{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:35:17Z","timestamp":1765888517396,"version":"3.37.3"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T00:00:00Z","timestamp":1611273600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T00:00:00Z","timestamp":1611273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["51874300"],"award-info":[{"award-number":["51874300"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>For hierarchical wireless sensor network (WSN), the clustered routing protocol can effectively deal with large-scale application requirements, thereby, how to efficiently elect the secure cluster heads becomes very critical. Unfortunately, many current studies only focus on improving security while neglecting energy efficiency and transmission performance. In this paper, a lightweight trust management scheme (LTMS) is proposed based on binomial distribution for defending against the internal attacks. Simultaneously, distance domain, energy domain, security domain and environment domain are considered and introduced to propose a multidimensional secure clustered routing (MSCR) scheme by using dynamic dimension weight in hierarchical WSNs. The simulation results show that LTMS can effectively prevent a malicious node from being elected as a cluster head, and MSCR can achieve a balance between security, transmission performance and energy efficiency under the requirements of environmental applications.<\/jats:p>","DOI":"10.1186\/s13638-020-01884-1","type":"journal-article","created":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T13:06:05Z","timestamp":1611320765000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["MSCR: multidimensional secure clustered routing scheme in hierarchical wireless sensor networks"],"prefix":"10.1186","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9139-2892","authenticated-orcid":false,"given":"Weidong","family":"Fang","sequence":"first","affiliation":[]},{"given":"Wuxiong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yepeng","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Yinxuan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,22]]},"reference":[{"key":"1884_CR1","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1186\/s13638-019-1511-4","volume":"2019","author":"H Cheng","year":"2019","unstructured":"H. Cheng, Z. Xie, L. Wu, Z. Yu, R. Li, Data prediction model in wireless sensor networks based on bidirectional LSTM. J. Wirel. Commun. Netw. 2019, 203 (2019). https:\/\/doi.org\/10.1186\/s13638-019-1511-4","journal-title":"J. Wirel. Commun. Netw."},{"key":"1884_CR2","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1186\/s13638-019-1481-6","volume":"2019","author":"N Liu","year":"2019","unstructured":"N. Liu, J. Pan, T. Nguyen, A bi-population quasi-affine transformation evolution algorithm for global optimization and its application to dynamic deployment in wireless sensor networks. J Wirel. Commun. Netw. 2019, 175 (2019). https:\/\/doi.org\/10.1186\/s13638-019-1481-6","journal-title":"J Wirel. Commun. Netw."},{"key":"1884_CR3","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1186\/s13638-018-1069-6","volume":"2018","author":"H Cheng","year":"2018","unstructured":"H. Cheng, D. Feng, X. Shi, C. Chen, Data quality analysis and cleaning strategy for wireless sensor networks. J Wirel. Commun. Netw. 2018, 61 (2018). https:\/\/doi.org\/10.1186\/s13638-018-1069-6","journal-title":"J Wirel. Commun. Netw."},{"key":"1884_CR4","doi-asserted-by":"publisher","first-page":"78406","DOI":"10.1109\/ACCESS.2019.2896226","volume":"7","author":"W Guo","year":"2019","unstructured":"W. Guo, W. Zhu, Z. Yu, J. Wang, B. Guo, A survey of task allocation: contrastive perspectives from wireless sensor networks and mobile crowdsensing. IEEE Access 7, 78406\u201378420 (2019)","journal-title":"IEEE Access"},{"key":"1884_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TII.2020.3006137","volume":"1","author":"W Fang","year":"2020","unstructured":"W. Fang, N. Cui, W. Chen, W. Zhang, Y. Chen, A trust-based security system for data collecting in smart city. IEEE Trans. Ind. Inf. 1, 1 (2020). https:\/\/doi.org\/10.1109\/TII.2020.3006137","journal-title":"IEEE Trans. Ind. Inf."