{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T18:01:19Z","timestamp":1726423279752},"reference-count":39,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Sustainable Computing: Informatics and Systems"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1016\/j.suscom.2022.100657","type":"journal-article","created":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T18:40:32Z","timestamp":1641926432000},"page":"100657","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":7,"special_numbering":"C","title":["An adaptive energy aware DTN-based communication layer for cyber-physical systems"],"prefix":"10.1016","volume":"35","author":[{"given":"Amit Kumar","family":"Singh","sequence":"first","affiliation":[]},{"given":"Rajendra","family":"Pamula","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9851-4103","authenticated-orcid":false,"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"03","key":"10.1016\/j.suscom.2022.100657_bib0005","doi-asserted-by":"crossref","first-page":"1750012","DOI":"10.1142\/S2424862217500129","article-title":"Applications of cyber-physical system: a literature review","volume":"2","author":"Chen","year":"2017","journal-title":"J. Ind. Integr. Manag."},{"issue":"1","key":"10.1016\/j.suscom.2022.100657_bib0010","first-page":"155","article-title":"A systematic review of studies on cyber physical system security","volume":"9","author":"Dong","year":"2015","journal-title":"Int. J. Secur. Appl."},{"key":"10.1016\/j.suscom.2022.100657_bib0015","article-title":"Resource offload consolidation based on deep-reinforcement learning approach in cyber-physical systems","author":"Mekala","year":"2020","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"issue":"4","key":"10.1016\/j.suscom.2022.100657_bib0020","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10922-021-09609-5","article-title":"A federated learning approach to frequent itemset mining in cyber-physical systems","volume":"29","author":"Ahmed","year":"2021","journal-title":"J. Netw. Syst. Manag."},{"key":"10.1016\/j.suscom.2022.100657_bib0025","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/ISORCW.2012.15","article-title":"Review of cyber-physical system architecture","author":"Hu","year":"2012","journal-title":"2012 IEEE 15th International Symposium on Object\/Component\/Service-Oriented Real-Time Distributed Computing Workshops, IEEE"},{"issue":"1","key":"10.1016\/j.suscom.2022.100657_bib0030","first-page":"9","article-title":"Sustainable product lifecycle management, industrial big data, and Internet of things sensing networks in cyber-physical system-based smart factories","volume":"9","author":"Tucker","year":"2021","journal-title":"J. Self-Gover. Manag. Econ."},{"issue":"1","key":"10.1016\/j.suscom.2022.100657_bib0035","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/TFUZZ.2020.3006520","article-title":"Fuzzy detection aided real-time and robust visual tracking under complex environments","volume":"29","author":"Liu","year":"2020","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"10.1016\/j.suscom.2022.100657_bib0040","article-title":"Human memory update strategy: a multi-layer template update mechanism for remote visual monitoring","author":"Liu","year":"2021","journal-title":"IEEE Transactions on Multimedia"},{"issue":"3-4","key":"10.1016\/j.suscom.2022.100657_bib0045","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1504\/IJAHUC.2013.055454","article-title":"Enabling cyber-physical systems with machine-to-machine technologies","volume":"13","author":"Wan","year":"2013","journal-title":"Int. J. Ad Hoc Ubiquitous Comput."},{"key":"10.1016\/j.suscom.2022.100657_bib0050","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/j.trc.2014.07.002","article-title":"A method of vehicle motion prediction and collision risk assessment with a simulated vehicular cyber physical system","volume":"47","author":"Wu","year":"2014","journal-title":"Transp. Res. Part C: Emerg. Technol."},{"issue":"1","key":"10.1016\/j.suscom.2022.100657_bib0055","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/JAS.2017.7510349","article-title":"Review on cyber-physical systems","volume":"4","author":"Liu","year":"2017","journal-title":"IEEE\/CAA J. Autom. Sin."