{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T05:14:45Z","timestamp":1740633285496,"version":"3.38.0"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T00:00:00Z","timestamp":1740528000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T00:00:00Z","timestamp":1740528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-03730-x","type":"journal-article","created":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T07:48:03Z","timestamp":1740556083000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Resourceful Energy Management and Improved Security in Wireless Sensor Networks by Optimized Energy-Based Security Prototype"],"prefix":"10.1007","volume":"6","author":[{"given":"Nancy","family":"Arya","sequence":"first","affiliation":[]},{"given":"Shailesh Shivaji","family":"Deore","sequence":"additional","affiliation":[]},{"given":"Mahendra","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Amit","family":"Verma","sequence":"additional","affiliation":[]},{"given":"R. S. M. Lakshmi","family":"Patibandla","sequence":"additional","affiliation":[]},{"given":"K. Murali","family":"Krishna","sequence":"additional","affiliation":[]},{"given":"Piyush Kumar","family":"Pareek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,26]]},"reference":[{"issue":"6","key":"3730_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-019-00434-1","volume":"18","author":"M Aamir","year":"2019","unstructured":"Aamir M, Zaidi SMA. DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation. Int J Inf Secur. 2019;18(6):1\u201325.","journal-title":"Int J Inf Secur"},{"issue":"2","key":"3730_CR2","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/s11119-014-9371-8","volume":"16","author":"MH Anisi","year":"2015","unstructured":"Anisi MH, Abdul-Salaam G, Abdullah AH. A survey of wireless sensor network approaches and their energy consumption for monitoring farm fields in precision agriculture. Precis Agric. 2015;16(2):216\u201338.","journal-title":"Precis Agric"},{"issue":"2","key":"3730_CR3","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/JSEN.2015.2483745","volume":"16","author":"SK Gharghan","year":"2016","unstructured":"Gharghan SK, Nordin R, Ismail M, AliJ A. Accurate wireless sensor localization technique based on hybrid PSO-ANN algorithm for indoor and outdoor track cycling. IEEE Sens J. 2016;16(2):529\u201341.","journal-title":"IEEE Sens J"},{"issue":"1","key":"3730_CR4","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s11277-014-2122-3","volume":"81","author":"H Asharioun","year":"2015","unstructured":"Asharioun H, Asadollahi H, Wan TC, Gharaei N. A survey on analytical modeling and mitigation techniques for the energy hole problem in corona-based wireless sensor network. Wirel Pers Commun. 2015;81(1):161\u201387.","journal-title":"Wirel Pers Commun"},{"issue":"3","key":"3730_CR5","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/1317425.1317434","volume":"11","author":"Y Wang","year":"2007","unstructured":"Wang Y, Martonosi M, Peh L-S. Predicting link quality using supervised learning in wireless sensor networks. ACM SIGMOBILE Mob Comput Commun Rev. 2007;11(3):71\u201383.","journal-title":"ACM SIGMOBILE Mob Comput Commun Rev"},{"key":"3730_CR6","doi-asserted-by":"crossref","unstructured":"Attiah, Afraa. An evolutionary game for efficient routing in wireless sensor networks. In: 2016 IEEE Global Communications Conference (GLOBECOM), 04\u201306 December 2016. Washington, DC: IEEE; 2016.","DOI":"10.1109\/GLOCOM.2016.7841592"},{"key":"3730_CR7","doi-asserted-by":"publisher","first-page":"15121","DOI":"10.1007\/s10586-018-2504-5","volume":"80","author":"S Balaji","year":"2019","unstructured":"Balaji S, Sasilatha T. Detection of denial of service attacks by domination graph application in wireless sensor networks. Clust Comput. 2019;80:15121\u20136.","journal-title":"Clust Comput"},{"key":"3730_CR8","first-page":"63","volume":"223","author":"M Gholipour","year":"2017","unstructured":"Gholipour M, Haghighat AT, Meybodi MR. Hop-by-Hop congestion avoidance in wireless sensor networks based on genetic support vector machine. Neuro Comput. 