{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T05:48:10Z","timestamp":1777096090274,"version":"3.51.4"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"34","license":[{"start":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T00:00:00Z","timestamp":1745452800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T00:00:00Z","timestamp":1745452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-025-20844-9","type":"journal-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T07:23:05Z","timestamp":1745479385000},"page":"42985-43012","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["RETRACTED ARTICLE: Reinforcing internet of things security measures in smart agriculture with feature extraction-based supervised machine learning for intrusion detection"],"prefix":"10.1007","volume":"84","author":[{"given":"Sarbajit","family":"Manna","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4951-4729","authenticated-orcid":false,"given":"Arindam","family":"Sarkar","sequence":"additional","affiliation":[]},{"given":"Atanu","family":"Mondal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,24]]},"reference":[{"issue":"2","key":"20844_CR1","first-page":"1","volume":"20","author":"S Almahirah","year":"2021","unstructured":"Almahirah S, Jahan M, Sharma S et al (2021) Role of market microstructure in maintaining economic development. Emp Econ Lett 20(2):1\u201314","journal-title":"Emp Econ Lett"},{"key":"20844_CR2","doi-asserted-by":"crossref","unstructured":"Bavougian M, Read PE (2018) Mulch and groundcover effects on soil temperature and moisture, surface reflectance, grapevine water potential, and vineyard weed management. Article ID e5082 6(1)","DOI":"10.7717\/peerj.5082"},{"key":"20844_CR3","doi-asserted-by":"crossref","unstructured":"Bezerra SFDC, Filho ASM, Delicato FC, et\u00a0al (2021) Processing complex events in fog-based internet of things systems for smart agriculture. Article ID 21(21)","DOI":"10.3390\/s21217226"},{"key":"20844_CR4","doi-asserted-by":"crossref","unstructured":"Chaudhary A, Tiwari VN, Kumar A (2014) Analysis of fuzzy logic based intrusion detection systems in mobile ad hoc networks. Int J Inform Technol 6(1)","DOI":"10.1109\/ICRAIE.2014.6909148"},{"key":"20844_CR5","unstructured":"Dash C, Dash SP (2009) Fundamental of ecology"},{"key":"20844_CR6","doi-asserted-by":"crossref","unstructured":"Deepika G, Rajapirian (2016) Wireless sensor network in precision agriculture: a survey, emerging trends in engineering, technology and science (ICETETS). In: Proceedings of the international conference on IEEE, pp 1\u20134","DOI":"10.1109\/ICETETS.2016.7603070"},{"key":"20844_CR7","doi-asserted-by":"crossref","unstructured":"Dong MC, Vuran S, Irmak (2013) Autonomous precision agriculture through integration of wireless underground sensor networks with center pivot irrigation systems. Ad Hoc Netw 11(7):1975\u20131987","DOI":"10.1016\/j.adhoc.2012.06.012"},{"key":"20844_CR8","doi-asserted-by":"crossref","unstructured":"Dou L, Zheng W, Wang M, et\u00a0al (2021) Evaluation of urban environmental and economic coordination based on discrete mathematical model. In: Mathematical problems in engineering 2021","DOI":"10.1155\/2021\/1566538"},{"key":"20844_CR9","doi-asserted-by":"crossref","unstructured":"Fremantle P, Scott P (2017) A survey of secure middleware for the Internet of \u2019ings. Peer J Comput Sci 3(15)","DOI":"10.7717\/peerj-cs.114"},{"key":"20844_CR10","doi-asserted-by":"crossref","unstructured":"Glaroudis P, Chatzimisios (2020) Survey, comparison and research challenges of IoT application protocols for smart farming. Comput Netw 168(4)","DOI":"10.1016\/j.comnet.2019.107037"},{"key":"20844_CR11","doi-asserted-by":"publisher","unstructured":"Golyan A, Panchal S, Vaghasiya D, et\u00a0al (2024) Data ethics and privacy. In: Kumari A (ed) Recent trends and future direction for data analytics. IGI Global, pp 259\u2013268, https:\/\/doi.org\/10.4018\/979-8-3693-3609-0.ch011","DOI":"10.4018\/979-8-3693-3609-0.ch011"},{"key":"20844_CR12","doi-asserted-by":"crossref","unstructured":"Goumopoulos C, O\u2019Flynn B, Kameas A (2014) Automated zone-specific irrigation with wireless sensor\/actuator network and adaptable decision support. Comput Electron Agric 105:20\u201333","DOI":"10.1016\/j.compag.2014.03.012"},{"key":"20844_CR13","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1049\/iet-com.2016.0966","volume":"11","author":"F