{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:42:24Z","timestamp":1776444144985,"version":"3.51.2"},"reference-count":169,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T00:00:00Z","timestamp":1746748800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T00:00:00Z","timestamp":1746748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"BITS-Pilani, Pilani Campus, India"},{"DOI":"10.13039\/501100006464","name":"Birla Institute of Technology and Science, Pilani","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100006464","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>In Wireless Sensor Network (i.e. WSN) based resource constrained Internet of Things (i.e. IoT) environments, efficient data forwarding is achieved through cluster based mechanisms, where cluster heads facilitate communication among themselves and with the sink node. Data collected by each cluster head is temporarily buffered before being transmitted to the sink via multi-hop communication. The integration of advanced wireless technologies, such as 5th Generation (i.e. 5G) networks, offers significant benefits, including reduced latency, extensive coverage, improved spectral efficiency, and higher data transmission rates. Incorporating Device-to-Device (i.e. D2D) communication further enhances energy efficiency and offloads data traffic, addressing critical IoT requirements such as low latency, increased network capacity, and improved spectral and energy efficiency. Software Defined Networking (i.e. SDN) addresses diverse IoT network needs across domains like smart grids, healthcare, traffic signaling, agriculture, and smart homes by enabling efficient communication, network management, and innovative control procedures. However, SDN\u2019s application for anomaly detection and primary defense against security threats in IoT systems remains underexplored. This research investigates the potential of the design of an intelligent mechanism for energy efficient, privacy preserving, and secure communication in WSN based resource constrained IoT systems. The proposed approach leverages advanced technologies such as SDN, Machine Learning (i.e. ML), Deep Learning (i.e. DL), D2D communication, Computer Vision, and Network Function Virtualization (i.e. NFV). Additionally, it emphasizes assessing and offloading specific IoT application functions onto the network\u2019s edge to enhance performance. Moreover, the development of lightweight security mechanisms for secure communication in resource constrained IoT environments is also identified as a crucial research domain.<\/jats:p>","DOI":"10.1007\/s43926-025-00152-2","type":"journal-article","created":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T03:24:58Z","timestamp":1746761098000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["A review on WSN based resource constrained smart IoT systems"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6478-3102","authenticated-orcid":false,"given":"Shreeram","family":"Hudda","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6677-5368","authenticated-orcid":false,"given":"K.","family":"Haribabu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,9]]},"reference":[{"key":"152_CR1","first-page":"1","volume":"10","author":"Q Wang","year":"2010","unstructured":"Wang Q, Balasingham I. Wireless sensor networks-an introduction. Wireless Sensor Netw Appl Centric Design. 2010;10:1\u201314.","journal-title":"Wireless Sensor Netw Appl Centric Design"},{"key":"152_CR2","doi-asserted-by":"publisher","DOI":"10.1002\/9780470666388","volume-title":"Fundamentals of wireless sensor networks: theory and practice","author":"W Dargie","year":"2010","unstructured":"Dargie W, Poellabauer C. Fundamentals of Wireless Sensor Networks: Theory and Practice. John Wiley & Sons; 2010."},{"key":"152_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/047011276X","volume-title":"Wireless sensor networks: technology, protocols, and applications","author":"K Sohraby","year":"2007","unstructured":"Sohraby K, Minoli D, Znati T. Wireless Sensor Networks: Technology, Protocols, and Applications. John wiley & sons; 2007."},{"key":"152_CR4","doi-asserted-by":"crossref","unstructured":"Fischione C. An introduction to wireless sensor networks. Royal Institute of technology. Draft, version 1 2014.","DOI":"10.1017\/CBO9781139030960.002"},{"key":"152_CR5","doi-asserted-by":"publisher","unstructured":"Heinzelman WR, Chandrakasan A, Balakrishnan H. Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, p. 10. IEEE Comput. Soc, 2000. https:\/\/doi.org\/10.1109\/hicss.2000.926982 .","DOI":"10.1109\/hicss.2000.926982"},{"key":"152_CR6","doi-asserted-by":"publisher","DOI":"10.1017\/9781108913560","volume-title":"Introduction IoT","author":"S Misra","year":"2021","unstructured":"Misra S, Mukherjee A, Roy A. Introduction IoT. Cambridge University Press; 2021."},{"key":"152_CR7","volume-title":"Internet of things for architects: architecting IoT solutions by implementing sensors, communication infrastructure edge computing: analytics, and security","author":"P Lea","year":"2018","unstructured":"Lea P. Internet of Things for Architects: Architecting IoT Solutions by Implementing Sensors, Communication Infrastructure Edge Computing: Analytics, and Security. Birmingham: Packt Publishing Ltd; 2018."},{"key":"152_CR8","doi-asserted-by":"publisher","first-page":"1687","DOI":"10.1007\/s11277-020-07446-4","volume":"114","author":"A Khanna","year":"2020","unstructured":"Khanna A, Kaur S. Internet of things (iot), applications and challenges: a comprehensive review. Wireless Personal Commun. 2020;114:1687\u2013762. https:\/\/doi.org\/10.1007\/s11277-020-07446-4.","journal-title":"Wireless Personal Commun"},{"key":"152_CR9","unstructured":"Lakhwani K, Gianey HK, Wireko JK, Hiran KK. Internet of Things (IoT): Principles. Paradigms and Applications of IoT: Bpb Publications, 2020."},{"key":"152_CR10","volume-title":"IoT Fundamentals: networking technologies, protocols, and use cases for the internet of things","author":"D Hanes","year":"2017","unstructured":"Hanes D, Salgueiro G, Grossetete P, Barton R, Henry J. IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things. Indianapolis: Cisco Press; 2017."},{"key":"152_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-04524-0","volume-title":"IoT based smart applications","author":"N Sindhwani","year":"2023","unstructured":"Sindhwani N, Anand R, Niranjanamurthy M, Verma DC, Valentina EB. IoT Based Smart Applications. Boca Raton: Springer; 2023."},{"key":"152_CR12","doi-asserted-by":"publisher","DOI":"10.1201\/9781315269849","volume-title":"Internet of Things (IoT): technologies, applications, challenges and solutions","author":"B Tripathy","year":"2017","unstructured":"Tripathy B, Anuradha J. Internet of Things (IoT): Technologies, Applications, Challenges and Solutions. Boca Raton: CRC Press; 2017."},{"key":"152_CR13","doi-asserted-by":"publisher","DOI":"10.1201\/9780429399084","volume-title":"Internet of Things (IoT): Systems and Applications","author":"JY Khan","year":"2019","unstructured":"Khan JY, Yuce MR. Internet of Things (IoT): Systems and Applications. Boca Raton: CRC Press; 2019."},{"key":"152_CR14","doi-asserted-by":"publisher","DOI":"10.1201\/9781003434269","volume-title":"Advanced IoT Technologies and Applications in the Industry 4.0 Digital Economy","author":"A Khang","year":"2024","unstructured":"Khang A, Abdullayev V, Hahanov V, Shah V. Advanced IoT Technologies and Applications in the Industry 4.0 Digital Economy. Boca Raton: CRC Press; 2024."},{"key":"152_CR15","doi-asserted-by":"publisher","DOI":"10.1002\/9781119456735","volume-title":"Internet of Things A to Z: Technologies and Applications","author":"QF Hassan","year":"2018","unstructured":"Hassan QF. Internet of Things A to Z: Technologies and Applications. Hoboken: John Wiley & Sons; 2018."},{"key":"152_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-5505-8","volume-title":"Wireless Sensor Networks","author":"K Yang","year":"2014","unstructured":"Yang K. Wireless Sensor Networks. Berlin: Springer; 2014."},{"key":"152_CR17","doi-asserted-by":"publisher","DOI":"10.2174\/97898114793591210101","volume-title":"Introduction to Sensors in IoT and Cloud Computing Applications","author":"A Nagaraj","year":"2021","unstructured":"Nagaraj A. Introduction to Sensors in IoT and Cloud Computing Applications. Sharjah: Bentham Science Publishers; 2021."