol. 6, issue 4, pp. 25\u201355, 2016."},{"issue":"2","key":"2778_CR22","first-page":"14","volume":"5","author":"M Ruggier","year":"2013","unstructured":"Ruggier M. Homayounnikookar, \u201cInternet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems.\u201d IEEE. 2013;5(2):14\u201330.","journal-title":"IEEE"},{"issue":"4","key":"2778_CR23","first-page":"18","volume":"7","author":"ZKA Mohammeda","year":"2017","unstructured":"Mohammeda ZKA, Ahmed ESA. Internet of Things Applications, Challenges and Related Future Technologies. World Scientific News. 2017;7(4):18\u201344.","journal-title":"World Scientific News"},{"issue":"5","key":"2778_CR24","first-page":"23","volume":"9","author":"A Daiwat","year":"2015","unstructured":"Daiwat A. Vyas, Dvijesh Bhatt2, DhavalJha, \u201cIoT: Trends, Challenges and Future Scope.\u201d IJCSC. 2015;9(5):23\u201330.","journal-title":"IJCSC"},{"key":"2778_CR25","unstructured":"Fadele Ayotunde Alaba, Mazliza Othman, Ibrahim, Abaker Targio Hashem, FaizAlotaibi, \u201cInternet of things Security: A Survey\u201d, vol. 35, pp. 25\u201330, 2017."},{"key":"2778_CR26","first-page":"1","volume":"8","author":"J Ahamed","year":"2016","unstructured":"Ahamed J, Rajan AV. Internet of Things (IoT): Application Systems and Security Vulnerabilities. Computer and Information Sciences Department. 2016;8:1\u20135.","journal-title":"Computer and Information Sciences Department"},{"key":"2778_CR27","first-page":"133","volume":"56","author":"S Sicari","year":"2015","unstructured":"Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A. Security, privacy and trust in Internet of Things: The road ahead. Comput Netw. 2015;56:133\u201351.","journal-title":"Comput Netw"},{"key":"2778_CR28","unstructured":"Arbia RiahiSfar, Enrico Natalizio, Yacine Challal, Zied Chtourou, \u201cA Roadmap for Security Challenges in Internet of Things\u201d, vol. 12, pp. 15\u201321, 2017."},{"key":"2778_CR29","first-page":"5","volume":"7","author":"Kim Thuat Nguyen","year":"2015","unstructured":"Kim Thuat Nguyen. Maryline Laurent, NouhaOualha, \u201cSurvey on secure communication protocols for the Internet of Things.\u201d Ad Hoc Network. 2015;7:5\u201315.","journal-title":"Ad Hoc Network"},{"issue":"10","key":"2778_CR30","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MC.2016.302","volume":"49","author":"D Linthicum","year":"2016","unstructured":"Linthicum D. Responsive Data Architecture for the Internet of Things. IEEE Comput. 2016;49(10):72\u20135.","journal-title":"IEEE Comput"},{"issue":"3","key":"2778_CR31","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/TCE.2016.7613201","volume":"62","author":"Dongsik Jo and Gerard Jounghyun Kim","year":"2016","unstructured":"Dongsik Jo and Gerard Jounghyun Kim. ARIoT: Scalable Augmented Reality Framework for Interacting with Internet of Things Appliances Everywhere. IEEE Trans Consum Electron. 2016;62(3):334\u201340.","journal-title":"IEEE Trans Consum Electron"},{"key":"2778_CR32","doi-asserted-by":"crossref","unstructured":"Xinlie Wang, Jianqing Zhang, Eve. M. Schooler, \u201cPerformance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT\u201d, Communications (ICC), 2014 IEEE International Conference, vol. 19, issue 3, pp. 56\u201388, 2014.","DOI":"10.1109\/ICC.2014.6883405"},{"issue":"4","key":"2778_CR33","first-page":"23","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi J, Buyya R, Marusic S, Palaniswami M. Internet of things (IoT): A vision, architectural elements, and future directions. Elsevier Future Generation Computer System. 