2017;223:63\u201376.","journal-title":"Neuro Comput"},{"key":"3730_CR9","doi-asserted-by":"crossref","unstructured":"Bashaa MH, Al-Alak S\u03b5, Idrees AK. Secret key generation in wireless sensor network using public key encryption. In: Proceedings of the International Conference on Information and Communication Technology, April 2019, New York, p. 106\u201312, 2019.","DOI":"10.1145\/3321289.3321320"},{"key":"3730_CR10","doi-asserted-by":"publisher","first-page":"32853","DOI":"10.1109\/ACCESS.2019.2903816","volume":"7","author":"H Chen","year":"2019","unstructured":"Chen H, Meng C, Shan Z, Fu Z, Bhargava BK. A novel low-rate denial of service attack detection approach in ZigBee Wireless Sensor Network by combining Hilbert-Huang transformation and trust evaluation. IEEE Access. 2019;7:32853\u201366. https:\/\/doi.org\/10.1109\/ACCESS.2019.2903816.","journal-title":"IEEE Access"},{"issue":"4","key":"3730_CR11","first-page":"3119","volume":"9","author":"V Roy","year":"2020","unstructured":"Roy V, et al. Network physical address based encryption technique using digital logic. Int J Sci Technol Res. 2020;9(4):3119\u201322.","journal-title":"Int J Sci Technol Res"},{"issue":"4","key":"3730_CR12","doi-asserted-by":"publisher","first-page":"1637","DOI":"10.1007\/s11277-019-06788-y","volume":"110","author":"T Kalidoss","year":"2020","unstructured":"Kalidoss T, Rajasekaran L, Kanagasabai K, Sannasi G, Kannan A. QoS aware trust-based routing algorithm for wireless sensor networks. Wirel Pers Commun. 2020;110(4):1637\u201358.","journal-title":"Wirel Pers Commun"},{"key":"3730_CR13","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.cie.2016.08.028","volume":"101","author":"R\u03b5 Curry","year":"2016","unstructured":"Curry R\u03b5, Smith JC, Curry R\u03b5, Hall F, Hall F. A survey of optimization algorithms for wireless sensor network lifetime maximization. Comput Ind Eng. 2016;101:145\u201366.","journal-title":"Comput Ind Eng"},{"issue":"4","key":"3730_CR14","doi-asserted-by":"publisher","first-page":"8764","DOI":"10.3390\/s150408764","volume":"15","author":"SA Haque","year":"2015","unstructured":"Haque SA, Rahman M, Aziz S\u03b5. Sensor anomaly detection in wireless sensor networks for healthcare. Sensors. 2015;15(4):8764\u201386.","journal-title":"Sensors"},{"key":"3730_CR15","doi-asserted-by":"publisher","first-page":"Article ID 5713","DOI":"10.1155\/2022\/5713092","volume":"2022","author":"P Kumar","year":"2022","unstructured":"Kumar P, Baliyan A, Prasad KR, Sreekanth N, Jawarkar P, Roy V, Amoatey ET. Machine learning enabled techniques for protecting wireless sensor networks by estimating attack prevalence and device deployment strategy for 5G networks. Wirel Commun Mob Comput. 2022;2022:Article ID 5713092. https:\/\/doi.org\/10.1155\/2022\/5713092.","journal-title":"Wirel Commun Mob Comput"},{"key":"3730_CR16","doi-asserted-by":"crossref","unstructured":"Debayan D, Golder A, Danial J, Ghosh S, Raychowdhury A, Sen S. X-DeepSCA: cross-device deep learning side channel attack. In: Proceedings of the 56th Annual Design Automation Conference, 02\u201306 June 2019, Las Vegas, NV, USA, p. 1\u20136, 2019.","DOI":"10.1145\/3316781.3317934"},{"key":"3730_CR17","doi-asserted-by":"publisher","first-page":"02016","DOI":"10.1051\/e3sconf\/202454702016","volume":"547","author":"VK Pandraka","year":"2024","unstructured":"Pandraka VK, Tinnavelli RR, Kumar RA, Bhupathi HP, Gundebommu SL. Effect of inverter voltage levels on torque ripples of PMSM drive. E3S Web Conf. 2024;547:02016.","journal-title":"E3S Web Conf"},{"issue":"2","key":"3730_CR18","doi-asserted-by":"publisher","first-page":"2150002:1","DOI":"10.1142\/S0218213021500020","volume":"30","author":"PK Shukla","year":"2021","unstructured":"Shukla PK, Shukla PK, Bhatele M, Chaturvedi A, Sharma P, Rizvi MA, Pathak Y. A novel machine learning model to predict the staying time of international migrants. Int J Artif Intell Tools. 