{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:11:10Z","timestamp":1772118670130,"version":"3.50.1"},"reference-count":19,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T00:00:00Z","timestamp":1734652800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Internet Technology Letters"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>The Fifth Generation (5G) of wireless networks has increasingly focused significantly on energy\u2010saving methods for mobile communication systems. The objective of combining MANET with 5G communication is to achieve a high data throughout while simultaneously reducing latency and cost. The main issues with MANET are elevated energy use, security, and reduced longevity. The self\u2010configuring characteristics and dynamic architecture of MANET may lead to frequent changes in topology and resource allocation. This mobility results in frequent connection failures, which increase routing overheads and decrease data transmission dependability. A secured clustering technique is essential to enhance the routing performance and establish reliable routing. In MANET, the cluster mechanism is the prominent way to improve the network lifetime and routing mechanism. The proposed secure cluster routing\u2010based neuro\u2010fuzzy logic (SCR\u2010NFL) establishes a secure cluster mechanism via the use of the Trust value method. It guarantees cluster stability by taking into account node mobility and energy while selecting cluster heads. The important components in the proposed system are Mobility (M), Residual Energy Level (REL), and Trust Value (TV). The neural fuzzy logic system is implemented to handle the data uncertainty and make effective decisions during routing path selections. The proposed SCR\u2010NFL performance is measured in an NS\u20102 simulation environment. The result is compared with the existing Improved Particle Swarm Optimization Algorithm, Trust\u2010Based Secure Neuro Fuzzy Clustering mechanism and Mobility Aware Energy Efficient Clustering system using Particle Swarm Optimization mechanism. The performance parameters for comparison are packet delivery ratio, average number of clusters, end\u2010to\u2010end delay, average number of cluster instances, mobility speed and mobility distance.<\/jats:p>","DOI":"10.1002\/itl2.632","type":"journal-article","created":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T05:52:34Z","timestamp":1734673954000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Cluster Based Routing Scheme for Neuro\u2010Fuzzy Assisted\n                    <scp>MANET<\/scp>\n                    in\n                    <scp>5G<\/scp>"],"prefix":"10.1002","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9477-6384","authenticated-orcid":false,"given":"Perinbaraj","family":"Rathinakumar","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication Engineering, Faculty of Engineering and Technology SRM Institute of Science and Technology, Vadapalani Campus  Chennai Tamilnadu India"}]},{"given":"Asan Mohideen","family":"Khansadurai","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering Sudharsan Engineering College  Pudukkottai Tamilnadu India"}]},{"given":"Sickari","family":"Padmanaban","sequence":"additional","affiliation":[{"name":"Department of Mathematics Karpagam Institute of Technology  Coimbatore Tamilnadu India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4551-6142","authenticated-orcid":false,"given":"Rakkipalayam Sampath","family":"Ramya","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering Sri Ramakrishna Engineering College  Coimbatore Tamilnadu India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8726-5284","authenticated-orcid":false,"given":"Narambunathan Arunachalam","family":"Natraj","sequence":"additional","affiliation":[{"name":"Symbiosis Institute of Digital and Telecom Management (SIDTM) Symbiosis International (Deemed University)  Pune India"}]}],"member":"311","published-online":{"date-parts":[[2024,12,20]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/su13116187"},{"key":"e_1_2_7_3_1","first-page":"776","article-title":"A Novel Method to Improve Performance of Major Nodes in Military MANET","volume":"48","author":"Quy V. K.","year":"2021","journal-title":"IAENG International Journal of Computer Science"},{"key":"e_1_2_7_4_1","doi-asserted-by":"crossref","unstructured":"M. H.AlhameedandI. O.Mahgoub \u201cHigh Awareness Adaptive Beaconing Based on Fuzzy Logic in VANET.\u201dIn Proceedings of the MobiWac '17: Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access New York NY USA November 21 2017; pp. 153\u2013157.","DOI":"10.1145\/3132062.3132082"},{"key":"e_1_2_7_5_1","doi-asserted-by":"crossref","unstructured":"I.MahmudandY.\u2010Z.Cho \u201cAdaptive Hello Interval in FANET Routing Protocols for Green UAVs.\u201dIEEE Access 2019 vol: 7 pp. 63004\u201363015.","DOI":"10.1109\/ACCESS.2019.2917075"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7279-7_7"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6672297"},{"key":"e_1_2_7_8_1","doi-asserted-by":"crossref","unstructured":"R. I.Al\u2010EssaandG. A.Al\u2010Suhail \u201cMobility and Transmission Power of AODV Routing Protocol in MANET.\u201dIn Proceedings of the 2022 2nd International Conference on Computing and Machine Intelligence (ICMI) (Istanbul Turkey July 15\u201016 2022) pp. 1\u20135.","DOI":"10.1109\/ICMI55296.2022.9873686"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.4236\/cn.2016.83013"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970481"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.22247\/ijcna\/2021\/208892"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7380849"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12020274"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/1903190"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/computation11090174"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08661-3"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.5755\/j01.itc.51.2.29996"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.079"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4741"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksus.2018.04.031"}],"container-title":["Internet Technology Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/itl2.632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T12:20:44Z","timestamp":1762777244000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/itl2.632"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,20]]},"references-count":19,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["10.1002\/itl2.632"],"URL":"https:\/\/doi.org\/10.1002\/itl2.632","archive":["Portico"],"relation":{"has-review":[{"id-type":"doi","id":"10.1002\/ITL2.632\/v2\/response1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.632\/v1\/decision1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.632\/v2\/review1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.632\/v2\/decision1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.632\/v2\/review2","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.632\/v1\/review1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.632\/v1\/review2","asserted-by":"object"}]},"ISSN":["2476-1508","2476-1508"],"issn-type":[{"value":"2476-1508","type":"print"},{"value":"2476-1508","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,20]]},"assertion":[{"value":"2024-09-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-06","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e632"}}