{"id":"https://openalex.org/W7138962055","doi":"https://doi.org/10.7717/peerj-cs.3731","title":"A secure and energy-efficient cluster-based data collection scheme using mobile sink in wireless sensor networks","display_name":"A secure and energy-efficient cluster-based data collection scheme using mobile sink in wireless sensor networks","publication_year":2026,"publication_date":"2026-03-20","ids":{"openalex":"https://openalex.org/W7138962055","doi":"https://doi.org/10.7717/peerj-cs.3731"},"language":"en","primary_location":{"id":"doi:10.7717/peerj-cs.3731","is_oa":true,"landing_page_url":"https://doi.org/10.7717/peerj-cs.3731","pdf_url":null,"source":{"id":"https://openalex.org/S4210178049","display_name":"PeerJ Computer Science","issn_l":"2376-5992","issn":["2376-5992"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320104","host_organization_name":"PeerJ, Inc.","host_organization_lineage":["https://openalex.org/P4310320104"],"host_organization_lineage_names":["PeerJ, Inc."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PeerJ Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.7717/peerj-cs.3731","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5129770944","display_name":"Sarah M. Alhammad","orcid":null},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Sarah M. Alhammad","raw_affiliation_strings":["Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-0612-6523","affiliations":[{"raw_affiliation_string":"Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036136916","display_name":"Hassan Al-Mahdi","orcid":"https://orcid.org/0000-0002-0305-7630"},"institutions":[{"id":"https://openalex.org/I114794399","display_name":"Suez Canal University","ror":"https://ror.org/02m82p074","country_code":"EG","type":"education","lineage":["https://openalex.org/I114794399"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Hassan Al-Mahdi","raw_affiliation_strings":["Department of Computer Science, Faculty of Computer and Informatics, Suez Canal University, Ismallia, Egypt"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computer and Informatics, Suez Canal University, Ismallia, Egypt","institution_ids":["https://openalex.org/I114794399"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036593023","display_name":"Mohamed Elshrkawey","orcid":"https://orcid.org/0000-0001-9777-8086"},"institutions":[{"id":"https://openalex.org/I114794399","display_name":"Suez Canal University","ror":"https://ror.org/02m82p074","country_code":"EG","type":"education","lineage":["https://openalex.org/I114794399"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"M. Elshrkawey","raw_affiliation_strings":["Department of Information System, Faculty of Computer and Informatics, Suez Canal University, Ismallia, Egypt"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information System, Faculty of Computer and Informatics, Suez Canal University, Ismallia, Egypt","institution_ids":["https://openalex.org/I114794399"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062327316","display_name":"Shymaa Saad","orcid":"https://orcid.org/0009-0007-3268-4397"},"institutions":[{"id":"https://openalex.org/I4210122761","display_name":"Arish University","ror":"https://ror.org/02nzd5081","country_code":"EG","type":"education","lineage":["https://openalex.org/I4210122761"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Shymaa Saad","raw_affiliation_strings":["Department of Computer Science, Faculty of Computer and Informatics, El Arish University, Arish, Egypt"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computer and Informatics, El Arish University, Arish, Egypt","institution_ids":["https://openalex.org/I4210122761"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101473495","display_name":"S. A. H. Abdelaziz","orcid":"https://orcid.org/0009-0000-1791-9863"},"institutions":[{"id":"https://openalex.org/I114794399","display_name":"Suez Canal University","ror":"https://ror.org/02m82p074","country_code":"EG","type":"education","lineage":["https://openalex.org/I114794399"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Safa Abdelaziz","raw_affiliation_strings":["Department of Computer Science, Faculty of Computer and Informatics, Suez Canal University, Ismallia, Egypt"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computer and Informatics, Suez Canal University, Ismallia, Egypt","institution_ids":["https://openalex.org/I114794399"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5129770944"],"corresponding_institution_ids":["https://openalex.org/I106778892"],"apc_list":{"value":1395,"currency":"USD","value_usd":1395},"apc_paid":{"value":1395,"currency":"USD","value_usd":1395},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.53981033,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":null,"first_page":"e3731","last_page":"e3731"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.906000018119812,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.906000018119812,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.07209999859333038,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.004800000227987766,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7595000267028809},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.5677000284194946},{"id":"https://openalex.org/keywords/data-collection","display_name":"Data