{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:00:11Z","timestamp":1770228011303,"version":"3.49.0"},"reference-count":41,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.32604\/iasc.2023.030278","type":"journal-article","created":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T02:42:18Z","timestamp":1658198538000},"page":"2337-2351","source":"Crossref","is-referenced-by-count":20,"title":["Secure and Energy Concise Route Revamp Technique in Wireless Sensor Networks"],"prefix":"10.32604","volume":"35","author":[{"given":"S.","family":"M. Udhaya Sankar","sequence":"first","affiliation":[]},{"given":"Mary","family":"Subaja Christo","sequence":"additional","affiliation":[]},{"given":"P.","family":"S. Uma Priyadarsini","sequence":"additional","affiliation":[]}],"member":"17807","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"76699","DOI":"10.1109\/ACCESS.2019.2921999","article-title":"Logical tree based secure rekeying management for smart devices groups in IoT enabled WSN","volume":"7","author":"Mughal","year":"2019","journal-title":"IEEE Access"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.future.2015.12.001","article-title":"Personalized and professionalized medical recommendations based on hybrid matrix factorization","volume":"66","author":"Zhang","year":"2017","journal-title":"Future Generation Computer Systems"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1550","DOI":"10.1109\/JIOT.2018.2792423","article-title":"Connecting intelligent things in smart hospitals using NB-IoT","volume":"5","author":"Zhang","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"2177","DOI":"10.1109\/TIM.2018.2814082","article-title":"Monitoring of large-area IoT sensors using a LoRa wireless mesh network system: Design and evaluation","volume":"67","author":"Lee","year":"2018","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.adhoc.2019.101923","article-title":"Uneven clustering routing algorithm based on glowworm swarm optimization","volume":"93","author":"Xiuwu","year":"2019","journal-title":"Ad Hoc Networks"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"7333","DOI":"10.1007\/s11227-020-03166-5","article-title":"Deployment techniques in wireless sensor networks: A survey, classification, challenges, and future research issues","volume":"76","author":"Priyadarshi","year":"2020","journal-title":"The Journal of Supercomputing"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1761","DOI":"10.1109\/JSEN.2017.2788014","article-title":"CR-SDVN: A cognitive routing protocol for software-defined vehicular networks","volume":"18","author":"Ghafoor","year":"2018","journal-title":"IEEE Sensors Journal"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1016\/j.scs.2018.02.017","article-title":"A clustering based routing algorithm in IoT aware wireless mesh networks","volume":"40","author":"Li","year":"2018","journal-title":"Sustainable Cities and Society"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"3557","DOI":"10.1007\/s11277-017-4012-y","article-title":"Energy efficient clustering algorithm using RFD based multi-hop communication in wireless sensor networks","volume":"95","author":"Guravaiah","year":"2017","journal-title":"Wireless Personal Communication"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1109\/LCOMM.2017.2751601","article-title":"Data drainage: A novel load balancing strategy for wireless sensor networks","volume":"22","author":"Liu","year":"2018","journal-title":"IEEE Communication Letter"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.compeleceng.2018.03.018","article-title":"Hybrid energy-efficient multi-path routing for wireless sensor networks","volume":"67","author":"Sajwan","year":"2018","journal-title":"Computers & Electrical Engineering"},{"key":"ref12","series-title":"IEEE Conference on Information and Communication Technology","first-page":"1","article-title":"REHR: Residual energy based hybrid routing protocol for wireless sensor networks","author":"Panchal","year":"2019"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.ijin.2020.05.005","article-title":"SDARP: Security based data aware routing protocol for ad hoc sensor networks","volume":"1","author":"Vinoth Kumar","year":"2020","journal-title":"International Journal of Intelligent Networks"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"4011","DOI":"10.1007\/s11276-020-02299-y","article-title":"CrowWhale-ETR: CrowWhale optimization algorithm for energy and trust aware multicast routing in WSN for IoT applications","volume":"26","author":"Shende","year":"2020","journal-title":"Wireless Networks"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"4227","DOI":"10.1007\/s11276-020-02336-w","article-title":"Glowworm swarm optimization for effectual load balancing and routing strategies in wireless sensor networks","volume":"26","author":"Sampathkumar","year":"2020","journal-title":"Wireless Networks"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"67","DOI":"10.4018\/IJALR.2018070104","article-title":"T-Whale: Trust and whale optimization model for secure routing in mobile Ad-Hoc network","volume":"8","author":"Mohan","year":"2018","journal-title":"International Journal of Artificial Life Research"},{"key":"ref17","first-page":"1","article-title":"M-LionWhale: Multi-objective optimization model for secure routing in mobile Ad-hoc network","volume":"12","author":"Ram","year":"2018","journal-title":"IET Communications"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1049\/iet-com.2016.0859","article-title":"EACO and FABC to multi-path data transmission in wireless sensor networks","volume":"11","author":"Kumar","year":"2017","journal-title":"IET Communications"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2016\/5836913","article-title":"Hybrid swarm intelligence energy efficient clustered routing algorithm for wireless sensor networks","volume":"2016","author":"Kumar","year":"2016","journal-title":"Journal of Sensors"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.engappai.2014.04.009","article-title":"Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach","volume":"33","author":"Kuila","year":"2014","journal-title":"Engineering Applications Artificial