2013;29(4):23\u201366.","journal-title":"Elsevier Future Generation Computer System"},{"key":"2778_CR34","doi-asserted-by":"crossref","unstructured":"Mohamed Abomhara and Geir M. Koien, \u201cSecurity and Privacy in the Internet of Things Current Status and Open Issues\u201d, In Privacy and Security in Mobile Systems (PRISMS), pages 1\u20138. IEEE, vol. 7, issue 6, pp. 18\u20133, 2014.","DOI":"10.1109\/PRISMS.2014.6970594"},{"key":"2778_CR35","doi-asserted-by":"crossref","unstructured":"Ahmad W Atamli and Andrew Martin, \u201cThreat-Based Security Analysis for the Internet of Things\u201d, In Secure Internet of Things (SIoT), vol. 4, issue 1, pages 35\u201343, 2014.","DOI":"10.1109\/SIoT.2014.10"},{"issue":"6","key":"2778_CR36","first-page":"18","volume":"8","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G. The Internet of Things: A survey. Comput Netw. 2010;8(6):18\u201330.","journal-title":"Comput Netw"},{"key":"2778_CR37","doi-asserted-by":"crossref","unstructured":"Sachin Babar, Parikshit Mahalle, Antonietta Stango, Neeli Prasad, and Ramjee Prasad, \u201cProposed security model and threat taxonomy for the Internet of Things (IoT)\u201d, In International Conference on Network Security & Applications (CNSA), volume 89, pages 420\u2013429. Springer Berlin Heidelberg, vol. 4, issue 1, pp. 25\u201330, 2010.","DOI":"10.1007\/978-3-642-14478-3_42"},{"key":"2778_CR38","doi-asserted-by":"crossref","unstructured":"Riccardo Bonetto, Nicola Bui, Vishwas Lakkundi, Alexis Olivereau, Alexandru Serbanati, and Michele Rossi, \u201cSecure communication for smart IoT objects: Protocol stacks, use cases and practical examples\u201d, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012 - Digital Proceedings, vol. 11, issue 6, pp. 13\u201330, 2012.","DOI":"10.1109\/WoWMoM.2012.6263790"},{"key":"2778_CR39","doi-asserted-by":"crossref","unstructured":"Jan Camenisch and Els Van Herreweghen, \u201cDesign and implementation of the idemix anonymous credential system\u201d, In Vijayalakshmi Atluri, editor, Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18\u201322, 2002, pages 21\u201330, ACM, 2002.","DOI":"10.1145\/586111.586114"},{"key":"2778_CR40","doi-asserted-by":"crossref","unstructured":"Yogeesh Seralathan, Tae (Tom) Oh , Suyash Jadhav, Jonathan Myers, Jaehoon (Paul) Jeong+, Young Ho Kim, and JeongNeyo Kim, \u201cIoT Security Vulnerability: A Case Study of a Web Camera\u201d, International Conference on Advanced Communications Technology(ICACT), IEEE, vol. 13, issue 9, pp. 16\u201330, 2018.","DOI":"10.23919\/ICACT.2018.8323685"},{"issue":"4","key":"2778_CR41","first-page":"14","volume":"7","author":"C Vorakulpipat","year":"2018","unstructured":"Vorakulpipat C, Rattanalerdnusorn E, Thaenkaew P. Hoang Dang Hai, \u201cRecent Challenges, Trends, and Concerns Related to IoT Security: An Evolutionary Study.\u201d International Conference on Advanced Communications Technology (ICACT). 2018;7(4):14\u201333.","journal-title":"International Conference on Advanced Communications Technology (ICACT)"},{"key":"2778_CR42","doi-asserted-by":"crossref","unstructured":"Jesus Pacheco, Daniela Ibarra, Ashamsa Vijay, Salim Hariri, \u201cIoT Security Framework for Smart Water System\u201d, 2017 IEEE\/ACS 14th International Conference on Computer Systems and Applications, IEEE, vol. 9, issue 3, pp. 11\u201330, 2017.","DOI":"10.1109\/AICCSA.2017.85"},{"issue":"4","key":"2778_CR43","first-page":"67","volume":"12","author":"Oh Se-Ra","year":"2017","unstructured":"Se-Ra Oh, Kim Y-G. Development of IoT Security Component for Interoperability. IEEE. 2017;12(4):67\u201389.","journal-title":"IEEE"},{"key":"2778_CR44","doi-asserted-by":"crossref","unstructured":"U. M. Mbanaso, G. A. Chukwudebe, \u201cRequirement Analysis of IoT Security in Distributed Systems\u201d, 2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON), IEEE, vol. 5, issue 7, pp. 20\u201330, 2017.","DOI":"10.1109\/NIGERCON.2017.8281945"},{"issue":"3","key":"2778_CR45","first-page":"25","volume":"9","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Li Xu, Dong Q, Wang J, Blauw D, Sylvester D. Recryptor: A Reconfigurable Cryptographic Cortex-M0 Processor with In-Memory and Near-Memory Computing for IoT Security. IEEE J Solid-State Circuits. 2018;9(3):25\u201356.","journal-title":"IEEE J Solid-State Circuits"},{"key":"2778_CR46","unstructured":"Ibrahim R. Waz, Mohamed Ali Sobh, Ayman M. Bahaa-Eldin, \u201cInternet of Things (IoT) Security Platforms\u201d, IEEE, vol. 6, issue 4, pp. 5\u201319, 2017."