collection","score":0.49559998512268066},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.46549999713897705},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.43130001425743103},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.42089998722076416},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.38839998841285706},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.3650999963283539},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.3506999909877777}],"concepts":[{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7595000267028809},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7437000274658203},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7042999863624573},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.5677000284194946},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.49559998512268066},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.46549999713897705},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4487999975681305},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.43130001425743103},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.42089998722076416},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.38839998841285706},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.3650999963283539},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.35600000619888306},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.3506999909877777},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.3393999934196472},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.3287999927997589},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.3276999890804291},{"id":"https://openalex.org/C143050476","wikidata":"https://www.wikidata.org/wiki/Q194502","display_name":"Sink (geography)","level":2,"score":0.3165000081062317},{"id":"https://openalex.org/C7545210","wikidata":"https://www.wikidata.org/wiki/Q838123","display_name":"Data redundancy","level":2,"score":0.3127000033855438},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2831000089645386},{"id":"https://openalex.org/C45340560","wikidata":"https://www.wikidata.org/wiki/Q215382","display_name":"Disjoint sets","level":2,"score":0.27810001373291016},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.2775000035762787},{"id":"https://openalex.org/C111185680","wikidata":"https://www.wikidata.org/wiki/Q3866206","display_name":"Sensor node","level":5,"score":0.27079999446868896},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2685000002384186},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.266400009393692},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.26100000739097595},{"id":"https://openalex.org/C193519340","wikidata":"https://www.wikidata.org/wiki/Q891179","display_name":"Data loss","level":2,"score":0.2606000006198883},{"id":"https://openalex.org/C7091991","wikidata":"https://www.wikidata.org/wiki/Q17149548","display_name":"Mobile wireless sensor network","level":5,"score":0.2605000138282776},{"id":"https://openalex.org/C2779851314","wikidata":"https://www.wikidata.org/wiki/Q3698644","display_name":"Cross-layer optimization","level":4,"score":0.2549000084400177},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.2526000142097473}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.7717/peerj-cs.3731","is_oa":true,"landing_page_url":"https://doi.org/10.7717/peerj-cs.3731","pdf_url":null,"source":{"id":"https://openalex.org/S4210178049","display_name":"PeerJ Computer Science","issn_l":"2376-5992","issn":["2376-5992"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320104","host_organization_name":"PeerJ, Inc.","host_organization_lineage":["https://openalex.org/P4310320104"],"host_organization_lineage_names":["PeerJ, Inc."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PeerJ Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b3d7b2fbff334ce28abf66f9c5c3abc7","is_oa":true,"landing_page_url":"https://doaj.org/article/b3d7b2fbff334ce28abf66f9c5c3abc7","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"PeerJ Computer Science, Vol 12, p e3731 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.7717/peerj-cs.3731","is_oa":true,"landing_page_url":"https://doi.org/10.7717/peerj-cs.3731","pdf_url":null,"source":{"id":"https://openalex.org/S4210178049","display_name":"PeerJ Computer Science","issn_l":"2376-5992","issn":["2376-5992"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320104","host_organization_name":"PeerJ, Inc.","host_organization_lineage":["https://openalex.org/P4310320104"],"host_organization_lineage_names":["PeerJ, Inc."