{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T01:22:50Z","timestamp":1760232170900,"version":"build-2065373602"},"reference-count":67,"publisher":"MDPI AG","issue":"20","license":[{"start":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T00:00:00Z","timestamp":1666310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The Wireless Medium Access Control (WMAC) protocol functions by handling various data frames in order to forward them to neighbor sensor nodes. Under this circumstance, WMAC policies need secure data communication rules and intrusion detection procedures to safeguard the data from attackers. The existing secure Medium Access Control (MAC) policies provide expected and predictable practices against channel attackers. These security policies can be easily breached by any intelligent attacks or malicious actions. The proposed Wireless Interleaved Honeypot-Framing Model (WIHFM) newly implements distributed honeypot-based security mechanisms in each sensor node to act reactively against various attackers. The proposed WIHFM creates an optimal Wireless Sensor Network (WSN) channel model, Wireless Interleaved Honeypot Frames (WIHFs), secure hash-based random frame-interleaving principles, node-centric honeypot engines, and channel-covering techniques. Compared to various existing MAC security policies, the proposed model transforms unpredictable IHFs into legitimate frame sequences against channel attackers. Additionally, introducing WIHFs is a new-fangled approach for distributed WSNs. The successful development of the proposed WIHFM ensures resilient security standards and neighbor-based intrusion alert procedures for protecting MAC frames. Particularly, the proposed wireless honeypot methodology creates a novel idea of using honeypot frame traps against open wireless channel attacks. The development of a novel wireless honeypot traps deals with various challenges such as distributed honeypot management principles (node-centric honeypot, secretly interleaved-framing principles, and interleaving\/de-interleaving procedures), dynamic network backbone management principles (On Demand Acyclic Connectivity model), and distributed attack isolation policies. This effort provides an effective wireless attack-trapping solution in dynamic WSNs. The simulation results show the advantage of the proposed WIHFM over the existing techniques such as Secure Zebra MAC (SZ-MAC), Blockchain-Assisted Secure-Routing Mechanism (BASR), and the Trust-Based Node Evaluation (TBNE) procedure. The experimental section confirms the proposed model attains a 10% to 14% superior performance compared to the existing techniques.<\/jats:p>","DOI":"10.3390\/s22208046","type":"journal-article","created":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T10:09:23Z","timestamp":1666606163000},"page":"8046","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1747-9639","authenticated-orcid":false,"given":"Rajasoundaran","family":"Soundararajan","sequence":"first","affiliation":[{"name":"School of Computing Science and Engineering, VIT Bhopal University, Kothri Kalan 466114, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7977-4751","authenticated-orcid":false,"given":"Maheswar","family":"Rajagopal","sequence":"additional","affiliation":[{"name":"Department of ECE, Centre for IoT and AI (CITI), KPR Institute of Engineering and Technology, Coimbatore 641407, India"}]},{"given":"Akila","family":"Muthuramalingam","sequence":"additional","affiliation":[{"name":"Department of CSE, Centre for IoT and AI (CITI), KPR Institute of Engineering and Technology, Coimbatore 641407, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2332-8095","authenticated-orcid":false,"given":"Eklas","family":"Hossain","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Boise State University, Boise, ID 83725, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0862-0533","authenticated-orcid":false,"given":"Jaime","family":"Lloret","sequence":"additional","affiliation":[{"name":"Instituto de Investigacion para la Gestion Integrada de Zonas Costeras, Universitat Politecnica de Valencia, 46022 Valencia, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2022,10,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"8722","DOI":"10.3390\/s91108722","article-title":"A wireless sensor network deployment for rural and forest fire detection and verification","volume":"9","author":"Lloret","year":"2009","journal-title":"Sensors"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"103282","DOI":"10.1016\/j.jnca.2021.103282","article-title":"An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks","volume":"200","author":"Mezrag","year":"2022","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_3","unstructured":"Guimaraes, G., Souto, E., Sadok, D., and Kelner, J. (2005, January 14\u201317). Evaluation of security mechanisms in wireless sensor networks. Proceedings of the 2005 Systems Communications (ICW\u201905, ICHSN\u201905, ICMCS\u201905, SENET\u201905), Montreal, QC, Canada."