{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T15:32:37Z","timestamp":1772206357595,"version":"3.50.1"},"reference-count":339,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"EU ECSEL Joint Undertaking","award":["737459"],"award-info":[{"award-number":["737459"]}]},{"DOI":"10.13039\/501100005416","name":"Norges Forskningsr\u00e5d","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005416","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/tnsm.2020.3035315","type":"journal-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T21:06:05Z","timestamp":1604351165000},"page":"2242-2274","source":"Crossref","is-referenced-by-count":145,"title":["A Survey and Future Directions on Clustering: From WSNs to IoT and Modern Networking Paradigms"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5065-9968","authenticated-orcid":false,"given":"Amin","family":"Shahraki","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1672-054X","authenticated-orcid":false,"given":"Amir","family":"Taherkordi","sequence":"additional","affiliation":[]},{"given":"Oystein","family":"Haugen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7788-4137","authenticated-orcid":false,"given":"Frank","family":"Eliassen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2902811"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8376948"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2883629"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487447"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1007\/s12626-017-0004-3"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.3390\/s18040961"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.103770"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.10.002"},{"key":"ref272","doi-asserted-by":"crossref","first-page":"958","DOI":"10.1007\/s40565-018-0418-0","article-title":"Blockchain: A secure, decentralized, trusted cyber infrastructure solution for future energy systems","volume":"6","author":"zhaoyang","year":"2018","journal-title":"J Mod Power Syst Clean Energy"},{"key":"ref172","first-page":"154","article-title":"Building IoT nodes&#x2014;A flexible approach","author":"manurkar","year":"2018","journal-title":"Proc 17th ACM\/IEEE Int Conf Inf Process Sensor Netw"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2017.03.004"},{"key":"ref174","first-page":"1020","article-title":"On WSN heterogeneity in IoT and CPSs","author":"y?ld?r?m","year":"2017","journal-title":"Proc IEEE Int Conf Comput Sci Eng (UBMK)"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.01.010"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019700"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2013.6488034"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4945152"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2414-7_29"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.08.012"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911190"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/WIMESH.2006.288625"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2014.06.108"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85693-1_20"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2709942"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389057"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-015-0463-7"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700487"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.06.003"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-018-0620-8"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.02.091"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2925023"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2512322"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.70774"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2018.8548322"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2017.8384164"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-019-01339-5"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00043"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2017.8001421"},{"key":"ref283","author":"amiri","year":"2019","journal-title":"SHARPER Sharding permissioned blockchains over network clusters"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2394371"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-01916-1"},{"key":"ref281","first-page":"173","article-title":"Towards an Optimized BlockChain for IoT","author":"ali dorri","year":"2017","journal-title":"2017 IEEE\/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref185","first-page":"17","article-title":"IoT: Machine to machine (M2M), device to device (D2D) Internet of Everything (IoE) and human to human (H2H): Future of communication","volume":"2","author":"kalyani","year":"2015","journal-title":"J Manag Eng Inf Technol"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-017-0020-0"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7565271"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.03.018"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNET.2008.4787686"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600492CM"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40009-4_2"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2065791"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SM2C.2017.8071827"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30143-9_17"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.35444\/IJANA.2018.10031"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.86"},{"key":"ref20","first-page":"1","article-title":"FLOC: A fast local clustering service for wireless sensor networks","author":"demirbas","year":"2004","journal-title":"Proc Int Conf Broadband Networks (Broadnets)"},{"key":"ref22","first-page":"570","article-title":"A survey of energy-efficient hierarchical cluster-based routing in wireless sensor networks","volume":"2","author":"singh","year":"2010","journal-title":"Int J Adv Netw Appl"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2666082"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IEEEGCC.2015.7060048"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.08.021"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700879"},{"key":"ref26","author":"evans","year":"2011","journal-title":"The Internet of Things How the next Evolution of the Internet Is Changing Everything"},{"key":"ref279","author":"dorri","year":"2017","journal-title":"LSB A lightweight scalable blockchain for IoT security and privacy"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2611524"},{"key":"ref293","year":"2012","journal-title":"Software-Defined Networking The New Norm for Networks"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0659-4"},{"key":"ref292","article-title":"The P2POOL mining pool","author":"chesterman","year":"2018"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.05.008"},{"key":"ref295","year":"2012","journal-title":"Network Function Virtualization"},{"key":"ref294","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref297","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0174715"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1109\/MedHocNet.2017.8001651"},{"key":"ref299","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO.2016.7785005"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.3390\/fi11030075"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1947-9"},{"key":"ref153","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/s11276-016-1270-7","article-title":"Energy