{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T12:40:02Z","timestamp":1749559202677,"version":"3.41.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,8,23]],"date-time":"2016-08-23T00:00:00Z","timestamp":1471910400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["61170169, 61170168"],"award-info":[{"award-number":["61170169, 61170168"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0692-3","type":"journal-article","created":{"date-parts":[[2016,8,23]],"date-time":"2016-08-23T12:43:26Z","timestamp":1471956206000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A security fault-tolerant routing for multi-layer non-uniform clustered WSNs"],"prefix":"10.1186","volume":"2016","author":[{"given":"Zhengwang","family":"Ye","sequence":"first","affiliation":[]},{"given":"Tao","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiaoying","family":"Song","sequence":"additional","affiliation":[]},{"given":"Chongguo","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,23]]},"reference":[{"issue":"3","key":"692_CR1","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.adhoc.2003.09.010","volume":"3","author":"K Akkaya","year":"2005","unstructured":"K Akkaya, M Younis, A survey of routing protocols in wireless sensor networks. Elsevier Ad Hoc Network 3(3), 325\u2013349 (2005)","journal-title":"Elsevier Ad Hoc Network"},{"issue":"2","key":"692_CR2","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s10922-007-9062-0","volume":"15","author":"L Paradis","year":"2007","unstructured":"L Paradis, Q Han, A survey of fault management in wireless sensor networks. J Network & Syst Manage 15(2), 171\u2013190 (2007)","journal-title":"J Network & Syst Manage"},{"issue":"4","key":"692_CR3","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1016\/j.jnca.2010.02.003","volume":"33","author":"Y Yang","year":"2010","unstructured":"Y Yang, C Zhong, Y Sun et al., Network coding based reliable disjoint and braided multipath routing for sensor networks. J Network & Comput Appl 33(4), 422\u2013432 (2010)","journal-title":"J Network & Comput Appl"},{"issue":"4","key":"692_CR4","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"WB Heinzelman","year":"2002","unstructured":"WB Heinzelman, AP Chandrakasan, H Balakrishnan, An application-specific protocol architecture for wireless micro sensor networks. IEEE Trans Wirel Commun 1(4), 660\u2013670 (2002)","journal-title":"IEEE Trans Wirel Commun"},{"issue":"6","key":"692_CR5","doi-asserted-by":"publisher","first-page":"1515","DOI":"10.1007\/s11276-014-0691-4","volume":"20","author":"A Salim","year":"2014","unstructured":"A Salim, W Osamy, AM Khedr, IBLEACH: intra-balanced LEACH protocol for wireless sensor networks. Wirel Netw 20(6), 1515\u20131525 (2014)","journal-title":"Wirel Netw"},{"issue":"14","key":"692_CR6","first-page":"28","volume":"37","author":"Q Zhang","year":"2011","unstructured":"Q Zhang, Q-l Chai, Unequal scaled clustering routing for WSN based on redundancy of cluster headers. Comput Eng 37(14), 28\u201330 (2011)","journal-title":"Comput Eng"},{"key":"692_CR7","doi-asserted-by":"crossref","unstructured":"B Gong, L Li, S Wang et al., Multihop routing protocol with unequal clustering for wireless sensor networks [C]\/\/2008 ISECS International Colloquium on Computing. Communication, Control, and Management, IEEE, 552\u2013556 (2008)","DOI":"10.1109\/CCCM.2008.99"},{"issue":"4","key":"692_CR8","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1016\/j.asoc.2012.12.029","volume":"13","author":"H Bagci","year":"2013","unstructured":"H Bagci, A Yazici, An energy aware fuzzy approach to unequal clustering in wireless sensor networks. Appl Soft Comput 13(4), 1741\u20131749 (2013)","journal-title":"Appl Soft Comput"},{"key":"692_CR9","first-page":"654","volume-title":"CHEF: cluster head election mechanism using fuzzy logic in wireless sensor networks","author":"JM Kim","year":"2008","unstructured":"JM Kim, SH Park, YJ Han, TM Chung, CHEF: cluster head election mechanism using fuzzy logic in wireless sensor networks (Proceedings of International