},{"key":"152_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-38516-3","volume-title":"Integration of WSN and IoT for smart cities","author":"S Rani","year":"2020","unstructured":"Rani S, Maheswar R, Kanagachidambaresan G, Jayarajan P. Integration of WSN and IoT for smart cities. Berlin: Springer; 2020."},{"key":"152_CR19","doi-asserted-by":"crossref","unstructured":"Mukherjee P, Pattnaik PK, Panda SN. Iot and wsn applications for modern agricultural advancements: emerging research and opportunities: Emerging research and opportunities 2019.","DOI":"10.4018\/978-1-5225-9004-0"},{"issue":"2","key":"152_CR20","doi-asserted-by":"publisher","first-page":"282","DOI":"10.3390\/s17020282","volume":"17","author":"F Wu","year":"2017","unstructured":"Wu F, R\u00fcdiger C, Yuce MR. Real-time performance of a self-powered environmental iot sensor network system. Sensors. 2017;17(2):282.","journal-title":"Sensors"},{"key":"152_CR21","doi-asserted-by":"publisher","unstructured":"Hudda S, Haribabu K, Barnwal R, Khurana A. A wsn and vision based energy efficient and smart surveillance system using computer vision and ai at edge. In: 2024 International Conference on Advanced Information Networking and Applications (AINA), pp. 24\u201336 2024. https:\/\/doi.org\/10.1007\/978-3-031-57870-0_3 . Springer.","DOI":"10.1007\/978-3-031-57870-0_3"},{"issue":"5","key":"152_CR22","doi-asserted-by":"publisher","first-page":"3850","DOI":"10.1109\/jiot.2021.3100797","volume":"9","author":"MJ Islam","year":"2022","unstructured":"Islam MJ, Rahman A, Kabir S, Karim MR, Acharjee UK, Nasir MK, Band SS, Sookhak M, Wu S. Blockchain-sdn-based energy-aware and distributed secure architecture for iot in smart cities. IEEE Int Things J. 2022;9(5):3850\u201364. https:\/\/doi.org\/10.1109\/jiot.2021.3100797.","journal-title":"IEEE Int Things J"},{"issue":"4","key":"152_CR23","doi-asserted-by":"publisher","first-page":"985","DOI":"10.26599\/TST.2023.9010056","volume":"29","author":"N Meenakshi","year":"2024","unstructured":"Meenakshi N, Ahmad S, Prabu A, Rao JN, Othman NA, Abdeljaber HA, Sekar R, Nazeer J. Efficient communication in wireless sensor networks using optimized energy efficient engroove leach clustering protocol. Tsinghua Sci Technol. 2024;29(4):985\u20131001. https:\/\/doi.org\/10.26599\/TST.2023.9010056.","journal-title":"Tsinghua Sci Technol"},{"key":"152_CR24","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2023.3312155","author":"H Gururaj","year":"2023","unstructured":"Gururaj H, Natarajan R, Almujally NA, Flammini F, Krishna S, Gupta SK. Collaborative energy-efficient routing protocol for sustainable communication in 5g\/6g wireless sensor networks. IEEE Open J Commun Soc. 2023. https:\/\/doi.org\/10.1109\/OJCOMS.2023.3312155.","journal-title":"IEEE Open J Commun Soc"},{"issue":"1","key":"152_CR25","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1186\/s13635-024-00155-6","volume":"2024","author":"K Saleem","year":"2024","unstructured":"Saleem K, Wang L, Bharany S, Ouahada K, Rehman AU, Hamam H. Intelligent multi-agent model for energy-efficient communication in wireless sensor networks. EURASIP J Inform Security. 2024;2024(1):9. https:\/\/doi.org\/10.1186\/s13635-024-00155-6.","journal-title":"EURASIP J Inform Security"},{"issue":"3","key":"152_CR26","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1109\/TITS.2018.2838128","volume":"20","author":"RM Nieto","year":"2019","unstructured":"Nieto RM, Garc\u00eda-Martin \u00c1, Hauptmann AG, Mart\u00ednez JM. Automatic vacant parking places management system using multicamera vehicle detection. IEEE Trans Intell Transport Syst. 2019;20(3):1069\u201380. https:\/\/doi.org\/10.1109\/TITS.2018.2838128. (IEEE).","journal-title":"IEEE Trans Intell Transport Syst"},{"key":"152_CR27","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4166","author":"B Rana","year":"2020","unstructured":"Rana B, Singh Y, Singh PK. A systematic survey on internet of things: energy efficiency and interoperability perspective. Trans Emerg Telecommun Technol. 2020. https:\/\/doi.org\/10.1002\/ett.4166.","journal-title":"Trans Emerg Telecommun Technol"},{"key":"152_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101329","volume":"27","author":"S Hudda","year":"2024","unstructured":"Hudda S, Haribabu K, Barnwal R. Energy efficient data communication for wsn based resource constrained iot devices. Int Things. 2024;27: 101329. https:\/\/doi.org\/10.1016\/j.iot.2024.101329.","journal-title":"Int Things"},{"key":"152_CR29","doi-asserted-by":"publisher","unstructured":"Haimour J, Abu-Sharkh O. Energy efficient sleep\/wake-up techniques for iot: A survey. In: 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), pp. 478\u2013484. IEEE, 2019. https:\/\/doi.org\/10.1109\/jeeit.2019.8717372 .","DOI":"10.1109\/jeeit.2019.8717372"},{"key":"152_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101989","volume":"95","author":"NN Hurrah","year":"2019","unstructured":"Hurrah NN, Parah SA, Sheikh JA, Al-Turjman F, Muhammad K. Secure data transmission framework for confidentiality in iots. Ad Hoc Networks. 2019;95: 101989. https:\/\/doi.org\/10.1016\/j.adhoc.2019.101989.","journal-title":"Ad Hoc Networks"},{"key":"152_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2020.105251","volume":"170","author":"L Hang","year":"2020","unstructured":"Hang L, Ullah I, Kim D-H. A secure fish farm platform based on blockchain for agriculture data integrity. Computers Electron Agric. 2020;170: 105251. https:\/\/doi.org\/10.1016\/j.compag.2020.105251.","journal-title":"Computers Electron Agric"},{"issue":"3","key":"152_CR32","doi-asserted-by":"publisher","first-page":"2566","DOI":"10.1109\/TSG.2020.3042926","volume":"12","author":"P Zhuang","year":"2020","unstructured":"Zhuang P, Liang H. False data injection attacks against state-of-charge estimation of battery energy storage systems in smart distribution networks. IEEE Trans Smart Grid. 2020;12(3):2566\u201377. https:\/\/doi.org\/10.1109\/TSG.2020.3042926.","journal-title":"IEEE Trans Smart Grid"},{"key":"152_CR33","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1016\/j.comcom.2020.01.004","volume":"151","author":"C Jiang","year":"2020","unstructured":"Jiang C, Fan T, Gao H, Shi W, Liu L, C\u00e9rin C, Wan J. Energy aware edge computing: a survey. Computer Communications. 2020;151:556\u201380. https:\/\/doi.org\/10.1016\/j.comcom.2020.01.004.","journal-title":"Computer Communications"},{"issue":"3","key":"152_CR34","doi-asserted-by":"publisher","first-page":"817","DOI":"10.3390\/s18030817","volume":"18","author":"B Ali","year":"2018","unstructured":"Ali B, Awad A. Cyber and physical security vulnerability assessment for iot-based smart homes. Sensors. 2018;18(3):817. https:\/\/doi.org\/10.3390\/s18030817.","journal-title":"Sensors"},{"issue":"6","key":"152_CR35","doi-asserted-by":"publisher","first-page":"2629","DOI":"10.1109\/TII.2018.2789442","volume":"14","author":"R Chaudhary","year":"2018","unstructured":"Chaudhary R, Aujla GS, Garg S, Kumar N, Rodrigues JJ. Sdn-enabled multi-attribute-based secure communication for smart grid in iot environment. IEEE Trans Industrial Informatics. 2018;14(6):2629\u201340. https:\/\/doi.org\/10.1109\/TII.2018.2789442.","journal-title":"IEEE Trans Industrial Informatics"},{"key":"152_CR36","doi-asserted-by":"publisher","unstructured":"Friha O, Ferrag MA, Shu L, Nafa M. A robust security framework based on blockchain and sdn for fog computing enabled agricultural internet of things. In: 2020 International Conference on Internet of Things and Intelligent Applications (ITIA), pp. 1\u20135 2020. https:\/\/doi.org\/10.1109\/ITIA50152.2020.9312286 . IEEE.","DOI":"10.1109\/ITIA50152.2020.9312286"},{"key":"152_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106889","volume":"163","author":"Y Kim","year":"2019","unstructured":"Kim Y, Nam J, Park T, Scott-Hayward S, Shin S. Soda: A software-defined security framework for iot environments. Computer Netw. 2019;163: 106889. https:\/\/doi.org\/10.1016\/j.comnet.2019.106889.","journal-title":"Computer Netw"},{"key":"152_CR38","doi-asserted-by":"publisher","first-page":"135479","DOI":"10.1109\/ACCESS.2020.3011503","volume":"8","author":"J Li","year":"2020","unstructured":"Li J, Cai J, Khan F, Rehman AU, Balasubramaniam V, Sun J, Venu P. A secured framework for sdn-based edge computing in iot-enabled healthcare system. IEEE Access. 