},{"key":"2778_CR47","doi-asserted-by":"crossref","unstructured":"Israr Ahmed1, Saleel A. P2, Babak Beheshti3, Zahoor Ali Khan4, Imtiaz Ahmad, \u201cSecurity in the Internet of Things (IoT)\u201d, The Fourth HCT Information Technology Trends (ITT 2017), Dubai, UAE, vol. 9, issue 5, pp. 9\u201330, 2017.","DOI":"10.1109\/CTIT.2017.8259572"},{"issue":"4","key":"2778_CR48","first-page":"22","volume":"7","author":"Z Ling","year":"2017","unstructured":"Ling Z, Liu K, Yiling Xu. YierJin, Xinwen Fu, \u201cAn End-to-End View of IoT Security and Privacy.\u201d IEEE. 2017;7(4):22\u201330.","journal-title":"IEEE"},{"key":"2778_CR49","doi-asserted-by":"crossref","unstructured":"Swapnil Naik, VikasMaral, \u201cCyber Security \u2013 IoT\u201d, 2017 2nd IEEE International Conference on Recent Trends in Electronics Information & Communication Technology (RTEICT), May 19\u201320, vol. 12, issue 4, pp. 66\u201378, 2017.","DOI":"10.1109\/RTEICT.2017.8256700"},{"key":"2778_CR50","doi-asserted-by":"crossref","unstructured":"Aanchal Punia, Dr. Daya Gupta, Shruti Jaiswal, \u201cA Perspective on Available Security Techniques in IoT\u201d, 2017 2nd IEEE International Conference On Recent Trends in Electronics Information & Communication Technology (RTEICT), May 19\u201320, vol. 9, issue 6, pp. 25\u201330, 2017.","DOI":"10.1109\/RTEICT.2017.8256859"},{"issue":"4","key":"2778_CR51","first-page":"22","volume":"9","author":"M Daud","year":"2017","unstructured":"Daud M, Khan Q, Saleem Y. A Study of Key Technologies for IoT and associated Security Challenges. IEEE. 2017;9(4):22\u201346.","journal-title":"IEEE"},{"issue":"1","key":"2778_CR52","first-page":"25","volume":"9","author":"C Dou","year":"2017","unstructured":"Dou C, Chen W-H, Chen Y-J, Lin H-T, Lin W-Y, Ho M-S, Chang M-F. Challenges of Emerging Memory and Memristor Based Circuits: Nonvolatile Logics, IoT Security, Deep Learning and Neuromorphic Computing. IEEE. 2017;9(1):25\u201344.","journal-title":"IEEE"},{"issue":"6","key":"2778_CR53","first-page":"15","volume":"11","author":"Mohamed Tahar Hammi","year":"2017","unstructured":"Mohamed Tahar Hammi. Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni, Pascale Minet, \u201cA Lightweight IoT Security Protocol.\u201d IEEE. 2017;11(6):15\u201330.","journal-title":"IEEE"},{"key":"2778_CR54","doi-asserted-by":"crossref","unstructured":"Parul Datta, Bhisham Sharma, \u201cA Survey on IoT Architectures, Protocols, Security and Smart City based Applications\u201d, 8th ICCCNT, vol. 9, issue 4, pp. 25\u20135, 2017.","DOI":"10.1109\/ICCCNT.2017.8203943"},{"key":"2778_CR55","doi-asserted-by":"crossref","unstructured":"Chinmaya Mahapatra, Zhengguo Sheng and Victor C.M. Leung, \u201cEnergy-efficient and Distributed Data-aware Clustering Protocol for the Internet-of-Things,\u201d IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), volume 4, issue 33, pp- 643\u2013651, 2016.","DOI":"10.1109\/CCECE.2016.7726709"},{"key":"2778_CR56","doi-asserted-by":"crossref","unstructured":"Mario FRUSTACI, Pasquale PACE, Gianluca ALOI, Giancarlo FORTINO, \u201cEvaluating critical security issues of the IoT world: Present and Future challenges\u201d, IEEE, vol. 8, issue 4, pp. 25\u201345, 2017.","DOI":"10.1109\/JIOT.2017.2767291"},{"issue":"4","key":"2778_CR57","first-page":"25","volume":"6","author":"K Kaneko","year":"2017","unstructured":"Kaneko K, Ban Y, Okamura K. \u201cEffectiveness of Experiential Learning for Keeping Knowledge Retention in IoT Security Education\u201d, 2017 6th IIAI International Congress on Advanced Applied Informatics. IEEE. 2017;6(4):25\u201334.","journal-title":"IEEE"},{"key":"2778_CR58","doi-asserted-by":"crossref","unstructured":"Chen Chen, Honghui Zhao, Tie Qiu, Mingcheng Hu, Hui Han, Zhiyuan Ren, \u201cAn efficient power saving polling scheme in the internet of energy\u201d, Journal of Network and Computer Applications, 48\u201361, 2017.","DOI":"10.1016\/j.jnca.2017.01.002"},{"key":"2778_CR59","unstructured":"Mian Muhammad Ahemd, Munam Ali Shah, Abdul Wahid, \u201cIoT Security: A Layered Approach for Attacks & Defenses\u201d, 2017 International Conference on Communication Technologies, IEEE, vol. 19, issue 7, pp. 14\u201330, 2017."