},{"key":"1884_CR6","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/j.ins.2015.09.039","volume":"329","author":"H Cheng","year":"2016","unstructured":"H. Cheng, Z. Su, N. Xiong, Y. Xiao, Energy-efficient node scheduling algorithms for wireless sensor networks using Markov random field model. Inf. Sci. 329, 461\u2013477 (2016). https:\/\/doi.org\/10.1016\/j.ins.2015.09.039","journal-title":"Inf. Sci."},{"key":"1884_CR7","doi-asserted-by":"publisher","first-page":"32755","DOI":"10.1007\/s11042-018-7009-y","volume":"78","author":"X Zheng","year":"2019","unstructured":"X. Zheng, W. Zheng, Y. Yang, W. Guo, V. Chang, Clustering based interest prediction in social networks. Multimed. Tools Appl. 78, 32755\u201332774 (2019). https:\/\/doi.org\/10.1007\/s11042-018-7009-y","journal-title":"Multimed. Tools Appl."},{"issue":"7","key":"1884_CR8","doi-asserted-by":"publisher","first-page":"1374","DOI":"10.1587\/transinf.2018EDP7299","volume":"E102.D","author":"C-H Chen","year":"2019","unstructured":"C.-H. Chen, F.-J. Hwang, H.-Y. Kung, Travel time prediction system based on data clustering for waste collection vehicles. IEICE Trans. Inf. Syst. E102.D(7), 1374\u20131383 (2019). https:\/\/doi.org\/10.1587\/transinf.2018EDP7299","journal-title":"IEICE Trans. Inf. Syst."},{"key":"1884_CR9","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.cageo.2019.01.005","volume":"124","author":"X Wu","year":"2019","unstructured":"X. Wu, X. Zhang, An efficient pixel clustering-based method for mining spatial sequential patterns from serial remote sensing images. Comput. Geosci. 124, 128\u2013139 (2019). https:\/\/doi.org\/10.1016\/j.cageo.2019.01.005","journal-title":"Comput. Geosci."},{"key":"1884_CR10","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s00500-018-3280-0","volume":"23","author":"Z He","year":"2019","unstructured":"Z. He, C. Yu, Clustering stability-based evolutionary K-means. Soft Comput. 23, 305\u2013321 (2019). https:\/\/doi.org\/10.1007\/s00500-018-3280-0","journal-title":"Soft Comput."},{"key":"1884_CR11","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1155\/2018\/9434239","volume":"2018","author":"X Liao","year":"2018","unstructured":"X. Liao, L. Zhang, J. Wei, D. Yang, G. Chen, Recommending mobile microblog users via a tensor factorization based on user cluster approach. Wirel. Commun. Mobile Comput. 2018, 11 (2018). https:\/\/doi.org\/10.1155\/2018\/9434239","journal-title":"Wirel. Commun. Mobile Comput."},{"key":"1884_CR12","unstructured":"W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient communication protocol for wireless micro-sensor networks, in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS \u201900), January 2000."},{"issue":"4","key":"1884_CR13","doi-asserted-by":"publisher","first-page":"2506","DOI":"10.1109\/JIOT.2017.2764259","volume":"5","author":"Z Ning","year":"2018","unstructured":"Z. Ning, X. Hu, Z. Chen et al., A cooperative quality aware service access system for social internet of vehicles. IEEE Int. Things J. 5(4), 2506\u20132517 (2018)","journal-title":"IEEE Int. Things J."},{"issue":"2","key":"1884_CR14","doi-asserted-by":"publisher","first-page":"810","DOI":"10.1109\/TII.2016.2635081","volume":"13","author":"Z Ning","year":"2017","unstructured":"Z. Ning, F. Xia, X. Hu et al., Social-oriented adaptive transmission in opportunistic internet of smartphones. IEEE Trans. Ind. Inf. 13(2), 810\u2013820 (2017)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"4","key":"1884_CR15","doi-asserted-by":"publisher","first-page":"3406","DOI":"10.1109\/TVT.2016.2593051","volume":"66","author":"Z Ning","year":"2017","unstructured":"Z. Ning, L. Liu, F. Xia et al., CAIS: A Copy Adjustable incentive scheme in community-based socially-aware networking. IEEE Trans. Veh. Technol. 66(4), 3406\u20133419 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"1884_CR16","doi-asserted-by":"publisher","first-page":"1314","DOI":"10.1109\/COMST.2018.2882064","volume":"21","author":"X Wang","year":"2019","unstructured":"X. Wang, Z. Ning, M. Zhou et al., Privacy-preserving content dissemination for vehicular social networks: challenges and solutions. IEEE Commun. Surv. Tutor. 