2020;8:135479\u201390. https:\/\/doi.org\/10.1109\/ACCESS.2020.3011503.","journal-title":"IEEE Access"},{"issue":"3","key":"152_CR39","doi-asserted-by":"publisher","first-page":"1379","DOI":"10.1109\/JIOT.2018.2799209","volume":"5","author":"S Jiang","year":"2018","unstructured":"Jiang S, Duan M, Wang L. Toward privacy-preserving symptoms matching in sdn-based mobile healthcare social networks. IEEE Int Things J. 2018;5(3):1379\u201388. https:\/\/doi.org\/10.1109\/JIOT.2018.2799209.","journal-title":"IEEE Int Things J"},{"issue":"5","key":"152_CR40","doi-asserted-by":"publisher","first-page":"3930","DOI":"10.1109\/JIOT.2020.3025988","volume":"8","author":"AJ Pinheiro","year":"2020","unstructured":"Pinheiro AJ, Araujo-Filho PF, Bezerra JDM, Campelo DR. Adaptive packet padding approach for smart home networks: a tradeoff between privacy and performance. IEEE Int Things J. 2020;8(5):3930\u20138. https:\/\/doi.org\/10.1109\/JIOT.2020.3025988.","journal-title":"IEEE Int Things J"},{"key":"152_CR41","doi-asserted-by":"publisher","first-page":"67555","DOI":"10.1109\/access.2020.2985719","volume":"8","author":"S Shin","year":"2020","unstructured":"Shin S, Kwon T. A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5g-integrated internet of things. IEEE Access. 2020;8:67555\u201371. https:\/\/doi.org\/10.1109\/access.2020.2985719.","journal-title":"IEEE Access"},{"issue":"13","key":"152_CR42","doi-asserted-by":"publisher","first-page":"10583","DOI":"10.1109\/JIOT.2020.3048357","volume":"8","author":"V Sivaraman","year":"2020","unstructured":"Sivaraman V, Sikdar B. A game-theoretic approach for enhancing data privacy in sdn-based smart grids. IEEE Int Things J. 2020;8(13):10583\u201395. https:\/\/doi.org\/10.1109\/JIOT.2020.3048357.","journal-title":"IEEE Int Things J"},{"key":"152_CR43","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jnca.2016.10.011","volume":"89","author":"G Sun","year":"2017","unstructured":"Sun G, Chang V, Ramachandran M, Sun Z, Li G, Yu H, Liao D. Efficient location privacy algorithm for internet of things (iot) services and applications. J Netw Computer Appl. 2017;89:3\u201313. https:\/\/doi.org\/10.1016\/j.jnca.2016.10.011.","journal-title":"J Netw Computer Appl"},{"key":"152_CR44","doi-asserted-by":"publisher","first-page":"34675","DOI":"10.1109\/access.2020.2974227","volume":"8","author":"X Wang","year":"2020","unstructured":"Wang X, Umehira M, Han B, Zhou H, Li P, Wu C. An efficient privacy preserving spectrum sharing framework for internet of things. IEEE Access. 2020;8:34675\u201385. https:\/\/doi.org\/10.1109\/access.2020.2974227.","journal-title":"IEEE Access"},{"issue":"1","key":"152_CR45","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1109\/tii.2020.2972623","volume":"17","author":"J Wei","year":"2021","unstructured":"Wei J, Phuong TVX, Yang G. An efficient privacy preserving message authentication scheme for internet-of-things. IEEE Trans Indust Inform. 2021;17(1):617\u201326. https:\/\/doi.org\/10.1109\/tii.2020.2972623.","journal-title":"IEEE Trans Indust Inform"},{"issue":"5","key":"152_CR46","doi-asserted-by":"publisher","first-page":"4016","DOI":"10.1109\/jiot.2020.2978286","volume":"7","author":"J Zhang","year":"2020","unstructured":"Zhang J, Zhao Y, Wu J, Chen B. Lvpda: a lightweight and verifiable privacy-preserving data aggregation scheme for edge-enabled iot. IEEE Int Things J. 2020;7(5):4016\u201327. https:\/\/doi.org\/10.1109\/jiot.2020.2978286.","journal-title":"IEEE Int Things J"},{"key":"152_CR47","doi-asserted-by":"publisher","first-page":"56765","DOI":"10.1109\/ACCESS.2018.2873907","volume":"6","author":"AC Baktir","year":"2018","unstructured":"Baktir AC, Tunca C, Ozgovde A, Salur G, Ersoy C. Sdn-based multi-tier computing and communication architecture for pervasive healthcare. IEEE Access. 2018;6:56765\u201381. https:\/\/doi.org\/10.1109\/ACCESS.2018.2873907.","journal-title":"IEEE Access"},{"key":"152_CR48","doi-asserted-by":"publisher","unstructured":"Gia TN, Rahmani A-M, Westerlund T, Liljeberg P, Tenhunen H. Fault tolerant and scalable iot-based architecture for health monitoring. In: 2015 IEEE Sensors Applications Symposium (SAS). IEEE, 2015. https:\/\/doi.org\/10.1109\/sas.2015.7133626 .","DOI":"10.1109\/sas.2015.7133626"},{"issue":"1","key":"152_CR49","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TNSM.2019.2941214","volume":"17","author":"Y Meng","year":"2019","unstructured":"Meng Y, Huang Z, Shen G, Ke C. Sdn-based security enforcement framework for data sharing systems of smart healthcare. IEEE Trans Netw Service Manage. 2019;17(1):308\u201318. https:\/\/doi.org\/10.1109\/TNSM.2019.2941214.","journal-title":"IEEE Trans Netw Service Manage"},{"key":"152_CR50","doi-asserted-by":"publisher","unstructured":"Misra S, Saha R, Ahmed N. Health-flow: Criticality-aware flow control for sdn-based healthcare iot. In: GLOBECOM 2020-2020 IEEE Global Communications Conference, pp. 1\u20136 2020. https:\/\/doi.org\/10.1109\/GLOBECOM42002.2020.9348058 . IEEE.","DOI":"10.1109\/GLOBECOM42002.2020.9348058"},{"key":"152_CR51","doi-asserted-by":"publisher","unstructured":"Sallabi F, Naeem F, Awad M, Shuaib K. Managing iot-based smart healthcare systems traffic with software defined networks. In: 2018 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1\u20136 2018. https:\/\/doi.org\/10.1109\/ISNCC.2018.8530920 . IEEE.","DOI":"10.1109\/ISNCC.2018.8530920"},{"key":"152_CR52","doi-asserted-by":"publisher","unstructured":"Srilakshmi A, Mohanapriya P, Harini D, Geetha K. Iot based smart health care system to prevent security attacks in sdn. In: 2019 Fifth International Conference on Electrical Energy Systems (ICEES), pp. 1\u20137 2019. https:\/\/doi.org\/10.1109\/ICEES.2019.8719236 . IEEE.","DOI":"10.1109\/ICEES.2019.8719236"},{"key":"152_CR53","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.jpdc.2017.11.018","volume":"116","author":"P Verma","year":"2018","unstructured":"Verma P, Sood SK. Cloud-centric iot based disease diagnosis healthcare framework. J Parallel Distributed Comput. 2018;116:27\u201338. https:\/\/doi.org\/10.1016\/j.jpdc.2017.11.018.","journal-title":"J Parallel Distributed Comput"},{"key":"152_CR54","doi-asserted-by":"publisher","first-page":"88621","DOI":"10.1109\/ACCESS.2021.3090346","volume":"9","author":"AA Soares","year":"2021","unstructured":"Soares AA, Lopes Y, Passos D, Fernandes NC, Muchaluat-Saade DC. 3as: authentication, authorization, and accountability for sdn-based smart grids. IEEE Access. 2021;9:88621\u201340. https:\/\/doi.org\/10.1109\/ACCESS.2021.3090346.","journal-title":"IEEE Access"},{"key":"152_CR55","doi-asserted-by":"publisher","unstructured":"Sharma VK, Shukla SSP, Singh V. A tailored q- learning for routing in wireless sensor networks. In: 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing. IEEE, 2012. https:\/\/doi.org\/10.1109\/pdgc.2012.6449899 .","DOI":"10.1109\/pdgc.2012.6449899"},{"issue":"3","key":"152_CR56","doi-asserted-by":"publisher","first-page":"2637","DOI":"10.1109\/COMST.2019.2908266","volume":"21","author":"MH Rehmani","year":"2019","unstructured":"Rehmani MH, Davy A, Jennings B, Assi C. Software defined networks-based smart grid communication: a comprehensive survey. IEEE Commun Surv & Tutorials. 2019;21(3):2637\u201370. https:\/\/doi.org\/10.1109\/COMST.2019.2908266.","journal-title":"IEEE Commun Surv & Tutorials"},{"key":"152_CR57","doi-asserted-by":"publisher","first-page":"45773","DOI":"10.1109\/ACCESS.2019.2909048","volume":"7","author":"Z Lv","year":"2019","unstructured":"Lv Z, Wang L, Guan Z, Wu J, Du X, Zhao H, Guizani M. An optimizing and differentially private clustering algorithm for mixed data in sdn-based smart grid. IEEE access. 2019;7:45773\u201382. https:\/\/doi.org\/10.1109\/ACCESS.2019.2909048.","journal-title":"IEEE access"},{"key":"152_CR58","doi-asserted-by":"publisher","first-page":"168624","DOI":"10.1109\/ACCESS.2021.3135080","volume":"9","author":"Y Lalle","year":"2021","unstructured":"Lalle Y, Fourati M, Fourati LC, Barraca JP. Routing strategies for lorawan multi-hop networks: a survey and an sdn-based solution for smart water grid. IEEE Access. 2021;9:168624\u201347. https:\/\/doi.org\/10.1109\/ACCESS.2021.3135080.","journal-title":"IEEE Access"},{"issue":"2","key":"152_CR59","doi-asserted-by":"publisher","first-page":"1430","DOI":"10.1109\/TNSM.2021.3050148","volume":"18","author":"A Jakaria","year":"2021","unstructured":"Jakaria A, Rahman MA, Gokhale A. Resiliency-aware deployment of sdn in smart grid scada: a formal synthesis model. IEEE Trans Net Service Management. 