efficient clustering algorithms for wireless sensor networks: Novel chemical reaction optimization approach","volume":"23","author":"rao","year":"2017","journal-title":"Wireless Netw"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0365-5"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.02.001"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2017.01.007"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.046"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.11.017"},{"key":"ref290","first-page":"1409","article-title":"SmartPool: Practical decentralized pooled mining","author":"luu","year":"2017","journal-title":"Proc 26th USENIX Security Symp"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.08.004"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1206-2"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3024"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-016-0218-7"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-016-9379-7"},{"key":"ref289","first-page":"529","article-title":"The blockchain and increasing cooperative efficacy","volume":"22","author":"sutter","year":"2018","journal-title":"Independent Review"},{"key":"ref59","first-page":"838","article-title":"A heterogeneous routing protocol based on a new stable clustering scheme","volume":"2","author":"xu","year":"2002","journal-title":"Proc IEEE MILCOM"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2002.1036066"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1002\/nem.415"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916296"},{"key":"ref55","first-page":"1","article-title":"An algorithm for group formation in an amorphous computer","author":"nagpal","year":"1998","journal-title":"Proc 10th Int Conf Parallel Distrib Comput Syst"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/49.622910"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1981.1094909"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-006-9199-2"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.12989\/sss.2010.6.5_6.619"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2893912"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894002"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-1154-z"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5716-3"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2018.2851300"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2710050"},{"key":"ref161","doi-asserted-by":"crossref","first-page":"642","DOI":"10.1016\/j.compeleceng.2017.10.007","article-title":"An energy efficient clustering scheme using multilevel routing for wireless sensor network","volume":"69","author":"muthukumaran","year":"2018","journal-title":"Comput Elect Eng"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.09.015"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSST.2018.8632191"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2803740"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2298837"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2272099"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2783079"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.3390\/s18092899"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2853148"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2714638"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3448"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2812727"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4983-8"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2017.8071994"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2615643"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.23919\/SpliTech.2019.8783016"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3924"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2009.5195872"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2009.5384789"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.05.024"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3390\/s8021099"},{"key":"ref320","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736745"},{"key":"ref321","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736752"},{"key":"ref73","first-page":"1","article-title":"A distributed weighted clustering algorithm for mobile ad hoc networks","author":"choi","year":"2006","journal-title":"Proc IEEE Adv Int Conf Telecommun Int Conf Internet Web Appl Services (AICT-ICIW)"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-006-9039-4"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.986"},{"key":"ref70","first-page":"99","article-title":"An energy efficient clustering scheme in wireless sensor networks","volume":"3","author":"meng","year":"2007","journal-title":"Ad Hoc Sensor Wireless Netw"},{"key":"ref318","doi-asserted-by":"publisher","DOI":"10.1109\/MWSYM.2014.6848639"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.502"},{"key":"ref317","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2725519"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77690-1_14"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.1201\/9780429489204-5"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2007.358351"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4647-8"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2007.06003"},{"key":"ref314","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2646120"},{"key":"ref313","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2018.01.005"},{"key":"ref312","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2461602"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2008.19"},{"key":"ref311","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2779844"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2008.26"},{"key":"ref319","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.09.010"},{"key":"ref310","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/978-3-030-30143-9_17","article-title":"A clustering-based approach to efficient resource allocation in fog computing","author":"shooshtarian","year":"2019","journal-title":"Pervasive Systems Algorithms and Networks"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2002.1016600"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209194"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(03)00354-2"},{"key":"ref305","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2015.7146129"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24606-0_11"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5093"},{"key":"ref64","first-page":"251","article-title":"SEP: A stable election protocol for clustered heterogeneous wireless sensor networks","author":"smaragdakis","year":"2004","journal-title":"Proc 2nd Int Workshop SANPA"},{"key":"ref307","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2856776"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/11502593_25"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2017.7980678"},{"key":"ref66","first-page":"498","article-title":"Attribute-based clustering for information dissemination in wireless sensor networks","author":"ke","year":"2005","journal-title":"Proc 2nd Annu IEEE Commun Soc Conf Sensor Ad Hoc Commun Netw (SECON)"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2618788"},{"key":"ref67","first-page":"1","article-title":"Prolonging the lifetime of wireless sensor networks via unequal clustering","author":"soro","year":"2005","journal-title":"Proc 19th IEEE Int Parallel Distrib Process