21(2), 1314\u20131345 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"1884_CR17","doi-asserted-by":"publisher","first-page":"040305","DOI":"10.1007\/s11432-016-9028-0","volume":"60","author":"W Fang","year":"2017","unstructured":"W. Fang, W. Zhang, Y. Yang, Y. Liu, W. Chen, A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution. Sci. China Inf. Sci. 60(4), 040305 (2017)","journal-title":"Sci. China Inf. Sci."},{"issue":"1","key":"1884_CR18","first-page":"84","volume":"59","author":"W Fang","year":"2016","unstructured":"W. Fang, C. Zhang, Z. Shi, Q. Zhao, L. Shan, BTRES: beta-based trust and reputation evaluation system for wireless sensor networks. J. Netw. Comput. Appl. 59(1), 84\u201392 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"1884_CR19","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.1109\/TPDS.2014.2317719","volume":"26","author":"Y Chae","year":"2015","unstructured":"Y. Chae, L.C. DiPippo, Y.L. Sun, Trust management for defending on-off attacks. IEEE Trans. Parallel Distrib. Syst. 26(4), 1178\u20131191 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"7","key":"1884_CR20","doi-asserted-by":"publisher","first-page":"1409","DOI":"10.1109\/TMC.2013.22","volume":"13","author":"Y Ren","year":"2014","unstructured":"Y. Ren, V.I. Zadorozhny, V.A. Oleshchuk, F.Y. Li, A novel approach to trust management in unattended wireless sensor networks. IEEE Trans. Mob. Comput. 13(7), 1409\u20131423 (2014)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"1884_CR21","unstructured":"S.A. Hussain, I. Raza, M.M. Mehdi, A cluster based energy efficient trust management mechanism for medical wireless sensor networks (MWSNs), in 2018 5th International Conference on Electrical and Electronic Engineering (ICEEE), Istanbul (2018), pp. 433\u2013439"},{"key":"1884_CR22","unstructured":"N. Labraoui, A reliable trust management scheme in wireless sensor networks, in 2015 12th International Symposium on Programming and Systems (ISPS), Algiers (2015), pp. 1\u20136."},{"key":"1884_CR23","unstructured":"F. Fang, J. Li, J. Li. A reputation management scheme based on multi-factor in WSNs, in Proceedings 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), Shengyang (2013), pp. 3843\u20133848"},{"key":"1884_CR24","unstructured":"N. Zhou, W. Fang, W. Zhang, X. Lv, J. Huang, A novel trust management scheme for defending against on-off attack based on gaussian distribution, in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada (2018), pp. 1806\u20131811."},{"issue":"4","key":"1884_CR25","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1049\/iet-net.2017.0021","volume":"6","author":"AM Kowshalya","year":"2017","unstructured":"A.M. Kowshalya, M.L. Valarmathi, Trust management for reliable decision making among social objects in the Social Internet of Things. IET Netw. 6(4), 75\u201380 (2017)","journal-title":"IET Netw."},{"key":"1884_CR26","doi-asserted-by":"publisher","first-page":"43679","DOI":"10.1109\/ACCESS.2019.2905550","volume":"7","author":"X Wu","year":"2019","unstructured":"X. Wu, J. Huang, J. Ling, L. Shu, BLTM: beta and LQI based trust model for wireless sensor networks. IEEE Access 7, 43679\u201343690 (2019)","journal-title":"IEEE Access"},{"issue":"11","key":"1884_CR27","doi-asserted-by":"publisher","first-page":"11239","DOI":"10.1109\/TVT.2019.2939179","volume":"68","author":"G Han","year":"2019","unstructured":"G. Han, Y. He, J. Jiang, N. Wang, M. Guizani, J.A. Ansere, A synergetic trust model based on SVM in underwater acoustic sensor networks. IEEE Trans. Veh. Technol. 68(11), 11239\u201311247 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1884_CR28","unstructured":"W. Fang, C. Zhu, W. Chen, W. Zhang, J.J.P.C. Rodrigues, BDTMS: binomial distribution-based trust management scheme for healthcare-oriented wireless sensor network, in 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol (2018), pp. 382\u2013387."