2021;18(2):1430\u201344. https:\/\/doi.org\/10.1109\/TNSM.2021.3050148.","journal-title":"IEEE Trans Net Service Management"},{"issue":"2","key":"152_CR60","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MNET.001.1900151","volume":"34","author":"GS Aujla","year":"2020","unstructured":"Aujla GS, Singh M, Bose A, Kumar N, Han G, Buyya R. Blocksdn: Blockchain-as-a-service for software defined networking in smart city applications. IEEE Netw. 2020;34(2):83\u201391. https:\/\/doi.org\/10.1109\/MNET.001.1900151.","journal-title":"IEEE Netw"},{"issue":"4","key":"152_CR61","doi-asserted-by":"publisher","first-page":"718","DOI":"10.1109\/JAS.2021.1003925","volume":"8","author":"O Friha","year":"2021","unstructured":"Friha O, Ferrag MA, Shu L, Maglaras L, Wang X. Internet of things for the future of smart agriculture: a comprehensive survey of emerging technologies. IEEE\/CAA Journal of Automatica Sinica. 2021;8(4):718\u201352. https:\/\/doi.org\/10.1109\/JAS.2021.1003925.","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"key":"152_CR62","doi-asserted-by":"publisher","first-page":"69230","DOI":"10.1109\/access.2020.2986257","volume":"8","author":"A Shahid","year":"2020","unstructured":"Shahid A, Almogren A, Javaid N, Al-Zahrani FA, Zuair M, Alam M. Blockchain-based agri-food supply chain: a complete solution. IEEE Access. 2020;8:69230\u201343. https:\/\/doi.org\/10.1109\/access.2020.2986257.","journal-title":"IEEE Access"},{"key":"152_CR63","doi-asserted-by":"publisher","first-page":"136253","DOI":"10.1109\/ACCESS.2021.3116814","volume":"9","author":"RK Singh","year":"2021","unstructured":"Singh RK, Berkvens R, Weyn M. Agrifusion: an architecture for iot and emerging technologies based on a precision agriculture survey. IEEE Access. 2021;9:136253\u201383. https:\/\/doi.org\/10.1109\/ACCESS.2021.3116814.","journal-title":"IEEE Access"},{"key":"152_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2019.104939","volume":"165","author":"C Verdouw","year":"2019","unstructured":"Verdouw C, Sundmaeker H, Tekinerdogan B, Conzon D, Montanaro T. Architecture framework of iot-based food and farm systems: a multiple case study. Computer Electron Agric. 2019;165: 104939. https:\/\/doi.org\/10.1016\/j.compag.2019.104939.","journal-title":"Computer Electron Agric"},{"key":"152_CR65","doi-asserted-by":"publisher","unstructured":"Alonso RS, Sitt\u00f3n-Candanedo I, Casado-Vara R, Prieto J, Corchado JM. Deep reinforcement learning for the management of software-defined networks in smart farming. In: 2020 International Conference on Omni-layer Intelligent Systems (COINS), pp. 1\u20136 2020. https:\/\/doi.org\/10.1109\/COINS49042.2020.9191634 . IEEE.","DOI":"10.1109\/COINS49042.2020.9191634"},{"key":"152_CR66","doi-asserted-by":"publisher","first-page":"136332","DOI":"10.1109\/ACCESS.2019.2939348","volume":"7","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Wu G, Deng L, Fu J. Arrival rate-based average energy-efficient resource allocation for 5g heterogeneous cloud ran. IEEE Access. 2019;7:136332\u201342. https:\/\/doi.org\/10.1109\/ACCESS.2019.2939348.","journal-title":"IEEE Access"},{"issue":"5","key":"152_CR67","doi-asserted-by":"publisher","first-page":"3496","DOI":"10.1109\/TCOMM.2019.2893304","volume":"67","author":"J Shi","year":"2019","unstructured":"Shi J, Yu W, Ni Q, Liang W, Li Z, Xiao P. Energy efficient resource allocation in hybrid non-orthogonal multiple access systems. IEEE Trans Commun. 2019;67(5):3496\u2013511. https:\/\/doi.org\/10.1109\/TCOMM.2019.2893304.","journal-title":"IEEE Trans Commun"},{"issue":"1","key":"152_CR68","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1109\/JIOT.2018.2842738","volume":"6","author":"Z Kuang","year":"2018","unstructured":"Kuang Z, Liu G, Li G, Deng X. Energy efficient resource allocation algorithm in energy harvesting-based d2d heterogeneous networks. IEEE Int Things J. 2018;6(1):557\u201367. https:\/\/doi.org\/10.1109\/JIOT.2018.2842738.","journal-title":"IEEE Int Things J"},{"issue":"2","key":"152_CR69","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MWC.2018.1700074","volume":"25","author":"H Zhang","year":"2018","unstructured":"Zhang H, Fang F, Cheng J, Long K, Wang W, Leung VC. Energy-efficient resource allocation in noma heterogeneous networks. IEEE Wireless Commun. 2018;25(2):48\u201353. https:\/\/doi.org\/10.1109\/MWC.2018.1700074.","journal-title":"IEEE Wireless Commun"},{"issue":"2","key":"152_CR70","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1109\/TVT.2018.2882466","volume":"68","author":"N Amani","year":"2018","unstructured":"Amani N, Pedram H, Taheri H, Parsaeefard S. Energy-efficient resource allocation in heterogeneous cloud radio access networks via bbu offloading. IEEE Trans Vehic Technol. 2018;68(2):1365\u201377. https:\/\/doi.org\/10.1109\/TVT.2018.2882466.","journal-title":"IEEE Trans Vehic Technol"},{"issue":"2","key":"152_CR71","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1109\/JSYST.2018.2838539","volume":"13","author":"S Guo","year":"2018","unstructured":"Guo S, Zhou X, Xiao S, Sun M. Fairness-aware energy-efficient resource allocation in d2d communication networks. IEEE Syst J. 2018;13(2):1273\u201384. https:\/\/doi.org\/10.1109\/JSYST.2018.2838539.","journal-title":"IEEE Syst J"},{"issue":"6","key":"152_CR72","doi-asserted-by":"publisher","first-page":"2185","DOI":"10.1109\/TITS.2018.2865173","volume":"20","author":"F Abbas","year":"2018","unstructured":"Abbas F, Fan P, Khan Z. A novel low-latency v2v resource allocation scheme based on cellular v2x communications. IEEE Trans Intell Transport Syst. 2018;20(6):2185\u201397. https:\/\/doi.org\/10.1109\/TITS.2018.2865173.","journal-title":"IEEE Trans Intell Transport Syst"},{"key":"152_CR73","doi-asserted-by":"publisher","unstructured":"Alwan S, Fajjari I, Aitsaadi N. D2d multihop energy-efficient routing and ofdma resource allocation in 5g networks. In: 2018 IFIP Networking Conference (IFIP Networking) and Workshops, pp. 1\u20139. IEEE, 2018. https:\/\/doi.org\/10.23919\/IFIPNetworking.2018.8696917 .","DOI":"10.23919\/IFIPNetworking.2018.8696917"},{"key":"152_CR74","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101346","volume":"28","author":"S Hudda","year":"2024","unstructured":"Hudda S, Barnwal R, Khurana A, Haribabu K. A wsn and vision based smart, energy efficient, scalable, and reliable parking surveillance system with optical verification at edge for resource constrained iot devices. Int Things. 2024;28: 101346. https:\/\/doi.org\/10.1016\/j.iot.2024.101346.","journal-title":"Int Things"},{"key":"152_CR75","unstructured":"Kurose J, Ross K. Computer Networking: A Top-down Approach. Pearson, 2021. [Online]: https:\/\/gaia.cs.umass.edu\/kurose_ross\/online_lectures.htm, Last Accessed 20-09-2024"},{"issue":"2","key":"152_CR76","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J. Openflow: enabling innovation in campus networks. ACM SIGCOMM Computer Commun Rev. 2008;38(2):69\u201374. https:\/\/doi.org\/10.1145\/1355734.1355746.","journal-title":"ACM SIGCOMM Computer Commun Rev"},{"key":"152_CR77","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.jnca.2016.04.011","volume":"68","author":"W Li","year":"2016","unstructured":"Li W, Meng W, Kwok LF. A survey on openflow-based software defined networks: security challenges and countermeasures. J Netw Computer Appl. 2016;68:126\u201339. https:\/\/doi.org\/10.1016\/j.jnca.2016.04.011.","journal-title":"J Netw Computer Appl"},{"issue":"3","key":"152_CR78","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/2656877.2656890","volume":"44","author":"P Bosshart","year":"2014","unstructured":"Bosshart P, Daly D, Gibb G, Izzard M, McKeown N, Rexford J, Schlesinger C, Talayco D, Vahdat A, Varghese G, Walker D. P4: programming protocol-independent packet processors. ACM SIGCOMM Computer Commun Rev. 2014;44(3):87\u201395. https:\/\/doi.org\/10.1145\/2656877.2656890.","journal-title":"ACM SIGCOMM Computer Commun Rev"},{"issue":"2","key":"152_CR79","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MNET.2017.1600212NM","volume":"31","author":"N Chen","year":"2017","unstructured":"Chen N, Wang M, Zhang N, Shen XS, Zhao D. Sdn-based framework for the pev integrated smart grid. Ieee Netw. 2017;31(2):14\u201321. https:\/\/doi.org\/10.1109\/MNET.2017.1600212NM.","journal-title":"Ieee Netw"},{"issue":"3","key":"152_CR80","doi-asserted-by":"publisher","first-page":"1220","DOI":"10.1109\/TII.2017.2742147","volume":"14","author":"DA Chekired","year":"2017","unstructured":"Chekired DA, Khoukhi L, Mouftah HT. Decentralized cloud-sdn architecture in smart grid: a dynamic pricing model. IEEE Trans Indust Inform. 