},{"year":"2015","series-title":"Security in Delay-Tolerant Mobile Cyber Physical Applications","author":"Magaia","key":"10.1016\/j.suscom.2022.100657_bib0060"},{"issue":"4","key":"10.1016\/j.suscom.2022.100657_bib0065","doi-asserted-by":"crossref","first-page":"217415","DOI":"10.1155\/2014\/217415","article-title":"Review of cyber-physical system in healthcare","volume":"10","author":"Haque","year":"2014","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"36","key":"10.1016\/j.suscom.2022.100657_bib0070","first-page":"52","article-title":"Cyber-physical systems: a literature review","volume":"13","author":"Sadiku","year":"2017","journal-title":"Eur. Sci. J."},{"key":"10.1016\/j.suscom.2022.100657_bib0075","first-page":"1","article-title":"An efficient and intelligent routing strategy for vehicular delay tolerant networks","author":"Singh","year":"2020","journal-title":"Wirel. Netw."},{"key":"10.1016\/j.suscom.2022.100657_bib0080","first-page":"195","article-title":"Vehicular delay tolerant network based communication using machine learning classifiers","author":"Singh","year":"2021","journal-title":"Arch. Wirel. Netw. Solut. Secur. Issues"},{"key":"10.1016\/j.suscom.2022.100657_bib0085","doi-asserted-by":"crossref","first-page":"149623","DOI":"10.1109\/ACCESS.2019.2947053","article-title":"A deep learning approach for energy efficient computational offloading in mobile edge computing","volume":"7","author":"Ali","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.suscom.2022.100657_bib0090","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1109\/DSDIS.2015.24","article-title":"A robust energy efficient epidemic routing protocol for delay tolerant networks","author":"Bista","year":"2015","journal-title":"2015 IEEE International Conference on Data Science and Data Intensive Systems, IEEE"},{"key":"10.1016\/j.suscom.2022.100657_bib0095","article-title":"Data visualization of a cyber-physical systems development toolchain: an integration case study","author":"G\u00fcrd\u00fcr","year":"2017","journal-title":"ALLDATA 2017"},{"issue":"3","key":"10.1016\/j.suscom.2022.100657_bib0100","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/j.jum.2019.09.005","article-title":"Geo CPS: spatial challenges and opportunities for CPS in the geographic dimension","volume":"8","author":"Yan","year":"2019","journal-title":"J. Urban Manag."},{"key":"10.1016\/j.suscom.2022.100657_bib0105","first-page":"6344","article-title":"ECG monitoring system integrated with IR-UWB radar based on CNN","volume":"4","author":"Yin","year":"2016","journal-title":"IEEE Access"},{"key":"10.1016\/j.suscom.2022.100657_bib0110","doi-asserted-by":"crossref","first-page":"24679","DOI":"10.1109\/ACCESS.2019.2900161","article-title":"Implementation of a battery-free wireless sensor for cyber-physical systems dedicated to structural health monitoring applications","volume":"7","author":"Loubet","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.suscom.2022.100657_bib0115","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1016\/j.future.2018.04.018","article-title":"Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system","volume":"108","author":"Xu","year":"2020","journal-title":"Future Gen. Comput. Syst."},{"issue":"1","key":"10.1016\/j.suscom.2022.100657_bib0120","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1109\/TDSC.2016.2530705","article-title":"PROVEST: provenance-based trust model for delay tolerant networks","volume":"15","author":"Cho","year":"2016","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"3","key":"10.1016\/j.suscom.2022.100657_bib0125","doi-asserted-by":"crossref","first-page":"693","DOI":"10.1007\/s11276-015-1166-y","article-title":"Trust based intelligent routing algorithm for delay tolerant network using artificial neural network","volume":"23","author":"Singh","year":"2017","journal-title":"Wirel. Netw."},{"issue":"1","key":"10.1016\/j.suscom.2022.100657_bib0130","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1109\/MCOM.2015.7010543","article-title":"Delay-tolerant network protocol testing and evaluation","volume":"53","author":"Li","year":"2015","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"10.1016\/j.suscom.2022.100657_bib0135","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/s11276-014-0790-2","article-title":"Analysing social behaviour and message dissemination in human based delay tolerant network","volume":"21","author":"Batabyal","year":"2015","journal-title":"Wirel. Netw."