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PeerJ Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.8028244376182556}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W1965385472","https://openalex.org/W1971103114","https://openalex.org/W1994438976","https://openalex.org/W2092509436","https://openalex.org/W2104846640","https://openalex.org/W2119106551","https://openalex.org/W2163428398","https://openalex.org/W2410174822","https://openalex.org/W2596845787","https://openalex.org/W2605301127","https://openalex.org/W2735493744","https://openalex.org/W2735676894","https://openalex.org/W2736502269","https://openalex.org/W2754529701","https://openalex.org/W2769636801","https://openalex.org/W2772332910","https://openalex.org/W2979422966","https://openalex.org/W2982075362","https://openalex.org/W2997385859","https://openalex.org/W3011460339","https://openalex.org/W3014581602","https://openalex.org/W3092857909","https://openalex.org/W3093242537","https://openalex.org/W3122212593","https://openalex.org/W3125202931","https://openalex.org/W3144292103","https://openalex.org/W3158665334","https://openalex.org/W3192867717","https://openalex.org/W4226034663","https://openalex.org/W4226148194","https://openalex.org/W4229073938","https://openalex.org/W4281664085","https://openalex.org/W4362576253","https://openalex.org/W4385552039","https://openalex.org/W4387730356","https://openalex.org/W4389145654","https://openalex.org/W4390610500","https://openalex.org/W4391568675","https://openalex.org/W4392909248","https://openalex.org/W4393931759","https://openalex.org/W4406608488","https://openalex.org/W4407891882","https://openalex.org/W4408108657","https://openalex.org/W4408572220","https://openalex.org/W4409052651","https://openalex.org/W4409267343","https://openalex.org/W4409660312","https://openalex.org/W4411076728"],"related_works":[],"abstract_inverted_index":{"Ensuring":[0],"secure":[1,32],"and":[2,22,33,59,70,82,119,156,169,196,206,226,241],"energy-efficient":[3,242],"data":[4,36,101,121,151],"collection":[5,37,122],"remains":[6],"a":[7,29,40,127,238],"critical":[8],"challenge":[9],"in":[10,20],"wireless":[11],"sensor":[12,17],"networks":[13,107],"(WSNs),":[14],"where":[15],"resource-constrained":[16],"nodes":[18,113],"operate":[19],"vulnerable":[21],"dynamic":[23,71],"environments.":[24],"This":[25],"article":[26],"proposes":[27],"S-EMSDC,":[28],"novel":[30],"two-layer":[31],"energy-aware":[34,170],"cluster-based":[35],"framework":[38,123,215],"employing":[39,126],"mobile":[41],"sink.":[42],"The":[43,75,214],"first":[44],"layer":[45,77],"integrates":[46],"an":[47],"Improved":[48],"Discretized":[49],"INFO":[50],"(IDINFO)":[51],"mobility":[52,147],"optimization":[53],"algorithm":[54,144],"to":[55,111,183,193,200],"minimize":[56],"transmission":[57],"distance":[58],"balance":[60],"energy":[61,149,187],"consumption":[62,188],"through":[63],"optimized":[64],"sink":[65,146],"trajectory":[66],"planning,":[67],"adaptive":[68],"clustering,":[69],"cluster-head":[72],"(CH)":[73],"rotation.":[74],"second":[76],"eliminates":[78],"explicit":[79],"key":[80],"exchange":[81],"strengthens":[83],"security":[84],"by":[85,163,181,189,197],"combining":[86],"AES-256\u2013based":[87],"node":[88,224],"authentication":[89],"with":[90],"HMAC-SHA256":[91],"integrity":[92],"verification,":[93],"ensuring":[94],"early":[95],"rejection":[96],"of":[97,117,212],"forged":[98],"or":[99],"manipulated":[100],"before":[102],"aggregation.":[103],"Extensive":[104],"simulations":[105],"on":[106,209],"ranging":[108],"from":[109],"100":[110],"500":[112],"demonstrate":[114],"the":[115,165,210],"superiority":[116],"Secure":[118],"Energy-Efficient":[120,136],"for":[124,148,245],"WSNs":[125],"Mobile":[128,137],"Sink":[129],"(S-EMSDC)":[130],"over":[131,190],"recent":[132,201],"state-of-the-art":[133],"schemes,":[134],"including":[135],"Sink-Based":[138],"Intelligent":[139],"Data":[140],"Routing":[141],"(EEMSR),":[142],"Genetic":[143],"based":[145],"efficient":[150],"routing":[152],"(GA-SMT),":[153],"Balanced":[154],"Inter-cluster":[155],"Inner-cluster":[157],"Energy":[158],"(BIIE),":[159],"Group":[160],"Teaching":[161],"Algorithm":[162],"using":[164],"Bald":[166],"Eagle":[167],"(GTA-BE),":[168],"path":[171],"construction":[172],"(EAPC).":[173],"Results":[174],"show":[175],"that":[176],"S-EMSDC":[177,236],"extends":[178],"network":[179],"lifetime":[180],"up":[182],"74%,":[184],"reduces":[185],"average":[186],"60%":[191],"compared":[192],"baseline":[194],"methods":[195],"20\u201340%":[198],"relative":[199],"protocols":[202],"such":[203],"as":[204],"EA-PC":[205],"GA-SMT,":[207],"depending":[208],"number":[211],"rounds.":[213],"also":[216],"achieves":[217],"near-zero":[218],"successful":[219],"identity":[220],"forgery":[221],"across":[222],"varying":[223],"densities":[225],"identifier":[227],"lengths,":[228],"confirming":[229],"its":[230],"robustness":[231],"against":[232],"identity-based":[233],"attacks.":[234],"Overall,":[235],"provides":[237],"secure,":[239],"scalable,":[240],"solution":[243],"suitable":[244],"mission-critical":[246],"WSN":[247],"applications.":[248]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-03-20T00:00:00"}