2017;14(3):1220\u201331. https:\/\/doi.org\/10.1109\/TII.2017.2742147.","journal-title":"IEEE Trans Indust Inform"},{"issue":"1","key":"152_CR81","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1109\/JIOT.2017.2734903","volume":"6","author":"S Al-Rubaye","year":"2017","unstructured":"Al-Rubaye S, Kadhum E, Ni Q, Anpalagan A. Industrial internet of things driven by sdn platform for smart grid resiliency. IEEE Int Things J. 2017;6(1):267\u201377. https:\/\/doi.org\/10.1109\/JIOT.2017.2734903.","journal-title":"IEEE Int Things J"},{"key":"152_CR82","doi-asserted-by":"publisher","unstructured":"Lopes Y, Fernandes NC, Muchaluat-Saade DC, Obraczka K. Ares: An autonomic and resilient framework for smart grids. In: 2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), pp. 222\u2013229 2017. https:\/\/doi.org\/10.23919\/INM.2017.7987283 . IEEE.","DOI":"10.23919\/INM.2017.7987283"},{"key":"152_CR83","unstructured":"Overview of Smart Grid Technology And Its Operation and Application (For Existing Power System). ElProCus Technologies Pvt Ltd. [Online]: https:\/\/www.elprocus.com\/overview-smart-grid-technology-operation-application-existing-power-system\/, Last Accessed 20-09-2024"},{"key":"152_CR84","doi-asserted-by":"publisher","unstructured":"Azlin AAN, Mansor H, Hashim AZ, Gunawan TS. Development of modular smart farm system. In: 2017 IEEE 4th International Conference on Smart Instrumentation, Measurement and Application (ICSIMA), pp. 1\u20136 2017. https:\/\/doi.org\/10.1109\/ICSIMA.2017.8312019 . IEEE.","DOI":"10.1109\/ICSIMA.2017.8312019"},{"key":"152_CR85","doi-asserted-by":"publisher","unstructured":"Ordo\u00f1ez-Garc\u00eda A, Siller M, Begovich O. Iot architecture for urban agronomy and precision applications. In: 2017 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC), pp. 1\u20134 2017. https:\/\/doi.org\/10.1109\/ROPEC.2017.8261582 . IEEE.","DOI":"10.1109\/ROPEC.2017.8261582"},{"issue":"1","key":"152_CR86","doi-asserted-by":"publisher","first-page":"127","DOI":"10.3390\/agronomy12010127","volume":"12","author":"A Rehman","year":"2022","unstructured":"Rehman A, Saba T, Kashif M, Fati SM, Bahaj SA, Chaudhry H. A revisit of internet of things technologies for monitoring and control strategies in smart agriculture. Agronomy. 2022;12(1):127. https:\/\/doi.org\/10.3390\/agronomy12010127.","journal-title":"Agronomy"},{"issue":"5","key":"152_CR87","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/MCOM.2016.7470945","volume":"54","author":"K Xu","year":"2016","unstructured":"Xu K, Wang X, Wei W, Song H, Mao B. Toward software defined smart home. IEEE Commun Magazine. 2016;54(5):116\u201322. https:\/\/doi.org\/10.1109\/MCOM.2016.7470945.","journal-title":"IEEE Commun Magazine"},{"key":"152_CR88","doi-asserted-by":"publisher","unstructured":"Kadir K, Yusof ZM, Rasin MZM, Billah MM, Salikin Q. Wireless imu: a wearable smart sensor for disability rehabilitation training. In: 2018 2nd International Conference on Smart Sensors and Application (ICSSA), pp. 53\u201357 2018. https:\/\/doi.org\/10.1109\/ICSSA.2018.8535952 . IEEE.","DOI":"10.1109\/ICSSA.2018.8535952"},{"issue":"2","key":"152_CR89","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1109\/TBC.2019.2898159","volume":"65","author":"N Jawad","year":"2019","unstructured":"Jawad N, Salih M, Ali K, Meunier B, Zhang Y, Zhang X, Zetik R, Zarakovitis C, Koumaras H, Kourtis M-A, et al. Smart television services using nfv\/sdn network management. IEEE Trans Broadcast. 2019;65(2):404\u201313. https:\/\/doi.org\/10.1109\/TBC.2019.2898159.","journal-title":"IEEE Trans Broadcast"},{"key":"152_CR90","doi-asserted-by":"publisher","first-page":"12083","DOI":"10.1109\/ACCESS.2020.3047996","volume":"9","author":"M Rahouti","year":"2020","unstructured":"Rahouti M, Xiong K, Xin Y. Secure software-defined networking communication systems for smart cities: current status, challenges, and trends. IEEE Access. 2020;9:12083\u2013113. https:\/\/doi.org\/10.1109\/ACCESS.2020.3047996.","journal-title":"IEEE Access"},{"key":"152_CR91","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/j.procs.2019.04.071","volume":"151","author":"H Haddad","year":"2019","unstructured":"Haddad H, Bouyahia Z, Chaudhry SA. A multiagent geosimulation and iot-based framework for safety monitoring in complex dynamic spatial environments. Procedia Computer Sci. 2019;151:527\u201334. https:\/\/doi.org\/10.1016\/j.procs.2019.04.071.","journal-title":"Procedia Computer Sci"},{"key":"152_CR92","unstructured":"RESIDENTIAL SMART HOME AUTOMATION. KNX Technology and BEMI Automation. [Online]: https:\/\/www.bemi.fi\/knx-residential-homes\/, Last Accessed 20-09-2024"},{"key":"152_CR93","unstructured":"Y\u0131lmaz Y, Uluda\u011f S, Dilek E, Ayizen Y. A preliminary work on predicting travel times and optimal routes using istanbul\u2019s real traffic data. In: 9th Transist Transport Congress and Exhibition (2016)"},{"key":"152_CR94","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2019.106436","volume":"136","author":"J Arshad","year":"2020","unstructured":"Arshad J, Azad MA, Abdeltaif MM, Salah K. An intrusion detection framework for energy constrained iot devices. Mechanical Syst Signal Process. 2020;136: 106436. https:\/\/doi.org\/10.1016\/j.ymssp.2019.106436.","journal-title":"Mechanical Syst Signal Process"},{"issue":"2","key":"152_CR95","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.giq.2018.07.001","volume":"36","author":"BW Wirtz","year":"2019","unstructured":"Wirtz BW, Weyerer JC, Schichtel FT. An integrative public iot framework for smart government. Government Inform Quarter. 2019;36(2):333\u201345. https:\/\/doi.org\/10.1016\/j.giq.2018.07.001.","journal-title":"Government Inform Quarter"},{"key":"152_CR96","doi-asserted-by":"publisher","unstructured":"Dalipi E, Abeele F, Ishaq I, Moerman I, Hoebeke J. Ec-iot: An easy configuration framework for constrained iot devices. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, 2016. https:\/\/doi.org\/10.1109\/wf-iot.2016.7845483 .","DOI":"10.1109\/wf-iot.2016.7845483"},{"issue":"3","key":"152_CR97","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MCE.2016.2556879","volume":"5","author":"SP Mohanty","year":"2016","unstructured":"Mohanty SP, Choppali U, Kougianos E. Everything you wanted to know about smart cities: the internet of things is the backbone. IEEE Consumer Electron Magazine. 2016;5(3):60\u201370. https:\/\/doi.org\/10.1109\/MCE.2016.2556879.","journal-title":"IEEE Consumer Electron Magazine"},{"key":"152_CR98","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.future.2018.09.058","volume":"92","author":"I Yaqoob","year":"2019","unstructured":"Yaqoob I, Hashem IAT, Ahmed A, Kazmi SA, Hong CS. Internet of things forensics: recent advances, taxonomy, requirements, and open challenges. Future Generat Computer Syst. 2019;92:265\u201375. https:\/\/doi.org\/10.1016\/j.future.2018.09.058.","journal-title":"Future Generat Computer Syst"},{"key":"152_CR99","doi-asserted-by":"publisher","first-page":"137856","DOI":"10.1109\/ACCESS.2019.2943146","volume":"7","author":"C Xu","year":"2019","unstructured":"Xu C, Lin H, Wu Y, Guo X, Lin W. An sdnfv-based ddos defense technology for smart cities. IEEE Access. 2019;7:137856\u201374. https:\/\/doi.org\/10.1109\/ACCESS.2019.2943146.","journal-title":"IEEE Access"},{"issue":"3","key":"152_CR100","doi-asserted-by":"publisher","first-page":"1551","DOI":"10.1109\/TSG.2016.2593021","volume":"9","author":"H Lin","year":"2016","unstructured":"Lin H, Chen C, Wang J, Qi J, Jin D, Kalbarczyk ZT, Iyer RK. Self-healing attack-resilient pmu network for power system operation. IEEE Trans Smart Grid. 2016;9(3):1551\u201365. https:\/\/doi.org\/10.1109\/TSG.2016.2593021.","journal-title":"IEEE Trans Smart Grid"},{"key":"152_CR101","volume":"10","author":"W Iqbal","year":"2020","unstructured":"Iqbal W, Abbas H, Deng P, Wan J, Rauf B, Abbas Y, Rashid I. Alam: anonymous lightweight authentication mechanism for sdn enabled smart homes. J Netw Computer Appl. 2020;10: 103672.","journal-title":"J Netw Computer Appl"},{"key":"152_CR102","doi-asserted-by":"publisher","first-page":"49154","DOI":"10.1109\/ACCESS.2021.3068723","volume":"9","author":"S Yu","year":"2021","unstructured":"Yu S, Das AK, Park Y. Comments on \u201calam: anonymous lightweight authentication mechanism for sdn enabled smart homes\u2019\u2019. IEEE Access. 