{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T06:02:50Z","timestamp":1740981770803,"version":"3.38.0"},"reference-count":17,"publisher":"SAGE Publications","issue":"2-3","license":[{"start":{"date-parts":[[2008,2,1]],"date-time":"2008-02-01T00:00:00Z","timestamp":1201824000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIMULATION"],"published-print":{"date-parts":[[2008,2]]},"abstract":"<jats:p> We present Fuzzy Group-Based Routing Algorithm (FGRA), a secure, energy-efficient scheme for routing in sensor networks. In this scheme, we consider the formation of multipaths for routing. Using fuzzy logic for generating decisions of forwarding or withholding packets, we show that our scheme is robust, efficient and scalable for a large number of nodes. In our scheme, routing takes place with the help of groups of nodes, which includes situations when the nodes are disconnected. We incorporate security in the design of our routing algorithm by using a mobile-agents-based approach. Our scheme is data-centric where named data packets are considered as the focal point of the system, and in this way it can be adapted for any application. We perform some simulations in NS2, and demonstrate that our scheme shows good performance results with scope for additional research. <\/jats:p>","DOI":"10.1177\/0037549708091643","type":"journal-article","created":{"date-parts":[[2008,5,22]],"date-time":"2008-05-22T14:54:05Z","timestamp":1211468045000},"page":"131-146","source":"Crossref","is-referenced-by-count":6,"title":["A Secure and Energy-Efficient Scheme for Group-Based Routing in Heterogeneous                 Ad Hoc Sensor Networks and Its Simulation Analysis"],"prefix":"10.1177","volume":"84","author":[{"given":"Chandrasekar","family":"Ramachandran","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Illinois at                         Urbana-Champaign, USA,"}]},{"given":"Mohammad S.","family":"Obaidat","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Monmouth University, NJ, USA"}]},{"given":"Sudip","family":"Misra","sequence":"additional","affiliation":[{"name":"School of Information Technology, Indian Institute of Technology,                         Kharagpur, India"}]},{"given":"Feniosky","family":"Pe\u00f1a-Mora","sequence":"additional","affiliation":[{"name":"Department of Civil and Environmental Engineering, University of Illinois                         at Urbana-Champaign, USA"}]}],"member":"179","published-online":{"date-parts":[[2008,2,1]]},"reference":[{"key":"atypb1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345920"},{"key":"atypb2","doi-asserted-by":"publisher","DOI":"10.1145\/332833.332838"},{"key":"atypb3","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926982"},{"key":"atypb4","first-page":"880","volume":"3614","author":"Zhang, R.","year":"2005","journal-title":"LNCS"},{"key":"atypb5","doi-asserted-by":"publisher","DOI":"10.1145\/509506.509514"},{"key":"atypb6","doi-asserted-by":"publisher","DOI":"10.1007\/11945918_40"},{"key":"atypb7","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2007.611"},{"volume-title":"Proceedings of IASTED International Conference on Intelligent Systems and Control (ISC'2002)","author":"Zhang, R.","key":"atypb8"},{"volume-title":"Proceedings of the Fourth International Conference on Computer and Information Technology (CIT'04)","author":"Zhang, X.","key":"atypb9"},{"volume-title":"Proceedings of International Conference on Network and Parallel Computing (NPC2004)","author":"Wu, J.","key":"atypb10"},{"volume-title":"Multiconstrained QoS multipath routing in wireless sensor networks","year":"2007","author":"Huang, X.","key":"atypb11"},{"key":"atypb12","first-page":"637","volume":"23","author":"Martyna, J.","year":"2006","journal-title":"Computational Intelligence"},{"volume-title":"Advanced Intelligent Computing Theories and Applications: With Aspects of Theoretical and Methodological Issues (Lecture Notes in Computer Science Series","author":"Kim, M.S.","key":"atypb13"},{"key":"atypb14","doi-asserted-by":"publisher","DOI":"10.1007\/11011620_21"},{"volume-title":"The network simulator ns-2, 1998. Part of the VINT project","year":"1998","author":"Berkeley, U.","key":"atypb15"},{"volume-title":"Proceedings on International Conference on Ad Hoc Networks and Wireless (Ad Hoc NOW 2005)","author":"Li, Z.","key":"atypb16"},{"volume-title":"Proceedings of 2006 IFIP International Conference on Wireless and Optical Communications Networks (WOCN)","author":"Srinivasan T.","key":"atypb17"}],"container-title":["SIMULATION"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0037549708091643","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0037549708091643","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T03:01:50Z","timestamp":1740970910000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0037549708091643"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,2]]},"references-count":17,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2008,2]]}},"alternative-id":["10.1177\/0037549708091643"],"URL":"https:\/\/doi.org\/10.1177\/0037549708091643","relation":{},"ISSN":["0037-5497","1741-3133"],"issn-type":[{"type":"print","value":"0037-5497"},{"type":"electronic","value":"1741-3133"}],"subject":[],"published":{"date-parts":[[2008,2]]}}}