},{"issue":"2","key":"2778_CR60","first-page":"15","volume":"5","author":"J Deogirikar","year":"2017","unstructured":"Deogirikar J, Vidhate A. \u201cSecurity Attacks in IoT: A Survey\u201d, International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud). IEEE. 2017;5(2):15\u201330.","journal-title":"IEEE"},{"issue":"3","key":"2778_CR61","first-page":"552","volume":"9","author":"X Liu","year":"2016","unstructured":"Liu X, Huang L, Ravichandran K, S\u00e1nchez-Sinencio E. A Highly Efficient Reconfigurable Charge Pump Energy Harvester with Wide Harvesting Range and Two-Dimensional MPPT for Internet of Things. IEEE J Solid-State Circuits. 2016;9(3):552\u201362.","journal-title":"IEEE J Solid-State Circuits"},{"key":"2778_CR62","doi-asserted-by":"crossref","unstructured":"Mukrimah Nawir, Amiza Amir, Naimah Yaakob, Ong Bi Lynn, \u201cInternet of Things (IoT): Taxonomy of Security Attacks\u201d, 2016 3rd International Conference on Electronic Design (ICED), August 11\u201312, vol. 9, issue 5, pp. 25\u201330, 2016.","DOI":"10.1109\/ICED.2016.7804660"},{"key":"2778_CR63","doi-asserted-by":"crossref","unstructured":"T. Inzerilli, A. M. Vegni, A. Neri, and R. Cusani, \u201cA Location-based Vertical Handover algorithm for limitation of the ping-pong effect\u201d, in Proc. of IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, vol. 14, no. 7, pp. 108\u2013117, 2008.","DOI":"10.1109\/WiMob.2008.64"},{"issue":"24","key":"2778_CR64","first-page":"131","volume":"11","author":"T Yu","year":"2017","unstructured":"Yu T, Wang X, Shami A. Recursive Principal Component Analysis based Data Outlier Detection and Sensor Data Aggregation in IoT Systems. IEEE. 2017;11(24):131\u20138.","journal-title":"IEEE"},{"issue":"4","key":"2778_CR65","first-page":"995","volume":"15","author":"R Lu","year":"2017","unstructured":"Lu R, Heung K, Lashkari AH, Ghorbani AA. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT. IEEE. 2017;15(4):995\u20131006.","journal-title":"IEEE"},{"key":"2778_CR66","doi-asserted-by":"crossref","unstructured":"L. Dong, G. Wang, \u201cInads: In-Network Aggregation and Distribution of Lot Data Subscription in Icn\u201d, in Proc. of the IEEE International Conference on Multimedia and Expo Workshops (ICMEW), vol. 16, no. 55, pp. 436\u2013445, 2017.","DOI":"10.1109\/ICMEW.2017.8026321"},{"issue":"16","key":"2778_CR67","first-page":"294","volume":"27","author":"S Bhandari","year":"2017","unstructured":"Bhandari S, Sharma SK, Wang X. Latency Minimization in Wireless IoT Using Prioritized Channel Access and Data Aggregation. IEEE. 2017;27(16):294\u2013308.","journal-title":"IEEE"},{"issue":"1","key":"2778_CR68","first-page":"618","volume":"5","author":"US Thakare","year":"2017","unstructured":"Thakare US, Borkar SM. Implementation of WSN\u2019s Device Addressing, Data Aggregation and Secure Control in IoT Environment. IJEDR. 2017;5(1):618\u201325.","journal-title":"IJEDR"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-02778-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-02778-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-02778-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T13:11:04Z","timestamp":1715778664000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-02778-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,15]]},"references-count":68,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["2778"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-02778-5","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,15]]},"assertion":[{"value":"30 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors declare their consent to participate in this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"The authors declare their consent to publish this article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}}],"article-number":"546"}}