2021;9:49154\u20139. https:\/\/doi.org\/10.1109\/ACCESS.2021.3068723.","journal-title":"IEEE Access"},{"issue":"1","key":"152_CR103","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TCE.2018.2811261","volume":"64","author":"S Shirali-Shahreza","year":"2018","unstructured":"Shirali-Shahreza S, Ganjali Y. Protecting home user devices with an sdn-based firewall. IEEE Trans Consumer Electron. 2018;64(1):92\u2013100. https:\/\/doi.org\/10.1109\/TCE.2018.2811261.","journal-title":"IEEE Trans Consumer Electron"},{"key":"152_CR104","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107101","volume":"171","author":"MM Mart\u00edn-Lopo","year":"2020","unstructured":"Mart\u00edn-Lopo MM, Boal J, S\u00e1nchez-Miralles \u00c1. A literature review of iot energy platforms aimed at end users. Computer Netw. 2020;171: 107101. https:\/\/doi.org\/10.1016\/j.comnet.2020.107101.","journal-title":"Computer Netw"},{"issue":"1","key":"152_CR105","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1109\/JSAC.2019.2951966","volume":"38","author":"J Liu","year":"2019","unstructured":"Liu J, Guo H, Xiong J, Kato N, Zhang J, Zhang Y. Smart and resilient ev charging in sdn-enhanced vehicular edge computing networks. IEEE J Selected Areas Commun. 2019;38(1):217\u201328. https:\/\/doi.org\/10.1109\/JSAC.2019.2951966.","journal-title":"IEEE J Selected Areas Commun"},{"issue":"5","key":"152_CR106","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MNET.001.1800496","volume":"33","author":"K Kaur","year":"2019","unstructured":"Kaur K, Garg S, Kaddoum G, Ahmed SH, Gagnon F, Atiquzzaman M. Demand-response management using a fleet of electric vehicles: an opportunistic-sdn-based edge-cloud framework for smart grids. IEEE Netw. 2019;33(5):46\u201353. https:\/\/doi.org\/10.1109\/MNET.001.1800496.","journal-title":"IEEE Netw"},{"issue":"10","key":"152_CR107","doi-asserted-by":"publisher","first-page":"1985","DOI":"10.1109\/TKDE.2018.2809747","volume":"30","author":"D Kaur","year":"2018","unstructured":"Kaur D, Aujla GS, Kumar N, Zomaya AY, Perera C, Ranjan R. Tensor-based big data management scheme for dimensionality reduction problem in smart grid systems: Sdn perspective. IEEE Trans Knowledge Data Eng. 2018;30(10):1985\u201398. https:\/\/doi.org\/10.1109\/TKDE.2018.2809747.","journal-title":"IEEE Trans Knowledge Data Eng"},{"key":"152_CR108","doi-asserted-by":"publisher","unstructured":"Gui T, Ma C, Wang F, Wilkins DE. Survey on swarm intelligence based routing protocols for wireless sensor networks: An extensive study. In: 2016 IEEE International Conference on Industrial Technology (ICIT). IEEE, 2016. https:\/\/doi.org\/10.1109\/icit.2016.7475064 .","DOI":"10.1109\/icit.2016.7475064"},{"key":"152_CR109","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.110428","volume":"159","author":"D Sobhy","year":"2020","unstructured":"Sobhy D, Minku L, Bahsoon R, Chen T, Kazman R. Run-time evaluation of architectures: a case study of diversification in iot. J Syst Softw. 2020;159: 110428. https:\/\/doi.org\/10.1016\/j.jss.2019.110428.","journal-title":"J Syst Softw"},{"issue":"3","key":"152_CR110","doi-asserted-by":"publisher","first-page":"1610","DOI":"10.1109\/tnsm.2020.2993886","volume":"17","author":"T Cao","year":"2020","unstructured":"Cao T, Xu C, Du J, Li Y, Xiao H, Gong C, Zhong L, Niyato D. Reliable and efficient multimedia service optimization for edge computing-based 5g networks: Game theoretic approaches. IEEE Trans Netw Service Manage. 2020;17(3):1610\u201325. https:\/\/doi.org\/10.1109\/tnsm.2020.2993886.","journal-title":"IEEE Trans Netw Service Manage"},{"key":"152_CR111","unstructured":"Boral S. What Happened to Google\u2019s Brillo and Weave? iot techtrends. [Online]: https:\/\/www.iottechtrends.com\/what-happened-google-brillo-weave\/, Last Accessed 20-09-2024 2019."},{"key":"152_CR112","doi-asserted-by":"publisher","unstructured":"Vishwakarma R, Jain AK. A honeypot with machine learning based detection framework for defending iot based botnet ddos attacks. In: 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2019. https:\/\/doi.org\/10.1109\/icoei.2019.8862720.","DOI":"10.1109\/icoei.2019.8862720"},{"key":"152_CR113","unstructured":"Gargenta A. Deep dive into android ipc\/binder framework at android builder summit. Marakana Inc. [Online]: https:\/\/events.static.linuxfound.org\/images\/stories\/slides\/abs2013_gargentas.pdf, Last Accessed 20-09-2024 2013."},{"key":"152_CR114","doi-asserted-by":"publisher","unstructured":"Vakaloudis A, O\u2019Leary C. A framework for rapid integration of iot systems with industrial environments. In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT). IEEE, 2019. https:\/\/doi.org\/10.1109\/wf-iot.2019.8767224 .","DOI":"10.1109\/wf-iot.2019.8767224"},{"key":"152_CR115","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.arcontrol.2019.03.005","volume":"47","author":"K Thramboulidis","year":"2019","unstructured":"Thramboulidis K, Vachtsevanou DC, Kontou I. Cpus-iot: a cyber-physical microservice and iot-based framework for manufacturing assembly systems. Ann Rev Control. 2019;47:237\u201348. https:\/\/doi.org\/10.1016\/j.arcontrol.2019.03.005.","journal-title":"Ann Rev Control"},{"key":"152_CR116","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100140","volume":"14","author":"SK Sahil Sood","year":"2021","unstructured":"Sahil Sood SK. Smart vehicular traffic management: An edge cloud centric iot based framework. Int Things. 2021;14: 100140.","journal-title":"Int Things"},{"key":"152_CR117","doi-asserted-by":"publisher","unstructured":"Sathwara S, Dutta N, Pricop E. Iot forensic a digital investigation framework for iot systems. In: 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, 2018. https:\/\/doi.org\/10.1109\/ecai.2018.8679017.","DOI":"10.1109\/ecai.2018.8679017"},{"key":"152_CR118","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1016\/j.future.2017.09.037","volume":"79","author":"M Farhan","year":"2018","unstructured":"Farhan M, Jabbar S, Aslam M, Hammoudeh M, Ahmad M, Khalid S, Khan M, Han K. Iot-based students interaction framework using attention-scoring assessment in elearning. Future Generat Computer Syst. 2018;79:909\u201319. https:\/\/doi.org\/10.1016\/j.future.2017.09.037.","journal-title":"Future Generat Computer Syst"},{"key":"152_CR119","unstructured":"Amazon Aws IoT framework. Amazon AWS. https:\/\/aws.amazon.com\/iot\/, Last Accessed 20-09-2024 (2023)"},{"key":"152_CR120","unstructured":"Samsung SmartThings developer documentation. Samsung Electronics. https:\/\/developer-preview.smartthings.com\/docs\/getting-started\/welcome\/, Last Accessed 20-09-2024 (2023)"},{"key":"152_CR121","unstructured":"Ericsson Open source release of IoT app environment calvin. Ericsson. https:\/\/www.ericsson.com\/, Last Accessed 20-09-2024 (2023)"},{"key":"152_CR122","unstructured":"Eclipse Kura framework. Eclipse. https:\/\/www.eclipse.org\/kura\/, Last Accessed 20-09-2024 (2023)"},{"key":"152_CR123","doi-asserted-by":"publisher","unstructured":"Yelmarthi K, Abdelgawad A, Khattab A. An architectural framework for low-power iot applications. In: 2016 28th International Conference on Microelectronics (ICM). IEEE, 2016. https:\/\/doi.org\/10.1109\/icm.2016.7847893 .","DOI":"10.1109\/icm.2016.7847893"},{"key":"152_CR124","doi-asserted-by":"publisher","unstructured":"Khaled AE, Helal S. A framework for inter-thing relationships for programming the social iot. In: 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). IEEE, 2018. https:\/\/doi.org\/10.1109\/wf-iot.2018.8355215 .","DOI":"10.1109\/wf-iot.2018.8355215"},{"key":"152_CR125","doi-asserted-by":"publisher","unstructured":"Nguyen XT, Tran HT, Baraki H, Geihs K. Frasad: A framework for model-driven iot application development. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). IEEE, 2015. https:\/\/doi.org\/10.1109\/wf-iot.2015.7389085 .","DOI":"10.1109\/wf-iot.2015.7389085"},{"key":"152_CR126","doi-asserted-by":"publisher","first-page":"728","DOI":"10.1016\/j.procs.2019.08.105","volume":"155","author":"Y Han","year":"2019","unstructured":"Han Y, Park B, Jeong J. A novel architecture of air pollution measurement platform using 5g and blockchain for industrial iot applications. Procedia Computer Sci. 2019;155:728\u201333. https:\/\/doi.org\/10.1016\/j.procs.2019.08.105.","journal-title":"Procedia Computer Sci"},{"key":"152_CR127","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100076","volume":"14","author":"AS Pillai","year":"2021","unstructured":"Pillai AS, Chandraprasad GS, Khwaja AS, Anpalagan A. A service oriented iot architecture for disaster preparedness and forecasting system. Int Things. 