Intelligence"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2017\/8946576","article-title":"VCH-ECCR: A centralized routing protocol for wireless sensor networks","volume":"2017","author":"Pachlor","year":"2017","journal-title":"Journal of Sensor"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"261","DOI":"10.13044\/j.sdewes.d6.0244","article-title":"Optimization methods for energy consumption estimation in wireless sensor networks","volume":"7","author":"Srbinovska","year":"2019","journal-title":"Journal of Sustainable Development of Energy, Water and Environment Systems"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"728","DOI":"10.3390\/en13030728","article-title":"Wireless sensor network energy model and its use in the optimization of routing protocols","volume":"13","author":"Del-Valle-Soto","year":"2020","journal-title":"Energies"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"5132","DOI":"10.1109\/JIOT.2019.2897119","article-title":"Residual energy-based cluster-head selection in WSNs for IoT application","volume":"6","author":"Behera","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"2150063","DOI":"10.1142\/S0218126621500638","article-title":"EADCR: Energy aware distance based cluster head selection and routing protocol for wireless sensor networks","volume":"30","author":"Panchal","year":"2021","journal-title":"Journal of Circuits, Systems, and Computers"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"170019","DOI":"10.1109\/ACCESS.2019.2955993","article-title":"Energy-efficient routing in WSN: A centralized cluster-based approach via grey wolf optimizer","volume":"7","author":"Daneshvar","year":"2019","journal-title":"IEEE Access"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"93","DOI":"10.22247\/ijcna\/2020\/196041","article-title":"Taylor based grey wolf optimization algorithm (TGWOA) for energy aware secure routing protocol","volume":"7","author":"Rahim","year":"2020","journal-title":"International Journal of Computer Networks and Applications"},{"key":"ref28","first-page":"1","article-title":"RCER: Reliable cluster-based energy-aware routing protocol for heterogeneous wireless sensor networks","volume":"14","author":"Haseeb","year":"2019","journal-title":"PLoS One"},{"key":"ref29","first-page":"23702","article-title":"SPEC- serial property based encryption for cloud","volume":"8","author":"Partheeban","year":"2016","journal-title":"International Journal of Pharmacy & Technology"},{"key":"ref30","first-page":"23598","article-title":"NUITECH \u2013 natural user interface technique formulating computer hardware","volume":"8","author":"Sudharson","year":"2016","journal-title":"International Journal of Pharmacy & Technology"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1007\/978-981-16-5640-8_34","article-title":"Ensuring privacy of data and mined results of data possessor in collaborative ARM","volume":"317","author":"Dhinakaran","year":"2022","journal-title":"Pervasive Computing and Social Networking: Lecture Notes in Networks and Systems"},{"key":"ref32","first-page":"1","article-title":"DEFECT: Discover and eradicate fool around node in emergency network using combinatorial techniques","volume":"10","author":"Arun","year":"2020","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"ref33","first-page":"508","article-title":"A survey on ATTACK \u2013 anti terrorism technique for adhoc using clustering and knowledge extraction","volume":"85","author":"Sudharson","year":"2012","journal-title":"Advances in Computer Science and Information Technology. Computer Science and Engineering. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"1304","DOI":"10.46719\/dsa20213086","article-title":"Performance optimization using heuristic approach in opportunistic WSR","volume":"30","author":"Abins","year":"2021","journal-title":"Dynamic Systems and Applications"},{"key":"ref35","first-page":"1882","article-title":"Energy aware detection and prevention of packet drop attack in wireless and mobile adhoc networks by packet drop battling mechanism","volume":"11","author":"Kowshika","year":"2020","journal-title":"International Journal of Advanced Research in Engineering and Technology"},{"key":"ref36","first-page":"205","article-title":"ID based adaptive-key signcryption for data security in cloud environment","volume":"11","author":"Sujithra","year":"2020","journal-title":"International Journal of Advanced Research in Engineering and Technology"},{"key":"ref37","first-page":"77","article-title":"An enhanced method to detect and prevent wormhole attach in m commerce","volume":"16","author":"Udhaya Sankar","year":"2017","journal-title":"Asian Journal of Information Technology"},{"key":"ref38","first-page":"2039","article-title":"JIGSPASSZLE: A novel jigsaw based password system using mouse drag dynamics","volume":"21","author":"Udhaya Sankar","year":"2014","journal-title":"Middle-East Journal of Scientific Research"},{"key":"ref39","first-page":"513","article-title":"Identity based attack detection and manifold adversaries localization in wireless networks","volume":"67","author":"Udhaya Sankar","year":"2014","journal-title":"Journal of Theoretical and Applied Information technology"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"3549","DOI":"10.32604\/cmc.2021.021627","article-title":"A multi-feature learning model with enhanced local attention for vehicle re-identification","volume":"69","author":"Sun","year":"2021","journal-title":"Computers, Materials and Continua"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"29","DOI":"10.32604\/jnm.2021.018383","article-title":"Design of network cascade structure for image super-resolution","volume":"3","author":"Zhang","year":"2021","journal-title":"Journal of New Media"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/ueditor\/files\/iasc\/TSP_IASC-35-2\/TSP_IASC_30278\/TSP_IASC_30278.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T21:30:39Z","timestamp":1733520639000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/iasc\/v35n2\/48934"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":41,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.32604\/iasc.2023.030278","relation":{},"ISSN":["1079-8587"],"issn-type":[{"value":"1079-8587","type":"print"}],"subject":[],"published":{"date-parts":[[2023]]}}}