{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T22:13:45Z","timestamp":1772576025801,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T00:00:00Z","timestamp":1671148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,16]]},"DOI":"10.1145\/3584376.3584610","type":"proceedings-article","created":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T22:54:51Z","timestamp":1681944891000},"page":"1327-1331","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Safety intelligent relay node selection algorithm based on EH-WSN"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1171-7122","authenticated-orcid":false,"given":"Jixuan","family":"Wu","sequence":"first","affiliation":[{"name":"School of Electronic and Information Engineering, Lanzhou Jiaotong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0328-0445","authenticated-orcid":false,"given":"Cuiran","family":"Li","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Lanzhou Jiaotong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2709-9261","authenticated-orcid":false,"given":"Jianli","family":"Xie","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Lanzhou Jiaotong University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2022.103275"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2022.08.009"},{"issue":"12","key":"e_1_3_2_1_3_1","first-page":"98","article-title":"Jing, An identity authentication and key agreement scheme for wireless sensor network[J]","volume":"27","author":"Wang B.","year":"2017","unstructured":"Wang , B. Kang , D . Jing, An identity authentication and key agreement scheme for wireless sensor network[J] . Comput. Technol. , 2017 , 27 ( 12 ): 98 - 102 . Wang, B. Kang, D. Jing, An identity authentication and key agreement scheme for wireless sensor network[J]. Comput. Technol., 2017,27(12):98-102.","journal-title":"Comput. Technol."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.07.001"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2020.02.005"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07421-z"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07288-0"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2320505"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.12.014"},{"key":"e_1_3_2_1_10_1","volume-title":"Energy-efficient communication protocol for wireless microsensor networks[C]\/\/Proceedings of the 33rd annual Hawaii international conference on system sciences","author":"Heinzelman W R","year":"2000","unstructured":"Heinzelman W R , Chandrakasan A , Balakrishnan H. Energy-efficient communication protocol for wireless microsensor networks[C]\/\/Proceedings of the 33rd annual Hawaii international conference on system sciences . IEEE , 2000 : 10 pp. vol. 2. Heinzelman W R, Chandrakasan A, Balakrishnan H. Energy-efficient communication protocol for wireless microsensor networks[C]\/\/Proceedings of the 33rd annual Hawaii international conference on system sciences. IEEE, 2000: 10 pp. vol. 2."},{"issue":"9","key":"e_1_3_2_1_11_1","first-page":"2691","article-title":"Clustering algorithm of energy harvesting wireless sensor network based on fuzzy control[J]","volume":"40","author":"Runyan LI","year":"2020","unstructured":"HU Runyan , LI Cuiran . Clustering algorithm of energy harvesting wireless sensor network based on fuzzy control[J] . Journal of Computer Applications , 2020 , 40 ( 9 ): 2691 - 2697 . HU Runyan, LI Cuiran. Clustering algorithm of energy harvesting wireless sensor network based on fuzzy control[J]. Journal of Computer Applications, 2020, 40(9): 2691-2697.","journal-title":"Journal of Computer Applications"},{"issue":"10","key":"e_1_3_2_1_12_1","first-page":"60","article-title":"Research on wireless sensor cyber security routing mechanism based on trust perception [J]","volume":"38","author":"Qin Danyang","year":"2017","unstructured":"Qin Danyang , Jia Shuang, Yang Songxiang , Ma Jingya, Zhang Yan , Ding Qun . Research on wireless sensor cyber security routing mechanism based on trust perception [J] . Chinese Journal of Communications , 2017 , 38 ( 10 ): 60 - 70 . Qin Danyang, Jia Shuang, Yang Songxiang, Ma Jingya, Zhang Yan, Ding Qun. Research on wireless sensor cyber security routing mechanism based on trust perception [J]. Chinese Journal of Communications, 2017,38(10):60-70.","journal-title":"Chinese Journal of Communications"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2018.2817219"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2570740"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2919681"}],"event":{"name":"RICAI 2022: 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence","location":"Dongguan China","acronym":"RICAI 2022"},"container-title":["Proceedings of the 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3584376.3584610","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3584376.3584610","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:58Z","timestamp":1750268998000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3584376.3584610"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,16]]},"references-count":15,"alternative-id":["10.1145\/3584376.3584610","10.1145\/3584376"],"URL":"https:\/\/doi.org\/10.1145\/3584376.3584610","relation":{},"subject":[],"published":{"date-parts":[[2022,12,16]]},"assertion":[{"value":"2023-04-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}