2021;14: 100076. https:\/\/doi.org\/10.1016\/j.iot.2019.100076.","journal-title":"Int Things"},{"key":"152_CR128","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100078","volume":"7","author":"I Lee","year":"2019","unstructured":"Lee I. The internet of things for enterprises: an ecosystem, architecture, and iot service business model. Internet of Things. 2019;7: 100078. https:\/\/doi.org\/10.1016\/j.iot.2019.100078.","journal-title":"Internet of Things"},{"issue":"6","key":"152_CR129","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.ifacol.2018.07.148","volume":"51","author":"J Mocnej","year":"2018","unstructured":"Mocnej J, Seah WKG, Pekar A, Zolotova I. Decentralised iot architecture for efficient resources utilisation. IFAC-PapersOnLine. 2018;51(6):168\u201373. https:\/\/doi.org\/10.1016\/j.ifacol.2018.07.148.","journal-title":"IFAC-PapersOnLine"},{"key":"152_CR130","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.iot.2018.09.003","volume":"3\u20134","author":"A Dawoud","year":"2018","unstructured":"Dawoud A, Shahristani S, Raun C. Deep learning and software-defined networks: towards secure iot architecture. Int Things. 2018;3\u20134:82\u20139. https:\/\/doi.org\/10.1016\/j.iot.2018.09.003.","journal-title":"Int Things"},{"key":"152_CR131","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2018.07.009","volume":"121","author":"M Saadeh","year":"2018","unstructured":"Saadeh M, Sleit A, Sabri KE, Almobaideen W. Hierarchical architecture and protocol for mobile object authentication in the context of iot smart cities. J Netw Computer Appl. 2018;121:1\u201319. https:\/\/doi.org\/10.1016\/j.jnca.2018.07.009.","journal-title":"J Netw Computer Appl"},{"key":"152_CR132","doi-asserted-by":"publisher","unstructured":"Lee C, Nkenyereye L, Sung N, Song J. Towards a blockchain-enabled iot platform using onem2m standards. In: 2018 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2018. https:\/\/doi.org\/10.1109\/ictc.2018.8539724 .","DOI":"10.1109\/ictc.2018.8539724"},{"key":"152_CR133","doi-asserted-by":"publisher","unstructured":"Javed A, Heljanko K, Buda A, Framling K. Cefiot: A fault-tolerant iot architecture for edge and cloud. In: 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). IEEE, 2018. https:\/\/doi.org\/10.1109\/wf-iot.2018.8355149 .","DOI":"10.1109\/wf-iot.2018.8355149"},{"key":"152_CR134","doi-asserted-by":"publisher","unstructured":"Kum SW, Moon J, Lim T-B. Design of fog computing based iot application architecture. In: 2017 IEEE 7th International Conference on Consumer Electronics - Berlin (ICCE-Berlin). IEEE, 2017. https:\/\/doi.org\/10.1109\/icce-berlin.2017.8210598 .","DOI":"10.1109\/icce-berlin.2017.8210598"},{"key":"152_CR135","doi-asserted-by":"publisher","unstructured":"Wang S, Hou Y, Gao F, Ji X. A novel iot access architecture for vehicle monitoring system. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, 2016. https:\/\/doi.org\/10.1109\/wf-iot.2016.7845396 .","DOI":"10.1109\/wf-iot.2016.7845396"},{"issue":"3","key":"152_CR136","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.icte.2016.08.009","volume":"2","author":"H Park","year":"2016","unstructured":"Park H, Kim H, Joo H, Song J. Recent advancements in the internet-of-things related standards: a onem2m perspective. ICT Express. 2016;2(3):126\u20139. https:\/\/doi.org\/10.1016\/j.icte.2016.08.009.","journal-title":"ICT Express"},{"key":"152_CR137","doi-asserted-by":"publisher","unstructured":"Hudda S, Haribabu K, Barnwal R. A novel approach for energy-efficient communication in a constrained iot environment. In: 2024 International Conference on Information Networking (ICOIN), pp. 699\u2013704 2024. https:\/\/doi.org\/10.1109\/ICOIN59985.2024.10572211 . IEEE.","DOI":"10.1109\/ICOIN59985.2024.10572211"},{"key":"152_CR138","doi-asserted-by":"publisher","unstructured":"Hudda S, Haribabu K, Balani V. An energy efficient data transmission approach in smart iot systems. In: 2024 International Conference on Information Networking (ICOIN), pp. 740\u2013745 2024. https:\/\/doi.org\/10.1109\/ICOIN59985.2024.10572103 . IEEE.","DOI":"10.1109\/ICOIN59985.2024.10572103"},{"key":"152_CR139","doi-asserted-by":"publisher","unstructured":"Li C, Ye M, Chen G, Wu J. An energy-efficient unequal clustering mechanism for wireless sensor networks. In: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, p. 8. IEEE, 2005. https:\/\/doi.org\/10.1109\/mahss.2005.1542849 .","DOI":"10.1109\/mahss.2005.1542849"},{"key":"152_CR140","doi-asserted-by":"publisher","unstructured":"Liu P, Huang T-l, Zhou X-y, Wu G-x: An improved energy efficient unequal clustering algorithm of wireless sensor network. In: 2010 International Conference on Intelligent Computing and Integrated Systems, pp. 930\u2013933. IEEE, 2010. https:\/\/doi.org\/10.1109\/iciss.2010.5657032 .","DOI":"10.1109\/iciss.2010.5657032"},{"key":"152_CR141","doi-asserted-by":"publisher","unstructured":"Bagci H, Yazici A. An energy aware fuzzy unequal clustering algorithm for wireless sensor networks. In: International Conference on Fuzzy Systems, pp. 1\u20138. IEEE, 2010. https:\/\/doi.org\/10.1109\/FUZZY.2010.5584580 .","DOI":"10.1109\/FUZZY.2010.5584580"},{"key":"152_CR142","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1016\/j.asoc.2015.11.044","volume":"40","author":"B Baranidharan","year":"2016","unstructured":"Baranidharan B, Santhi B. Ducf: distributed load balancing unequal clustering in wireless sensor networks using fuzzy approach. Appl Soft Comput. 2016;40:495\u2013506. https:\/\/doi.org\/10.1016\/j.asoc.2015.11.044.","journal-title":"Appl Soft Comput"},{"key":"152_CR143","doi-asserted-by":"publisher","unstructured":"Zhang R, Ju L, Jia Z, Li X. Energy efficient routing algorithm for wsns via unequal clustering. In: 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems, pp. 1226\u20131231. IEEE, 2012. https:\/\/doi.org\/10.1109\/HPCC.2012.180 .","DOI":"10.1109\/HPCC.2012.180"},{"key":"152_CR144","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1007\/s11276-015-1013-1","volume":"22","author":"R Logambigai","year":"2016","unstructured":"Logambigai R, Kannan A. Fuzzy logic based unequal clustering for wireless sensor networks. Wireless Netw. 2016;22:945\u201357. https:\/\/doi.org\/10.1007\/s11276-015-1013-1.","journal-title":"Wireless Netw"},{"key":"152_CR145","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2017.03.025","volume":"88","author":"D-G Zhang","year":"2017","unstructured":"Zhang D-G, Liu S, Zhang T, Liang Z. Novel unequal clustering routing protocol considering energy balancing based on network partition & distance for mobile education. J Netw Computer Appl. 2017;88:1\u20139. https:\/\/doi.org\/10.1016\/j.jnca.2017.03.025.","journal-title":"J Netw Computer Appl"},{"issue":"3","key":"152_CR146","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1007\/s11277-018-5779-1","volume":"101","author":"J Hamidzadeh","year":"2018","unstructured":"Hamidzadeh J, Ghomanjani MH. An unequal cluster-radius approach based on node density in clustering for wireless sensor networks. Wireless Personal Commun. 2018;101(3):1619\u201337. https:\/\/doi.org\/10.1007\/s11277-018-5779-1.","journal-title":"Wireless Personal Commun"},{"key":"152_CR147","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.asoc.2016.02.019","volume":"43","author":"S Gajjar","year":"2016","unstructured":"Gajjar S, Sarkar M, Dasgupta K. Famacrow: fuzzy and ant colony optimization based combined mac, routing, and unequal clustering cross-layer protocol for wireless sensor networks. Applied Soft Comput. 2016;43:235\u201347. https:\/\/doi.org\/10.1016\/j.asoc.2016.02.019.","journal-title":"Applied Soft Comput"},{"key":"152_CR148","doi-asserted-by":"publisher","unstructured":"Heinzelman WR, Chandrakasan A, Balakrishnan H. Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, p. 10. IEEE Comput. Soc, 2000. https:\/\/doi.org\/10.1109\/hicss.2000.926982 .","DOI":"10.1109\/hicss.2000.926982"},{"issue":"3","key":"152_CR149","doi-asserted-by":"publisher","first-page":"219","DOI":"10.5614\/itbj.ict.res.appl.2018.12.3.2","volume":"12","author":"A Al-Shaikh","year":"2018","unstructured":"Al-Shaikh A, Khattab H, Al-Sharaeh S. Performance comparison of leach and leach-c protocols in wireless sensor networks. J ICT Res Appl. 2018;12(3):219\u201336. https:\/\/doi.org\/10.5614\/itbj.ict.res.appl.2018.12.3.2.","journal-title":"J ICT Res Appl"},{"key":"152_CR150","doi-asserted-by":"publisher","unstructured":"Chakraborty UK, Das SK, Abbott TE. Energy-efficient routing in hierarchical wireless sensor networks using differential-evolution-based memetic algorithm. In: 2012 IEEE Congress on Evolutionary Computation. IEEE, 2012. https:\/\/doi.org\/10.1109\/cec.2012.6252985 .","DOI":"10.1109\/cec.2012.6252985"},{"issue":"1","key":"152_CR151","first-page":"39","volume":"10","author":"K Singh","year":"2017","unstructured":"Singh K, Kaur J. Machine learning based link cost estimation for routing optimization in wireless sensor networks. Adv Wireless Mobile Commun. 2017;10(1):39\u201350.","journal-title":"Adv Wireless Mobile Commun"},{"issue":"6","key":"152_CR152","first-page":"18","volume":"19","author":"B Ali","year":"2019","unstructured":"Ali B, Mahmood T, Abbas M, Hussain M, Ullah H, Sarker A, Khan A. Leach robust routing approach applying machine learning. IJCSNS Int J Computer Sci Netw Security. 2019;19(6):18\u201326.","journal-title":"IJCSNS Int J Computer Sci Netw Security"},{"key":"152_CR153","doi-asserted-by":"publisher","unstructured":"Nehra NK, Kumar M, Patel R. Neural network based energy efficient clustering and routing in wireless sensor networks. In: 2009 First International Conference on Networks & Communications, pp. 34\u201339. IEEE, 2009. https:\/\/doi.org\/10.1109\/NetCoM.2009.56 .","DOI":"10.1109\/NetCoM.2009.56"},{"key":"152_CR154","doi-asserted-by":"publisher","unstructured":"Bin G, Zhe L, Ze-Jun W. A dynamic-cluster energy-aware routing algorithm based on neural structure in the wireless sensor networks. In: The Fifth International Conference on Computer and Information Technology (CIT\u201905), pp. 401\u2013405. IEEE, 2005. https:\/\/doi.org\/10.1109\/CIT.2005.8 .","DOI":"10.1109\/CIT.2005.8"},{"key":"152_CR155","doi-asserted-by":"publisher","unstructured":"Zhao W, Liu D, Jiang Y. Distributed neural network routing algorithm based on global information of wireless sensor network. In: 2009 WRI International Conference on Communications and Mobile Computing. IEEE, 2009. https:\/\/doi.org\/10.1109\/cmc.2009.103 .","DOI":"10.1109\/cmc.2009.103"},{"key":"152_CR156","doi-asserted-by":"publisher","unstructured":"Arabi Z. Herf: A hybrid energy efficient routing using a fuzzy method in wireless sensor networks. In: 2010 International Conference on Intelligent and Advanced Systems, pp. 1\u20136. IEEE, 2010. https:\/\/doi.org\/10.1109\/ICIAS.2010.5716145 .","DOI":"10.1109\/ICIAS.2010.5716145"},{"key":"152_CR157","doi-asserted-by":"publisher","unstructured":"Jaradat T, Benhaddou D, Balakrishnan M, Al-Fuqaha A. Energy efficient cross-layer routing protocol in wireless sensor networks based on fuzzy logic. In: 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 177\u2013182. IEEE, 2013. https:\/\/doi.org\/10.1109\/iwcmc.2013.6583555 .","DOI":"10.1109\/iwcmc.2013.6583555"},{"issue":"1","key":"152_CR158","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1228\/1\/012002","volume":"1228","author":"S Venkataramana","year":"2019","unstructured":"Venkataramana S, Sekhar BVDS, Deshai N, Chakravarthy VVSSS, Krishna Rao S. Efficient time reducing and energy saving routing algorithm for wireless sensor network. J Phys Conf Series. 2019;1228(1): 012002. https:\/\/doi.org\/10.1088\/1742-6596\/1228\/1\/012002.","journal-title":"J Phys Conf Series"},{"issue":"5","key":"152_CR159","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/tpds.2013.119","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Li Y, Ren J, Wu J. Hop-by-hop message authentication and source privacy in wireless sensor networks. IEEE Trans Parallel Distr Syst. 2014;25(5):1223\u201332. https:\/\/doi.org\/10.1109\/tpds.2013.119.","journal-title":"IEEE Trans Parallel Distr Syst"},{"issue":"2","key":"152_CR160","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1109\/TCE.2016.7514720","volume":"62","author":"S Luo","year":"2016","unstructured":"Luo S, Wu J, Li J, Guo L. A multi-stage attack mitigation mechanism for software-defined home networks. IEEE Trans Consumer Electron. 2016;62(2):200\u20137. https:\/\/doi.org\/10.1109\/TCE.2016.7514720.","journal-title":"IEEE Trans Consumer Electron"},{"key":"152_CR161","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102494","volume":"52","author":"H Lee","year":"2020","unstructured":"Lee H, Kang D, Ryu J, Won D, Kim H, Lee Y. A three-factor anonymous user authentication scheme for internet of things environments. J Inform Secur Appl. 2020;52: 102494. https:\/\/doi.org\/10.1016\/j.jisa.2020.102494.","journal-title":"J Inform Secur Appl"},{"key":"152_CR162","doi-asserted-by":"publisher","first-page":"58800","DOI":"10.1109\/access.2020.2982542","volume":"8","author":"G Ali","year":"2020","unstructured":"Ali G, Ahmad N, Cao Y, Khan S, Cruickshank H, Qazi EA, Ali A. xdbauth: Blockchain based cross domain authentication and authorization framework for internet of things. IEEE Access. 2020;8:58800\u201316. https:\/\/doi.org\/10.1109\/access.2020.2982542.","journal-title":"IEEE Access"},{"issue":"3","key":"152_CR163","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/fi12030044","volume":"12","author":"MA Ferrag","year":"2020","unstructured":"Ferrag MA, Maglaras L, Ahmim A, Derdour M, Janicke H. Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networks. Future Int. 2020;12(3):44. https:\/\/doi.org\/10.3390\/fi12030044.","journal-title":"Future Int"},{"issue":"5","key":"152_CR164","doi-asserted-by":"publisher","first-page":"9042","DOI":"10.1109\/jiot.2019.2926365","volume":"6","author":"E Anthi","year":"2019","unstructured":"Anthi E, Williams L, Slowinska M, Theodorakopoulos G, Burnap P. A supervised intrusion detection system for smart home iot devices. IEEE Int Things J. 2019;6(5):9042\u201353. https:\/\/doi.org\/10.1109\/jiot.2019.2926365.","journal-title":"IEEE Int Things J"},{"key":"152_CR165","doi-asserted-by":"publisher","unstructured":"Sforzin A, Marmol FG, Conti M, Bohli J-M. Rpids: Raspberry pi ids - a fruitful intrusion detection system for iot. In: 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld). IEEE, 2016. https:\/\/doi.org\/10.1109\/uic-atc-scalcom-cbdcom-iop-smartworld.2016.0080","DOI":"10.1109\/uic-atc-scalcom-cbdcom-iop-smartworld.2016.0080"},{"key":"152_CR166","doi-asserted-by":"publisher","unstructured":"Ahmim A, Derdour M, Ferrag MA. An intrusion detection system based on combining probability predictions of a tree of classifiers. International Journal of Communication Systems 2018;31(9). https:\/\/doi.org\/10.1002\/dac.3547","DOI":"10.1002\/dac.3547"},{"issue":"3","key":"152_CR167","doi-asserted-by":"publisher","first-page":"5224","DOI":"10.1109\/jiot.2019.2899492","volume":"6","author":"F Li","year":"2019","unstructured":"Li F, Shi Y, Shinde A, Ye J, Song W. Enhanced cyber-physical security in internet of things through energy auditing. IEEE Int Things J. 2019;6(3):5224\u201331. https:\/\/doi.org\/10.1109\/jiot.2019.2899492.","journal-title":"IEEE Int Things J"},{"issue":"1","key":"152_CR168","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/jiot.2017.2780232","volume":"5","author":"M Wazid","year":"2018","unstructured":"Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M. Design of secure user authenticated key management protocol for generic iot networks. IEEE Int Things J. 2018;5(1):269\u201382. https:\/\/doi.org\/10.1109\/jiot.2017.2780232.","journal-title":"IEEE Int Things J"},{"key":"152_CR169","doi-asserted-by":"publisher","unstructured":"Esposito C, Ficco M, Castiglione A, Palmieri F, De Santis A. Distributed group key management for event notification confidentiality among sensors. IEEE Transactions on Dependable and Secure Computing, 1\u20131 2019. https:\/\/doi.org\/10.1109\/tdsc.2018.2799227","DOI":"10.1109\/tdsc.2018.2799227"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00152-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00152-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00152-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T03:25:13Z","timestamp":1746761113000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00152-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,9]]},"references-count":169,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["152"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00152-2","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,9]]},"assertion":[{"value":"16 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"56"}}