{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:35:21Z","timestamp":1754156121081,"version":"3.41.2"},"reference-count":16,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2014,5,6]],"date-time":"2014-05-06T00:00:00Z","timestamp":1399334400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J of Systems and Info Tech"],"published-print":{"date-parts":[[2014,5,6]]},"DOI":"10.1108\/jsit-11-2013-0065","type":"journal-article","created":{"date-parts":[[2014,4,28]],"date-time":"2014-04-28T05:43:01Z","timestamp":1398663781000},"page":"113-121","source":"Crossref","is-referenced-by-count":1,"title":["Tree-based routing algorithms on wireless sensor networks: survey"],"prefix":"10.1108","volume":"16","author":[{"given":"Sunghyuck","family":"Hong","sequence":"first","affiliation":[]},{"given":"Kun-Hee","family":"Han","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"b9","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2003.09.010"},{"key":"b8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"b11","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2007.06.004"},{"key":"b20","doi-asserted-by":"crossref","unstructured":"Cuomo, F. , Della, L. , Monaco, U. and Melodia, F. (2007), \u201cRouting in ZigBee: benefits from exploiting the IEEE 802.15.4 association tree\u201d, IEEE ICC07, pp. 3271-3276.","DOI":"10.1109\/ICC.2007.542"},{"key":"b15","doi-asserted-by":"crossref","unstructured":"El-Saadawy, M. and Shaaban, E. (2012), \u201cEnhancing S-LEACH security for wireless sensor networks\u201d, 2012 IEEE International Conference on Electro\/Information Technology (EIT), 6-8 May, pp. 1-6.","DOI":"10.1109\/EIT.2012.6220698"},{"key":"b10","doi-asserted-by":"crossref","unstructured":"Hu, L. and Evans, D. (2004), \u201cLocalization for mobile sensor networks\u201d, Tenth International Conference on Mobile Computing and Networking (MobiCom'04), Philadelphia, PA, USA, September, pp. 45-57.","DOI":"10.1145\/1023720.1023726"},{"key":"b19","doi-asserted-by":"crossref","unstructured":"Karapinar, Z. , Senturk, A. , Zavrak, S. , Kara, R. and Erdogmus, P. (2012), \u201cBinary apple tree: a game approach to tree traversal algorithms\u201d, 2012 International Conference on Information Technology Based Higher Education & Training (ITHET\u2009), 21-23 June, pp. 1-3.","DOI":"10.1109\/ITHET.2012.6246026"},{"key":"b12","doi-asserted-by":"crossref","unstructured":"Kuang, X.H. , Shao, H.H. and Feng, R. (2008), \u201cA new distributed localization scheme for wireless sensor networks\u201d, Acta Automatic Sinica, Vol. 34 No. 3.","DOI":"10.3724\/SP.J.1004.2008.00344"},{"key":"b5","doi-asserted-by":"crossref","unstructured":"Lindsey, S. and Raghavendra, C.S. (2002), \u201cPEGASIS: power-efficient gathering in sensor information systems\u201d, Proceedings of the IEEE Aerospace Conference, Canada, March, pp. 1-6.","DOI":"10.1109\/AERO.2002.1035242"},{"key":"b16","unstructured":"Oliveira, L.B. , Wong, H.C. , Bern, M. , Dahab, R. and Loureiro, A.A.F. (2006), \u201cSecLEACH \u2013 a random key distribution solution for securing clustered sensor networks\u201d, Fifth IEEE International Symposium on Network Computing and Applications, NCA 2006, 24-26 July, pp. 145-154."},{"key":"b21","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2008.07.006"},{"key":"b17","doi-asserted-by":"crossref","unstructured":"Ruan, Z. , Li, Q. and Li, S. (2008), \u201cA secure routing protocol for clustered sensor networks\u201d, 4th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM'08, 12-14 October, pp. 1-4.","DOI":"10.1109\/WiCom.2008.957"},{"key":"b1","unstructured":"Shee, S.H. , Wang, K. and Hsieh, I.L. (2005), \u201cColor-theory-based dynamic localization in mobile wireless sensor networks\u201d, Proceedings of Workshop on Wireless, Ad Hoc, Sensor Networks, August."},{"key":"b13","unstructured":"Singh, M. , Lal, N. , Sethi, M. and Poonia, S. (2010), \u201cA tree based routing protocol for mobile sensor networks (MSNs)\u201d, International Journal on Computer Science and Engineering, Vol. 2 No. 1, pp. 55-60."},{"key":"b4","doi-asserted-by":"crossref","unstructured":"Zanjireh, M.M. , Shahrabi, A. and Larijani, H. (2013), \u201cANCH: a new clustering algorithm for wireless sensor networks\u201d, 2013 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 25-28 March, pp. 450-455.","DOI":"10.1109\/WAINA.2013.242"},{"key":"frd2","unstructured":"Patil, H.K. and Szygenda, S.A. (2011), \u201cIdentity based key distribution schemes using an adaptive approach in wireless sensor networks\u201d, Journal of Information Systems Technology & Planning, Vol. 4 No. 8, pp. 1-16."}],"container-title":["Journal of Systems and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/JSIT-11-2013-0065","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/JSIT-11-2013-0065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:24:06Z","timestamp":1753395846000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jsit\/article\/16\/2\/113-121\/252421"}},"subtitle":[],"editor":[{"given":"Prof.","family":"Hyejung Jang, Dr Wanbok Lee, Dr K.","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2014,5,6]]},"references-count":16,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,5,6]]}},"alternative-id":["10.1108\/JSIT-11-2013-0065"],"URL":"https:\/\/doi.org\/10.1108\/jsit-11-2013-0065","relation":{},"ISSN":["1328-7265"],"issn-type":[{"type":"print","value":"1328-7265"}],"subject":[],"published":{"date-parts":[[2014,5,6]]}}}