},{"key":"10.1016\/j.suscom.2022.100657_bib0140","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/2030652.2030661","article-title":"The evolution of a DTN routing protocol-PRoPHETv2","author":"Grasic","year":"2011","journal-title":"Proceedings of the 6th ACM workshop on Challenged Networks"},{"key":"10.1016\/j.suscom.2022.100657_bib0145","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1145\/1859934.1859947","article-title":"DTN routing in urban public transport systems","author":"Doering","year":"2010","journal-title":"Proceedings of the 5th ACM Workshop on Challenged Networks"},{"year":"2000","series-title":"Epidemic Routing for Partially Connected Ad Hoc Networks","author":"Vahdat","key":"10.1016\/j.suscom.2022.100657_bib0150"},{"key":"10.1016\/j.suscom.2022.100657_bib0155","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/AINA.2010.162","article-title":"PRoPHET+: an adaptive prophet-based routing protocol for opportunistic network","author":"Huang","year":"2010","journal-title":"2010 24th IEEE International Conference on Advanced Information Networking and Applications, IEEE"},{"key":"10.1016\/j.suscom.2022.100657_bib0160","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1145\/1080139.1080143","article-title":"Spray and wait: an efficient routing scheme for intermittently connected mobile networks","author":"Spyropoulos","year":"2005","journal-title":"Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking"},{"issue":"1","key":"10.1016\/j.suscom.2022.100657_bib0165","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s12652-020-02874-3","article-title":"A moving energy-based routing in DTNs with speed heterogeneity","volume":"12","author":"Luo","year":"2021","journal-title":"J. Ambient Intell. Hum. Comput."},{"issue":"8","key":"10.1016\/j.suscom.2022.100657_bib0170","doi-asserted-by":"crossref","first-page":"7195","DOI":"10.1109\/TVT.2017.2653843","article-title":"SEBAR: social-energy-based routing for mobile social delay-tolerant networks","volume":"66","author":"Li","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.suscom.2022.100657_bib0175","first-page":"1","article-title":"Adaptive exponential beacon period protocol for power saving in delay tolerant networks","author":"Choi","year":"2009","journal-title":"2009 IEEE International Conference on Communications, IEEE"},{"issue":"1","key":"10.1016\/j.suscom.2022.100657_bib0180","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1109\/TVT.2011.2174262","article-title":"Optimal beaconing control for epidemic routing in delay-tolerant networks","volume":"61","author":"Li","year":"2011","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.suscom.2022.100657_bib0185","first-page":"1","article-title":"Energy consumption analysis of different routing protocols in a delay tolerant network","author":"Spaho","year":"2019","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"10.1016\/j.suscom.2022.100657_bib0190","first-page":"1","article-title":"PriNergy: a priority-based energy-efficient routing method for IoT systems","author":"Safara","year":"2020","journal-title":"J. Supercomput."},{"key":"10.1016\/j.suscom.2022.100657_bib0195","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1145\/1162654.1162662","article-title":"Hierarchical power management in disruption tolerant networks with traffic-aware optimization","author":"Jun","year":"2006","journal-title":"Proceedings of the 2006 SIGCOMM Workshop on Challenged Networks"}],"container-title":["Sustainable Computing: Informatics and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S221053792200004X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S221053792200004X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T15:24:12Z","timestamp":1682954652000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S221053792200004X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":39,"alternative-id":["S221053792200004X"],"URL":"https:\/\/doi.org\/10.1016\/j.suscom.2022.100657","relation":{},"ISSN":["2210-5379"],"issn-type":[{"type":"print","value":"2210-5379"}],"subject":[],"published":{"date-parts":[[2022,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"An adaptive energy aware DTN-based communication layer for cyber-physical systems","name":"articletitle","label":"Article Title"},{"value":"Sustainable Computing: Informatics and Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.suscom.2022.100657","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"100657"}}