Conference on Advanced Communication Technology, Dublin, 2008), pp. 654\u2013659"},{"key":"692_CR10","doi-asserted-by":"crossref","unstructured":"H Liu, A Nayak, I Stojmenovi\u0107, Fault-tolerant algorithms\/protocols in wireless sensor networks [M]\/\/In Guide to Wireless Sensor Networks, Springer: London, UK, 2009, pp. 261\u2013291","DOI":"10.1007\/978-1-84882-218-4_10"},{"key":"692_CR11","doi-asserted-by":"crossref","unstructured":"H Alwan, A Agarwal, A survey on fault tolerant routing techniques in wireless sensor networks [C]\/\/Proceedings of International Conference on Sensor Technologies and Applications, 2009 (Sensorcomm. IEEE, 2009), IEEE, pp. 366\u2013371","DOI":"10.1109\/SENSORCOMM.2009.62"},{"key":"692_CR12","first-page":"12","volume":"2012","author":"N Sun","year":"2012","unstructured":"N Sun, Y Cho, S Lee, Node classification based on functionality in energy-efficient and reliable wireless sensor networks. Int J Distributed Sensor Networks 2012, 12 (2012)","journal-title":"Int J Distributed Sensor Networks"},{"issue":"11","key":"692_CR13","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MCOM.2011.6069710","volume":"49","author":"A Gluhak","year":"2011","unstructured":"A Gluhak, S Krco, M Nati et al., A survey on facilities for experimental internet of things research. IEEE Commun Mag 49(11), 58\u201367 (2011)","journal-title":"IEEE Commun Mag"},{"key":"692_CR14","doi-asserted-by":"crossref","unstructured":"C Intanagonwiwat, R Govindan, D Estrin, Directed diffusion: a scalable and robust communication paradigm for sensor networks [C]\/\/Proceedings of\u00a0International conference on mobile computing and networking, 2000, ACM, pp. 56\u201367","DOI":"10.1145\/345910.345920"},{"issue":"1","key":"692_CR15","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s11276-014-0782-2","volume":"21","author":"M Azharuddin","year":"2014","unstructured":"M Azharuddin, PK Jana, A distributed algorithm for energy efficient and fault tolerant routing in wireless sensor networks. Wirel Netw 21(1), 251\u2013267 (2014)","journal-title":"Wirel Netw"},{"issue":"4","key":"692_CR16","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1016\/j.jpdc.2005.12.007","volume":"66","author":"A Boukerche","year":"2006","unstructured":"A Boukerche, RWN Pazzi, RB Araujo, Fault-tolerant wireless sensor network routing protocols for the supervision of context-aware physical environments. J Parallel & Distributed Computing 66(4), 586\u2013599 (2006)","journal-title":"J Parallel & Distributed Computing"},{"key":"692_CR17","first-page":"150","volume":"6","author":"H Li","year":"2012","unstructured":"H Li, P Gao, Q Xiong et al., A vascular-network-based nonuniform hierarchical fault-tolerant routing algorithm for wireless sensor networks [J]. Int J Distributed Sensor Networks 6, 150\u2013160 (2012)","journal-title":"Int J Distributed Sensor Networks"},{"issue":"2","key":"692_CR18","first-page":"446","volume":"37","author":"J Su","year":"2014","unstructured":"J Su, W Guo, C Yu et al., Fault-tolerance clustering algorithm with load- balance aware in wireless sensor networks. Chin J Comput 37(2), 446\u2013456 (2014)","journal-title":"Chin J Comput"},{"key":"692_CR19","doi-asserted-by":"publisher","unstructured":"Z. Xu et al, Crowdsourcing based social media data analysis of urban emergency events. Multimedia Tools and Applications. doi: 10.1007\/s11042-015-2731-1 .","DOI":"10.1007\/s11042-015-2731-1"},{"key":"692_CR20","doi-asserted-by":"publisher","unstructured":"Z. Xu et al, Crowdsourcing based description of urban emergency events using social media big data (IEEE Transactions on Cloud Computing). doi: 10.1109\/TCC.2016.2517638 .","DOI":"10.1109\/TCC.2016.2517638"},{"key":"692_CR21","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1186\/s13638-016-0553-0","volume":"2016","author":"Z Xu","year":"2016","unstructured":"Z Xu, H Zhang, V Sugumaran, KR Choo, L Mei, Y Zhu, Participatory sensing-based semantic and spatial analysis of urban emergency events using mobile social media. EURASIP J Wireless Comm and Networking 