2021;30(2):2150002:1-2150002:16. https:\/\/doi.org\/10.1142\/S0218213021500020.","journal-title":"Int J Artif. Intell. Tools"},{"key":"3730_CR19","doi-asserted-by":"publisher","first-page":"03001","DOI":"10.1051\/e3sconf\/202454703001","volume":"547","author":"BK Chakravarthy","year":"2024","unstructured":"Chakravarthy BK, Lakshmi GS, Bhupathi HP. Review on charging methods and charging solutions for electric vehicles. E3S Web Conf. 2024;547:03001.","journal-title":"E3S Web Conf"},{"key":"3730_CR20","doi-asserted-by":"publisher","first-page":"2282","DOI":"10.3390\/electronics11152282","volume":"11","author":"TM Behera","year":"2022","unstructured":"Behera TM, Samal UC, Mohapatra SK, Khan MS, Appasani B, Bizon N, Thounthong P. Energy-efficient routing protocols for wireless sensor networks: architectures, strategies, and performance. Electronics. 2022;11:2282.","journal-title":"Electronics"},{"key":"3730_CR21","doi-asserted-by":"publisher","first-page":"102057","DOI":"10.1016\/j.phycom.2023.102057","volume":"58","author":"AA Khan","year":"2023","unstructured":"Khan AA, Almuzaini KK, Macedo VDJ, Ojo S, Minchula VK, Roy V. MaReSPS for energy efficient spectral precoding technique in large scale MIMO-OFDM. Phys Commun. 2023;58:102057. https:\/\/doi.org\/10.1016\/j.phycom.2023.102057. (ISSN 1874-4907).","journal-title":"Phys Commun"},{"issue":"02","key":"3730_CR22","first-page":"223","volume":"13","author":"SK Chebrolu","year":"2024","unstructured":"Chebrolu SK, Manikandan R, Thomas AK, Anusha PV, Bhupathi HP. Optimizing sensor localization and cluster performance in wireless sensor networks through Internet of Thing (IoT) and boosted weight centroid algorithm. J Intell Syst Internet of Thing. 2024;13(02):223\u201330.","journal-title":"J Intell Syst Internet of Thing"},{"key":"3730_CR23","doi-asserted-by":"publisher","first-page":"5047","DOI":"10.1109\/ACCESS.2023.3236403","volume":"11","author":"MY Arafat","year":"2023","unstructured":"Arafat MY, Pan S, Bak E. Distributed energy-efficient clustering and routing for wearable IoT enabled wireless body area networks. IEEE Access. 2023;11:5047\u201361.","journal-title":"IEEE Access"},{"key":"3730_CR24","doi-asserted-by":"publisher","first-page":"19575","DOI":"10.1109\/JIOT.2022.3148106","volume":"9","author":"C Chen","year":"2022","unstructured":"Chen C, Wang LC, Yu CM. D2CRP: a novel distributed 2-hop cluster routing protocol for wireless sensor networks. IEEE Internet Things J. 2022;9:19575\u201388.","journal-title":"IEEE Internet Things J"},{"key":"3730_CR25","first-page":"19","volume":"4","author":"A Roshini","year":"2023","unstructured":"Roshini A, Kiran K. Hierarchical energy efficient secure routing protocol for optimal route selection in wireless body area networks. Int J Intell Netw. 2023;4:19\u201328.","journal-title":"Int J Intell Netw"},{"key":"3730_CR26","doi-asserted-by":"publisher","first-page":"Article ID 9894","DOI":"10.1155\/2021\/4989410","volume":"2021","author":"M Sathya","year":"2021","unstructured":"Sathya M, Jeyaselvi M, Krishnasamy L, Hazzazi MM, Shukla PK, Shukla PK, Nuagah SJ. A novel, efficient, and secure anomaly detection technique using DWU-ODBN for IoT-enabled multimedia communication systems. Wirel Commun Mob Comput. 2021;2021:Article ID 989410. https:\/\/doi.org\/10.1155\/2021\/4989410.","journal-title":"Wirel Commun Mob Comput"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03730-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-03730-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03730-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T07:48:08Z","timestamp":1740556088000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-03730-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,26]]},"references-count":26,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["3730"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-03730-x","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,26]]},"assertion":[{"value":"20 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"231"}}