},{"key":"ref_4","first-page":"31","article-title":"A comparative study of various security approaches used in wireless sensor networks","volume":"17","author":"Sharma","year":"2010","journal-title":"Int. J. Adv. Sci. Technol."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Bhushan, B., and Sahoo, G. (2020). Requirements, protocols, and security challenges in wireless sensor networks: An industrial perspective. Handbook of Computer Networks and Cyber Security, Springer.","DOI":"10.1007\/978-3-030-22277-2_27"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Majid, M., Habib, S., Javed, A.R., Rizwan, M., Srivastava, G., Gadekallu, T.R., and Lin, J.C. (2022). Applications of wireless sensor networks and internet of things frameworks in the industry revolution 4.0: A systematic literature review. Sensors, 22.","DOI":"10.3390\/s22062087"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"11538","DOI":"10.1109\/ACCESS.2022.3144015","article-title":"Energy-Aware and Trust-Based Secure Routing Protocol for Wireless Sensor Networks Using Adaptive Genetic Algorithm","volume":"10","author":"Han","year":"2022","journal-title":"IEEE Access"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1016\/j.procs.2021.02.088","article-title":"Security and application of wireless sensor network","volume":"183","author":"Zhang","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1016\/j.gltp.2021.08.045","article-title":"Wireless Sensor Networks: Active and Passive Attacks-Vulnerabilities and Countermeasures","volume":"2","author":"Keerthika","year":"2021","journal-title":"Glob. Transit. Proc."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Salau, A.O., Marriwala, N., and Athaee, M. (2021). Data security in wireless sensor networks: Attacks and countermeasures. Mobile Radio Communications and 5G Networks, Springer.","DOI":"10.1007\/978-981-15-7130-5_13"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1361","DOI":"10.1007\/s11276-021-02871-0","article-title":"Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks","volume":"28","author":"Almesaeed","year":"2022","journal-title":"Wirel. Netw."},{"key":"ref_12","first-page":"101866","article-title":"Enabling secure data transmission for wireless sensor networks based IoT applications","volume":"13","author":"Panahi","year":"2022","journal-title":"Ain Shams Eng. J."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"108212","DOI":"10.1016\/j.compeleceng.2022.108212","article-title":"Using honeypots to model botnet attacks on the internet of medical things","volume":"102","author":"Wang","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1211","DOI":"10.1007\/s10207-022-00605-7","article-title":"A decentralized honeypot for IoT Protocols based on Android devices","volume":"21","author":"Lygerou","year":"2022","journal-title":"Int. J. Inf. Secur."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"3981","DOI":"10.1002\/int.22708","article-title":"Deep reinforcement learning for building honeypots against runtime DoS attack","volume":"37","author":"Veluchamy","year":"2022","journal-title":"Int. J. Intell. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Acosta, J.C., Basak, A., Kiekintveld, C., and Kamhoua, C. (2022, January 16\u201318). Lightweight On-demand Honeypot Deployment for Cyber Deception. Proceedings of the International Conference on Digital Forensics and Cyber Crime, Boston, MA, USA.","DOI":"10.1007\/978-3-031-06365-7_18"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"100576","DOI":"10.1016\/j.rineng.2022.100576","article-title":"Early Intrusion Detection System using honeypot for industrial control networks","volume":"6","author":"Pashaei","year":"2022","journal-title":"Results Eng."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1500","DOI":"10.1109\/TC.2009.109","article-title":"Data security in unattended wireless sensor networks","volume":"58","author":"Mancini","year":"2009","journal-title":"IEEE Trans. Comput."