Hassan","year":"2016","unstructured":"Hassan F, Roy A, Saxena N (2016) Convergence of WSN and cognitive cellular network using maximum frequency reuse. IET Commun 11:664\u2013672","journal-title":"IET Commun"},{"key":"20844_CR14","doi-asserted-by":"crossref","unstructured":"Imam SA, Choudhary A, Achan S (2015) Design issues for wireless sensor networks and smart humidity sensors for precision agriculture: a review. In: Proceedings of the 2015 International Conference on Soft Computing Techniques and Implementations-(ICSCTI), pp 181\u2013187","DOI":"10.1109\/ICSCTI.2015.7489591"},{"key":"20844_CR15","doi-asserted-by":"crossref","unstructured":"Kamienski JP, Soininen M, Taumberger (2019) Smart water management platform: IoT-based precision irrigation for agriculture. Article ID 19(2)","DOI":"10.3390\/s19020276"},{"key":"20844_CR16","doi-asserted-by":"crossref","unstructured":"Kodali RK, Rawat N, Boppana L (2014) WSN sensors for precision agriculture. In: Proceedings of the region 10 symposium, pp 651\u2013656","DOI":"10.1109\/TENCONSpring.2014.6863114"},{"key":"20844_CR17","doi-asserted-by":"publisher","unstructured":"Kumari A, Tanwar S (2021) Al-based peak load reduction approach for residential buildings using reinforcement learning. In: Proceedings of 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), vol\u00a021. IEEE, pp 972\u2013977, https:\/\/doi.org\/10.1109\/ICCCIS51004.2021.9397241, https:\/\/ieeexplore.ieee.org\/document\/9397241","DOI":"10.1109\/ICCCIS51004.2021.9397241"},{"key":"20844_CR18","doi-asserted-by":"publisher","unstructured":"Kumari A, Tanwar S (2022) Reinforcement Learning for Multiagent-based Residential Energy Management System. In: Proceedings of 2021 IEEE Globecom Workshops (GC Wkshps). IEEE, pp 1\u20137, https:\/\/doi.org\/10.1109\/GCWkshps52748.2021.9682182, https:\/\/ieeexplore.ieee.org\/document\/9682182\/","DOI":"10.1109\/GCWkshps52748.2021.9682182"},{"key":"20844_CR19","doi-asserted-by":"publisher","unstructured":"Kumari A, Trivedi M, Tanwar S, et\u00a0al (2022) SV2G-ET: a secure vehicle-to-grid energy trading scheme using deep reinforcement learning. International transactions on electrical energy systems, pp 1\u201311. https:\/\/doi.org\/10.1155\/2022\/9761157","DOI":"10.1155\/2022\/9761157"},{"key":"20844_CR20","doi-asserted-by":"publisher","unstructured":"Kumari A, Golyan A, Shah R, et\u00a0al (2024) Introduction to data analytics. In: Kumari A (ed) Recent trends and future direction for data analytics. IGI Global, pp 1\u201314, https:\/\/doi.org\/10.4018\/979-8-3693-3609-0.ch001","DOI":"10.4018\/979-8-3693-3609-0.ch001"},{"key":"20844_CR21","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.matcom.2014.11.030","volume":"113","author":"S Li","year":"2015","unstructured":"Li S, Gao J, Zhu Q et al (2015) A dynamic root simulation model in response to soil moisture heterogeneity. Math Comput Simul 113:40\u201350","journal-title":"Math Comput Simul"},{"key":"20844_CR22","doi-asserted-by":"crossref","unstructured":"Liu Q, Jia J, Li P, et\u00a0al (2020) Increased photosynthesis and grain yields in maize grown with less irrigation water combined with density adjustment in semiarid regions. PeerJ 8(1)","DOI":"10.7717\/peerj.9959"},{"issue":"6","key":"20844_CR23","doi-asserted-by":"publisher","first-page":"78","DOI":"10.9734\/cjast\/2021\/v40i631320","volume":"40","author":"R Manne","year":"2021","unstructured":"Manne R, Kantheti SC (2021) Application of artificial intelligence in healthcare: chances and challenges. Current J Appl Sci Technol 40(6):78\u201389","journal-title":"Current J Appl Sci Technol"},{"key":"20844_CR24","doi-asserted-by":"crossref","unstructured":"Mohanasundaram S, Ramirez-Asis E, Quispe-Talla A, et\u00a0al (2021) Experimental replacement of hops by mango in beer: production and comparison of total phenolics, flavonoids, minerals, carbohydrates, proteins and toxic substances. Int J Syst Assurance Eng Manag","DOI":"10.1007\/s13198-021-01308-3"},{"key":"20844_CR25","doi-asserted-by":"crossref","unstructured":"Nagar P, Menaria HK, Tiwari M (2020) Novel approach of intrusion detection classification deeplearning using SVM. In: first international conference on sustainable technologies for computational intelligence. Springer","DOI":"10.1007\/978-981-15-0029-9_29"},{"issue":"4","key":"20844_CR26","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1016\/j.compag.2019.05.027","volume":"162","author":"NK