Symp"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2015.52"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4753-x"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2016.7457098"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1404592"},{"key":"ref302","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2870294"},{"key":"ref309","doi-asserted-by":"crossref","first-page":"1461","DOI":"10.1109\/TII.2014.2306331","article-title":"A distributed consensus algorithm for decision making in service-oriented Internet of Things","volume":"10","author":"li","year":"2014","journal-title":"IEEE Trans Ind Informat"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.1109\/W-FiCloud.2016.36"},{"key":"ref197","first-page":"1241","article-title":"A cluster head replacement based on threshold in the Internet of Things","volume":"9","author":"kim","year":"2014","journal-title":"J Korean Inst Comm Sci"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.07.009"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2797885"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1608-7"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2016.03.003"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.3390\/app9010132"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.10.005"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2009.0164"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.06.001"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2015.2446475"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.887"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4190-8"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1155\/2010\/679205"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.5120\/21058-3710"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-008-0146-x"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2009.5067486"},{"key":"ref336","doi-asserted-by":"publisher","DOI":"10.3390\/s17071574"},{"key":"ref335","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78139-6_35"},{"key":"ref334","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2015.7390494"},{"key":"ref333","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2569824"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2010.2056916"},{"key":"ref339","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2571730"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-009-9842-9"},{"key":"ref338","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2404435"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2010.5584580"},{"key":"ref337","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2621041"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2011.5766870"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/CCCM.2008.99"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.10.005"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/WCSN.2008.4772672"},{"key":"ref83","first-page":"2715","article-title":"An energy-efficient distributed unequal clustering protocol for wireless sensor networks","volume":"2","author":"zhu","year":"2008","journal-title":"Eng Technol"},{"key":"ref330","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2016912582"},{"key":"ref331","article-title":"Vehicle-to-vehicle communications: readiness of v2v technology for application","author":"harding","year":"2014"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1080\/17445760801930948"},{"key":"ref332","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2016.7523498"},{"key":"ref323","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2843719"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2010.5580988"},{"key":"ref322","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2787460"},{"key":"ref325","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2773633"},{"key":"ref324","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2018.2792198"},{"key":"ref327","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2264633"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2009.28.38"},{"key":"ref326","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6815892"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-007-0035-8"},{"key":"ref329","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1500670CM"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.3390\/s91210513"},{"key":"ref328","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2012.6477852"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.32"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2005.1558418"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/202145"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2011.5723134"},{"key":"ref209","first-page":"43","article-title":"A survey on load balancing schemes in RPL based Internet of Things","volume":"6","author":"sebastian","year":"2018","journal-title":"Int J Sci Res Netw Secur Commun"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.04.021"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2017.8108146"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.3390\/s16010009"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3953-9_27"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2910881"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600397CM"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2726902"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2751617"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-019-02950-0"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2018.02.017"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06209-0"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/4250746"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1145\/3230876.3230880"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2017.8108123"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.013"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102538"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2965796"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6883-7"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2018.00038"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2882781"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1741-0"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389104"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.05.007"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-13705-2_25"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2739188"},{"key":"ref225","first-page":"225","article-title":"Load balanced efficient routing technique for mobility based RPL","author":"sneha","year":"2017","journal-title":"Proc Int Conf Smart Trends Inf Technol Comput Commun"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1145\/3123878.3132008"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/DSDIS.2015.117"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2424452"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2411598"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2416208"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.01.012"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-015-0399-x"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2014.07.019"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/s11047-015-9491-8"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2015.12.015"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1013-1"},{"key":"ref131","first-page":"372","article-title":"Cluster-based energy-efficient transmission