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Yang, H., Ye, F., Yuan, Y., Lu, S., and Arbaugh, W. (2005, January 25\u201327). Toward resilient security in wireless sensor networks. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, Urbana-Champaign, IL, USA.","DOI":"10.1145\/1062689.1062696"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"56371","DOI":"10.1109\/ACCESS.2020.2981531","article-title":"Smart IoT control-based nature inspired energy efficient routing protocol for flying ad hoc network (FANET)","volume":"8","author":"Khan","year":"2020","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"26685","DOI":"10.1007\/s11042-020-10493-5","article-title":"Self-adaptive and secure mechanism for IoT based multimedia services: A survey","volume":"81","author":"Singh","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"14","DOI":"10.2174\/2666255813999200831123235","article-title":"Wireless Sensor Network in IoT and Performance Optimization","volume":"15","author":"Gupta","year":"2022","journal-title":"Recent Adv. Comput. Sci. Commun."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Bharany, S., and Sharma, S. (2022). Intelligent Green Internet of Things: An Investigation. Machine Learning, Blockchain, and Cyber Security in Smart Environments, CRC.","DOI":"10.1201\/9781003240310-1"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"093830","DOI":"10.1155\/WCN\/2006\/93830","article-title":"MAC security and security overhead analysis in the IEEE 802.15. 4 wireless sensor networks","volume":"2006","author":"Xiao","year":"2006","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_25","first-page":"65","article-title":"Securing Wireless Sensor Networks: Security Architectures","volume":"3","author":"Boyle","year":"2008","journal-title":"J. Net."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., and Wagner, D. (2004, January 3\u20135). TinySec: A link layer security architecture for wireless sensor networks. Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA.","DOI":"10.1145\/1031495.1031515"},{"key":"ref_27","first-page":"827","article-title":"A survey of MAC protocols for wireless sensor networks","volume":"4","author":"Yadav","year":"2009","journal-title":"UbiCC J."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"43","DOI":"10.2174\/2213275912666181207154754","article-title":"Source redundancy management and host intrusion detection in wireless sensor networks","volume":"14","author":"Singh","year":"2021","journal-title":"Recent Adv. Comput. Sci. Commun."},{"key":"ref_29","first-page":"100504","article-title":"Energy efficient scheme for better connectivity in sustainable mobile wireless sensor networks","volume":"30","author":"Sachan","year":"2021","journal-title":"Sustain. Comput. Inform. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.15837\/ijccc.2021.2.3935","article-title":"Sda-sm: An efficient secure data aggregation scheme using separate mac across wireless sensor networks","volume":"16","author":"Elshrkawey","year":"2021","journal-title":"Int. J. Comput. Commun. Control"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Kumar, M.J., Kumar, G.R., Krishna, P.S., and Sai, N.R. (2021, January 20\u201322). Secure and efficient data transmission for wireless sensor networks by using optimized leach protocol. Proceedings of the 2020 6th International Conference on Inventive Computation Technologies (ICICT), R.V.S. Technical Campus, Coimbatore, India.","DOI":"10.1109\/ICICT50816.2021.9358729"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"102448","DOI":"10.1016\/j.adhoc.2021.102448","article-title":"An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks","volume":"115","author":"Khashan","year":"2021","journal-title":"Ad Hoc Netw."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Almansoori, M.N., Elshamy, A.A., and Mustafa, A.A. (2022). Secure Z-MAC Protocol as a Proposed Solution for Improving Security in WSNs. Information, 13.","DOI":"10.3390\/info13030105"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Awan, S., Javaid, N., Ullah, S., Khan, A.U., Qamar, A.M., and Choi, J.G. (2022). Blockchain-Based Secure Routing and Trust Management in Wireless Sensor Networks. Sensors, 22.","DOI":"10.3390\/s22020411"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1753","DOI":"10.1007\/s11277-022-09632-y","article-title":"Secret Dynamic Key Authentication and Decision Trust Secure Routing Framework for Internet of Things Based WSN","volume":"125","author":"Meena","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1993","DOI":"10.1007\/s11277-020-07776-3","article-title":"Denial-of-service attacks on wireless sensor network and defense techniques","volume":"116","author":"Islam","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"2525","DOI":"10.1007\/s11277-020-07809-x","article-title":"Improved model for the stability analysis of wireless sensor network against malware attacks","volume":"116","author":"Ojha","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Bartwal, U., Mukhopadhyay, S., Negi, R., and Shukla, S. (2022). Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots. arXiv.","DOI":"10.1109\/DSC54232.2022.9888808"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"24095","DOI":"10.1109\/ACCESS.2022.3151967","article-title":"Wireless Transmissions, Propagation and Channel Modelling for IoT Technologies: Applications and Challenges","volume":"10","author":"Alobaidy","year":"2022","journal-title":"IEEE Access"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1227","DOI":"10.1166\/jctn.2020.8794","article-title":"Control messages overhead impact on destination-oriented directed acyclic graph\u2014A wireless sensor networks objective functions performance comparison","volume":"17","author":"Onwuegbuzie","year":"2020","journal-title":"J. Comput. Theor. Nanosci."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1186\/s13638-020-01884-1","article-title":"MSCR: Multidimensional secure clustered routing scheme in hierarchical wireless sensor networks","volume":"2021","author":"Fang","year":"2021","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"8239","DOI":"10.1149\/10701.8239ecst","article-title":"Lightweight Secure Key Distribution Protocol (LSKDP) for Wireless Sensor Networks","volume":"107","author":"Roja","year":"2022","journal-title":"ECS Trans."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"156813","DOI":"10.1007\/s11704-021-9460-6","article-title":"Privacy-preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks","volume":"15","author":"Shah","year":"2021","journal-title":"Front. Comput. Sci."},{"key":"ref_44","unstructured":"Castelletti, F., and Peluso, S. (2022). Network structure learning under uncertain interventions. J. Am. Stat. Assoc., 1\u201312."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Alrahhal, H., Jamous, R., Ramadan, R., Alayba, A.M., and Yadav, K. (2022). Utilising Acknowledge for the Trust in Wireless Sensor Networks. Appl. Sci., 12.","DOI":"10.3390\/app12042045"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"3646","DOI":"10.1007\/s11227-021-04001-1","article-title":"An intelligent fault detection approach based on reinforcement learning system in wireless sensor network","volume":"78","author":"Mahmood","year":"2022","journal-title":"J. Supercomput."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.comcom.2022.02.004","article-title":"Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks","volume":"187","author":"Rajasoundaran","year":"2022","journal-title":"Comput. Commun."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Parre\u00f1o, I.F., and Avila, D.F. (2022). Analysis of the Cybersecurity in Wireless Sensor Networks (WSN): A Review Literature. Dev. Adv. Def. Secur., 83\u2013102.","DOI":"10.1007\/978-981-16-4884-7_8"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"991","DOI":"10.1007\/s11276-022-02903-3","article-title":"Robust encryption method based on AES-CBC using elliptic curves Diffie\u2013Hellman to secure data in wireless sensor networks","volume":"28","author":"Ametepe","year":"2022","journal-title":"Wirel. Netw."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Cort\u00e9s-Leal, A., Del-Valle-Soto, C., Cardenas, C., Valdivia, L.J., and Del Puerto-Flores, J.A. (2021). Performance Metric Analysis for a Jamming Detection Mechanism under Collaborative and Cooperative Schemes in Industrial Wireless Sensor Networks. Sensors, 22.","DOI":"10.3390\/s22010178"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"3053","DOI":"10.1007\/s11277-021-09040-8","article-title":"FBDR-Fuzzy based DDoS attack Detection and Recovery mechanism for wireless sensor networks","volume":"122","author":"Pajila","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Ramisetty, S., Anand, D., Verma, S., and Alaboudi, A.A. (2022). SC-MCHMP: Score-Based Cluster Level Hybrid Multi-Channel MAC Protocol for Wireless Sensor Network. Information Security Handbook, CRC