2016, 44 (2016)","journal-title":"EURASIP J Wireless Comm and Networking"},{"issue":"2","key":"692_CR22","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.entcs.2007.12.022","volume":"197","author":"J Cordasco","year":"2008","unstructured":"J Cordasco, S Wetzel, J Cordasco et al., Cryptographic versus trust-based methods for MANET routing security. Electronic Notes in Theoretical Computer Science 197(2), 131\u2013140 (2008)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"692_CR23","doi-asserted-by":"crossref","unstructured":"K Bairaktaris, I Chatzigiannakis, V Liagkou et al., Adaptive probabilistic secure routing in mobile wireless sensor networks [C]\/\/Proceedings of\u00a0International Conference on Software, Telecommunications and Computer Networks (IEEE, 2008), IEEE, pp. 208\u2013212","DOI":"10.1109\/SOFTCOM.2008.4669481"},{"issue":"3","key":"692_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijasuc.2010.1301","volume":"1","author":"M Momani","year":"2010","unstructured":"M Momani, S Challa, Survey of trust models in different network domains. Int J Ad Hoc Sensor & Ubiquitous Computing 1(3), 1\u201319 (2010)","journal-title":"Int J Ad Hoc Sensor & Ubiquitous Computing"},{"issue":"3","key":"692_CR25","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1016\/j.jcss.2013.06.014","volume":"80","author":"G Han","year":"2014","unstructured":"G Han, J Jiang, L Shu et al., Management and applications of trust in wireless sensor networks: a survey. J Comput Syst Sci 80(3), 602\u2013617 (2014)","journal-title":"J Comput Syst Sci"},{"issue":"2","key":"692_CR26","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1002\/ett.2674","volume":"26","author":"F Ishmanov","year":"2015","unstructured":"F Ishmanov, AS Malik, SW Kim et al., Trust management system in wireless sensor networks: design considerations and research challenges. Trans Emerging Telecommunications Technologies 26(2), 107\u2013130 (2015)","journal-title":"Trans Emerging Telecommunications Technologies"},{"issue":"1","key":"692_CR27","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s11235-015-0068-8","volume":"61","author":"A Ahmed","year":"2016","unstructured":"A Ahmed, KA Bakar, MI Channa et al., A trust aware routing protocol for energy constrained wireless sensor network. Telecommun Syst 61(1), 123\u2013140 (2016)","journal-title":"Telecommun Syst"},{"key":"692_CR28","doi-asserted-by":"crossref","unstructured":"NA Torghabeh, MRA Totonchi, MHY Moghaddam, Cluster head selection using a two-level fuzzy logic in wireless sensor networks [C] (Proceedings of\u00a0International Conference on Computer Engineering and Technology, 2010), IEEE, pp. V2-357\u2013V2-361","DOI":"10.1109\/ICCET.2010.5485483"},{"key":"692_CR29","doi-asserted-by":"crossref","unstructured":"AK Mishra, R Kumar, J Singh, A novel cluster head selection scheme using fuzzy logic in wireless sensor networks [C]\/\/Proceedings of\u00a0International Conference on Green Computing and Internet of Things (IEEE, 2015), IEEE, pp. 203\u2013208","DOI":"10.1109\/ICGCIoT.2015.7380458"},{"issue":"15","key":"692_CR30","first-page":"6241","volume":"8","author":"R Feng","year":"2012","unstructured":"R Feng, S Che, X Wang, A credible cluster-head election algorithm based on fuzzy logic in wireless sensor networks. J Computational Information Systems 8(15), 6241\u20136248 (2012)","journal-title":"J Computational Information Systems"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0692-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0692-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0692-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0692-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T12:26:38Z","timestamp":1749558398000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0692-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,23]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["692"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0692-3","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2016,8,23]]},"article-number":"192"}}