using a new hybrid compressed sensing in WSN","author":"liu","year":"2016","journal-title":"Proc IEEE Conf Comput Commun Workshops (INFOCOM WKSHPS)"},{"key":"ref132","first-page":"47","article-title":"PKF-ST: A communication cost reduction scheme using spatial and temporal correlation for wireless sensor networks","author":"huang","year":"2016","journal-title":"Proc EWSN"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2017.8031528"},{"key":"ref233","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1109\/TII.2014.2306782","article-title":"QoS-aware scheduling of services-oriented Internet of Things","volume":"10","author":"li","year":"2014","journal-title":"IEEE Trans Ind Informat"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02807-7"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2016.12.005"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.03.018"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2465292"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2018.8390757"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19157-2_7"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3106070"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2017.12.012"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1077-y"},{"key":"ref135","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1016\/j.asoc.2015.11.044","article-title":"DUCF: Distributed load balancing unequal clustering in wireless sensor networks using fuzzy approach","volume":"40","author":"balakrishnan","year":"2016","journal-title":"Appl Soft Comput J"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2016.02.016"},{"key":"ref137","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1007\/s11276-016-1270-7","article-title":"Novel chemical reaction optimization based unequal clustering and routing algorithms for wireless sensor networks","volume":"23","author":"rao","year":"2017","journal-title":"Wireless Netw"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-3137-0"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/s10776-016-0304-5"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2965-2"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2472970"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2490162"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2584538"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3283"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1270-7"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4963-z"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1186\/2193-1801-3-493"},{"key":"ref243","first-page":"103","article-title":"CEEC: Centralized energy efficient clustering a new routing protocol for WSNs","author":"shah","year":"2012","journal-title":"Proc 9th Annu IEEE Commun Soc Conf Sensor Mesh Ad Hoc Commun Netw (SECON)"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.043"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2847036"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896250"},{"key":"ref247","first-page":"228","article-title":"Qos strategies for wireless multimedia sensor networks in the context of IoT","author":"bernard","year":"2018","journal-title":"Proc Int Conf e-Infrastruct e-Services Develop Countries"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/VITAE.2013.6617062"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1016\/j.fcij.2018.02.003"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50758-3_7"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2012.2204737"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.04.004"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2011.11.017"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.06.013"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1049\/iet-wss.2010.0084"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.885"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.08.029"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/s11768-011-0232-y"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1280"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2012.6233907"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.01.231"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/INCIT.2017.8257870"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.86"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.012"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.05.013"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.07.211"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841993"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9628565"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2008.130"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2556011"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS.2018.8398690"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2018.2837907"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34952-2_4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926982"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2004.41"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2001.925197"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2128-1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.09.005"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2013.34"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/s120811113"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2012.2225423"},{"key":"ref18","first-page":"304","article-title":"A survey on unequal clustering protocols in Wireless Sensor Networks","volume":"31","author":"arjunan","year":"2017","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2726014"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.06.127"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.10.006"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-012-0356-4"},{"key":"ref116","first-page":"23349","article-title":"Modified load-balanced clustering algorithm with distributed self-organization for wireless sensor networks","volume":"8","author":"begum","year":"2016","journal-title":"Int J Pharm Tech"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2249659"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.06.125"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.09.005"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/2766330.2766333"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.08.064"},{"key":"ref260","article-title":"Method and apparatus for IoT device clustering","author":"ghosh","year":"2017"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1201\/EBK1439819197"},{"key":"ref262","first-page":"55","article-title":"Analysis of security mechanisms based on clusters IoT environments","volume":"4","author":"garc\u00eda","year":"2017","journal-title":"Int J Artif Intell Interact Multimedia"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1109\/CQR.2018.8445985"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1145\/3209582.3209590"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1489-x"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2016.7794904"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9450206\/09246553.pdf?arnumber=9246553","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:41Z","timestamp":1652194361000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9246553\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":339,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2020.3035315","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6]]}}}