Press.","DOI":"10.1201\/9780367808228-1"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1007\/s12652-021-02946-y","article-title":"Machine learning based hybrid model for energy-efficient secured transmission in wireless sensor networks","volume":"13","author":"Suryaprabha","year":"2022","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"e6886","DOI":"10.1002\/cpe.6886","article-title":"Cooperative and feedback based authentic routing protocol for energy-efficient IoT systems","volume":"34","author":"Gayathri","year":"2022","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"8708","DOI":"10.1007\/s11227-021-04175-8","article-title":"Provably secure blockchain privacy-preserving smart contract centric dynamic group key agreement for large WSN","volume":"78","author":"Naresh","year":"2022","journal-title":"J. Supercomput."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"1305","DOI":"10.1007\/s11277-021-08950-x","article-title":"Intelligent ad-hocon-demand multipath distance vector for wormhole attack in clustered WSN","volume":"122","author":"Singh","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"103353","DOI":"10.1016\/j.jnca.2022.103353","article-title":"SEEDGT: Secure and energy-efficient data gathering technique for IoT applications based WSNs","volume":"202","author":"Salim","year":"2022","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Barani Sundaram, B., Kedir, T., Mishra, M.K., Yesuf, S.H., Tiwari, S.M., and Karthika, P. (2022). Security analysis for Sybil attack in sensor network using compare and match-position verification method. Mobile Computing and Sustainable Informatics, Springer.","DOI":"10.1007\/978-981-16-1866-6_4"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"4513","DOI":"10.1007\/s11276-021-02748-2","article-title":"Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks","volume":"27","author":"Rajasoundaran","year":"2021","journal-title":"Wirel. Netw."},{"key":"ref_60","first-page":"4921","article-title":"Machine learning approaches to detect DoS and their effect on WSNs lifetime","volume":"70","author":"Wazirali","year":"2021","journal-title":"CMC Comput. Mat. Contin."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1016\/j.egyr.2022.02.061","article-title":"Design of a secure and efficient authentication protocol for real-time accesses of multiple users in PIoT-oriented multi-gateway WSNs","volume":"8","author":"Yang","year":"2022","journal-title":"Energy Rep."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Anwar, A.H., and Kamhoua, C.A. (2022, January 8\u201311). Cyber Deception using Honeypot Allocation and Diversity: A Game Theoretic Approach. Proceedings of the 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC49033.2022.9700616"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"4448","DOI":"10.1007\/s12274-022-4109-9","article-title":"A flexible and stretchable bionic true random number generator","volume":"15","author":"Wan","year":"2022","journal-title":"Nano Res."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1109\/TPDS.2012.168","article-title":"A secure protocol for spontaneous wireless ad hoc networks creation","volume":"24","author":"Lacuesta","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"5531923","DOI":"10.1155\/2021\/5531923","article-title":"A Spontaneous Wireless Ad Hoc Trusted Neighbor Network Creation Protocol","volume":"2021","author":"Sorribes","year":"2021","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"4297","DOI":"10.1007\/s11276-018-01932-1","article-title":"Smart integrated IoT healthcare system for cancer care","volume":"27","author":"Onasanya","year":"2021","journal-title":"Wirel. Netw."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"3125","DOI":"10.1007\/s11277-021-08866-6","article-title":"Cross-layer protocol for WSN-assisted IoT smart farming applications using nature inspired algorithm","volume":"121","author":"Mahajan","year":"2021","journal-title":"Wirel. Pers. Commun."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/20\/8046\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:58:49Z","timestamp":1760144329000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/20\/8046"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,21]]},"references-count":67,"journal-issue":{"issue":"20","published-online":{"date-parts":[[2022,10]]}},"alternative-id":["s22208046"],"URL":"https:\/\/doi.org\/10.3390\/s22208046","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2022,10,21]]}}}