OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

DAG block: Trust aware load balanced routing and lightweight authentication encryption in WSN
M. Revanesh, John M. Acken, V. Sridhar
Future Generation Computer Systems (2022) Vol. 140, pp. 402-421
Closed Access | Times Cited: 26

Showing 1-25 of 26 citing articles:

GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network
Jiahong Cai, Wei Liang, Xiong Li, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21502-21514
Closed Access | Times Cited: 56

WOAD3QN-RP: An intelligent routing protocol in wireless sensor networks — A swarm intelligence and deep reinforcement learning based approach
Xuan Yang, Jiaqi Yan, Desheng Wang, et al.
Expert Systems with Applications (2024) Vol. 246, pp. 123089-123089
Closed Access | Times Cited: 18

Lightweight block ciphers for resource-constrained environments: A comprehensive survey
Yue Zhong, Jieming Gu
Future Generation Computer Systems (2024) Vol. 157, pp. 288-302
Closed Access | Times Cited: 8

DP-TrajGAN: A privacy-aware trajectory generation model with differential privacy
Jing Zhang, Qihan Huang, Yirui Huang, et al.
Future Generation Computer Systems (2022) Vol. 142, pp. 25-40
Closed Access | Times Cited: 22

Proactive Bi-objective Multi-path Planning for Wireless Sensor Networks
Yamin Wang, Xiaoping Li, Shuai Ma, et al.
Lecture notes in computer science (2025), pp. 238-251
Closed Access

Security-Aware Optimal Cluster Head-Based Energy-Efficient Data Transmission on Wireless Sensor Network
A. D. Bharath, N. Revathy
Smart innovation, systems and technologies (2025), pp. 261-277
Closed Access

Ensuring Trustworthy and Secure IoT: Fundamentals, Threats, Solutions, and Future Hotspots
Ming‐Feng Huang, Qing-Lin Peng, Xiaoyu Zhu, et al.
Computer Networks (2025), pp. 111218-111218
Closed Access

Machine learning-inspired intrusion detection system for IoT: Security issues and future challenges
Tariq Ahamed Ahanger, Imdad Ullah, Shabbab Algamdi, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110265-110265
Closed Access

Review Paper of Performance Analysis in Wireless Sensor Networks
Tiyas Sarkar, Ravi Kumar, Mellachervu Sathwik Kumar, et al.
SSRN Electronic Journal (2024)
Closed Access | Times Cited: 3

Leveraging Metaheuristic Unequal Clustering for Hotspot Elimination in Energy-Aware Wireless Sensor Networks
Hadeel Alsolai, Mashael Maashi, Muhammad Kashif Saeed, et al.
Sensors (2023) Vol. 23, Iss. 5, pp. 2636-2636
Open Access | Times Cited: 8

DBlock-RLB: An energy efficient framework for intelligent routing and trading based load balancing in SDWSN environment
Nagesh Mallaiah Vaggu, Ravi Sankar Barpanda
Ad Hoc Networks (2024) Vol. 159, pp. 103475-103475
Closed Access | Times Cited: 2

COSIER: A comprehensive lightweight blockchain system for IoT networks
Khaleel Mershad
Computer Communications (2024) Vol. 224, pp. 125-144
Closed Access | Times Cited: 1

TSRP: A Novel Trust-Based and Energy-Aware Secure Routing Protocol for Resource-Constrained Wireless Sensor Networks
Yameng Bai, Yahui Xue, Junxia Meng, et al.
Journal of The Institution of Engineers (India) Series B (2024)
Closed Access | Times Cited: 1

Lightweight blockchain solutions: Taxonomy, research progress, and comprehensive review
Khaleel Mershad, Omar Cheikhrouhou
Internet of Things (2023) Vol. 24, pp. 100984-100984
Open Access | Times Cited: 3

Cycle‐Consistent Generative Adversarial Network and Crypto Hash Signature Token‐based Block chain Technology for Data Aggregation with Secured Routing in Wireless Sensor Networks
Ashwinth Janarthanan, Vidhusha Vidhusha
International Journal of Communication Systems (2023) Vol. 37, Iss. 4
Closed Access | Times Cited: 3

A Distance Vector Hop-Based Secure and Robust Localization Algorithm for Wireless Sensor Networks
Rameez Asif, Muhammad Farooq‐i‐Azam, Muhammad Hasanain Chaudary, et al.
Electronics (2023) Vol. 12, Iss. 10, pp. 2237-2237
Open Access | Times Cited: 2

Enhancing Data Forwarding Efficiency in SIoT with Multidimensional Social Relations
Fang Xu, Songhao Jiang, Yi Ma, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 1, pp. 1095-1113
Open Access

DEVELOPMENT OF DAG BLOCKCHAIN MODEL
Akylbek Tokhmetov, Vyacheslav Lee, Liliya Tanchenko
Scientific Journal of Astana IT University (2024)
Open Access

A novel blockchain approach for decentralized financing
Dileep Reddy Bolla, S Trisheela, P. N. Nagarathna, et al.
AIP conference proceedings (2024) Vol. 3122, pp. 080023-080023
Closed Access

Malicious node detection in wireless sensor network using modified sandpiper optimization algorithm
B. Vijaya Nirmala, K. Selvaraj
Wireless Networks (2024)
Closed Access

Secure Data Sharing Scheme for Multi-Node Devices
Jun Ye, Yitang Wan, Zehua Wang, et al.
Procedia Computer Science (2024) Vol. 243, pp. 1239-1247
Open Access

An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things
Chong Guo, Bei Gong, Muhammad Waqas, et al.
Sensors (2024) Vol. 24, Iss. 21, pp. 6843-6843
Open Access

Malicious node detection using SVM and secured data storage using blockchain in WSN
Ajit Kumar Singh Yadav, S. S. Sivaraju, B. Radha, et al.
International Journal of Systems Assurance Engineering and Management (2024)
Closed Access

EDSSR: a secure and power-aware opportunistic routing scheme for WSNs
Ruili Yang, Manoj A. Patil, Potu Narayana, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access

Energy-efficient and secure routing strategy for opportunistic data transmission in WSNs
Potu Narayana, K Keerthi, Osamah Ibrahim Khalaf, et al.
Journal of Cyber Security Technology (2024), pp. 1-36
Open Access

Page 1 - Next Page

Scroll to top