},{"key":"1884_CR29","unstructured":"Ouafaa, E. Mustapha, K. Salah-ddine, E.H. Said, A new secure solution for clustering in wireless sensors networks based on LEACH, in 2017 International Conference on Engineering and Technology (ICET), Antalya (2017), pp. 1\u20135."},{"key":"1884_CR30","unstructured":"J. Barad, B. Kadhiwala. DIST-LEACH: a deterministic key management scheme for securing cluster-based sensor networks. in 2014 International Conference on Advances in Engineering & Technology Research (ICAETR-2014), Unnao (2014), pp. 1\u20135."},{"key":"1884_CR31","unstructured":"H.B. Patel, D.C. Jinwala, E-LEACH: improving the LEACH protocol for privacy preservation in secure data aggregation in Wireless Sensor Networks, in 2014 9th International Conference on Industrial and Information Systems (ICIIS), Gwalior (2014), pp. 1\u20135."},{"key":"1884_CR32","unstructured":"R.K. Kodali, S.K. Gundabathula, L. Boppana, Multi level secure LEACH protocol model using NS-3, in 2014 First International Conference on Networks & Soft Computing (ICNSC2014), Guntur (2014), pp. 198\u2013202."},{"key":"1884_CR33","unstructured":"F. Mezrag, S. Bitam, A. Mellouk. Secure routing in cluster-based wireless sensor networks, in GLOBECOM 2017\u20142017 IEEE Global Communications Conference, Singapore (2017), pp. 1\u20136."},{"key":"1884_CR34","unstructured":"M. El_Saadawy, E. Shaaban, Enhancing S-LEACH security for wireless sensor networks, in 2012 IEEE International Conference on Electro\/Information Technology, Indianapolis, IN (2012), pp. 1\u20136."},{"key":"1884_CR35","unstructured":"Y. Zhang, L. Wei, Improving the LEACH protocol for wireless sensor networks, in IET International Conference on Wireless Sensor Network 2010 (IET-WSN 2010), Beijing (2010), pp. 355\u2013359."},{"key":"1884_CR36","unstructured":"J. Wang, G. Yang, S. Chen, Y. Sun, Secure LEACH routing protocol based on low-power cluster-head selection algorithm for wireless sensor networks, in 2007 International Symposium on Intelligent Signal Processing and Communication Systems, Xiamen (2007), pp. 341\u2013344"},{"issue":"6","key":"1884_CR37","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1049\/iet-wss.2018.5216","volume":"9","author":"L Zhou","year":"2019","unstructured":"L. Zhou, Y. Fang, Q. Wei, Y. Jin, Z. Hu, LEACH-TLC: a strategy of reducing and uniform energy consumption based on target location constraint. IET Wirel. Sens. Syst. 9(6), 347\u2013357 (2019)","journal-title":"IET Wirel. Sens. Syst."},{"key":"1884_CR38","unstructured":"K. Amirthalingam, Anuratha, Improved LEACH: a modified LEACH for wireless sensor network, in IEEE International Conference on Advances in Computer Applications (ICACA), Coimbatore (2016), pp. 255\u2013258."},{"issue":"5","key":"1884_CR39","first-page":"703","volume":"28","author":"W Fang","year":"2015","unstructured":"W. Fang, L. Zhang, Z. Shi, Y. Sun, L. Shan, Binomial-based trust management system in wireless sensor networks. Chin. J. Sens. Actuators 28(5), 703\u2013708 (2015)","journal-title":"Chin. J. Sens. Actuators"},{"issue":"1","key":"1884_CR40","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1109\/JSEN.2015.2472970","volume":"16","author":"P Nayak","year":"2016","unstructured":"P. Nayak, A. Devulapalli, A fuzzy logic-based clustering algorithm for WSN to extend the network lifetime. IEEE Sens. J. 16(1), 137\u2013144 (2016)","journal-title":"IEEE Sens. J."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01884-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-020-01884-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01884-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T13:21:07Z","timestamp":1611321667000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-020-01884-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,22]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["1884"],"URL":"https:\/\/doi.org\/10.1186\/s13638-020-01884-1","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2021,1,22]]},"assertion":[{"value":"31 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Not applicable.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"14"}}