Nawandar","year":"2019","unstructured":"Nawandar NK, Satpute VR (2019) IoT based low cost and intelligent module for smart irrigation system. Comput Electron Agric 162(4):979\u2013990","journal-title":"Comput Electron Agric"},{"key":"20844_CR27","doi-asserted-by":"crossref","unstructured":"opez JAL, Garcia-Sanchez AJ, Soto F et al (2011) Design and validation of a wireless sensor network architecture for precision horticulture applications. Precision Agric 12(2):280\u2013295","DOI":"10.1007\/s11119-010-9178-1"},{"issue":"3","key":"20844_CR28","first-page":"58","volume":"4","author":"A Patel","year":"2015","unstructured":"Patel A, Jain A (2015) A study of various black hole attack techniques and IDS in MANET. Int J Advan Comput Technol 4(3):58\u201362","journal-title":"Int J Advan Comput Technol"},{"key":"20844_CR29","doi-asserted-by":"crossref","unstructured":"Phasinam K, Kassanuk T, Shinde PP (2022) Application of IoT and cloud computing in automation of agriculture irrigation. J Food Quality 2022","DOI":"10.1155\/2022\/8285969"},{"key":"20844_CR30","doi-asserted-by":"crossref","unstructured":"Raghuvanshi A, Singh UK, Sajja GS, et\u00a0al (2022) Intrusion detection using machine learning for risk mitigation in IoT-enabled smart irrigationin smart farming. Int J Food Quality 2022(3955514)","DOI":"10.1155\/2022\/3955514"},{"key":"20844_CR31","doi-asserted-by":"crossref","unstructured":"Rakhra R, Singh TK, Lohani M, et\u00a0al (2021) Metaheuristic and machine learning-based smart engine for renting and sharing of agriculture equipment. Math Problems Eng 2021","DOI":"10.1155\/2021\/5561065"},{"key":"20844_CR32","doi-asserted-by":"crossref","unstructured":"Rehman A, Saba T, Kashif M, et\u00a0al (2022) A revisit of internet of things technologies for monitoring and control strategies in smart agriculture. Article ID 12","DOI":"10.3390\/agronomy12010127"},{"issue":"12","key":"20844_CR33","first-page":"1848","volume":"2","author":"S Revathi","year":"2013","unstructured":"Revathi S, Malathi DA (2013) A detailed analysis on NSLKDD dataset using various machine learning techniques for intrusion detection. Int J Eng Res Technol 2(12):1848\u20131853","journal-title":"Int J Eng Res Technol"},{"issue":"7","key":"20844_CR34","first-page":"5852","volume":"7","author":"KS Sahoo","year":"2019","unstructured":"Sahoo KS, Puthal D, Tiwary M (2019) Efficient switch migration-based load balancing for multi-controller SDN in IoT. IEEE Internet ings J 7(7):5852\u20135860","journal-title":"IEEE Internet ings J"},{"key":"20844_CR35","doi-asserted-by":"crossref","unstructured":"Schleicher JM, ogler MV, Inzinger C, et\u00a0al (2017) Modeling and management of usage-aware distributed datasets for global smart city application ecosystems. PeerJ Comput Sci 3(11)","DOI":"10.7717\/peerj-cs.115"},{"key":"20844_CR36","doi-asserted-by":"crossref","unstructured":"Schnfeld R, Heil L, Bittner (2018) Big Data on a Farm Smart Farming","DOI":"10.1007\/978-3-319-62461-7_12"},{"issue":"1","key":"20844_CR37","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1080\/20430795.2017.1331118","volume":"8","author":"W Sherwood","year":"2018","unstructured":"Sherwood W, Pollard JL (2018) e risk-adjusted return potential of integrating ESG strategies into emerging market equities. J Sustainable Finance Investment 8(1):26\u201344","journal-title":"J Sustainable Finance Investment"},{"key":"20844_CR38","doi-asserted-by":"crossref","unstructured":"Sivash O, Ushakov D, Ermilova M (2019) Investment process resource provision in the agricultural sector. IOP Conf Ser: Earth Environ Sci 272","DOI":"10.1088\/1755-1315\/272\/3\/032118"},{"key":"20844_CR39","doi-asserted-by":"crossref","unstructured":"Tao W, Zhao L, Wang G, et\u00a0al (2021) Review of the internet of things communication technologies in smart agriculture and challenges. Comput Electron Agriculture 189","DOI":"10.1016\/j.compag.2021.106352"},{"key":"20844_CR40","volume-title":"Canadian Institute for Cybersecurity","author":"AGM Tavallaee","year":"2018","unstructured":"Tavallaee AGM, Bagheri E, Lu W (2018) Canadian Institute for Cybersecurity. UNB, NSL-KDD Dataset"},{"issue":"9","key":"20844_CR41","doi-asserted-by":"publisher","first-page":"2812","DOI":"10.1109\/JSEN.2016.2523061","volume":"16","author":"W Tsai","year":"2016","unstructured":"Tsai W, Hong TP, Shiu GN (2016) Metaheuristics for the lifetime of WSN: a review. IEEE Sens J 16(9):2812\u20132831","journal-title":"IEEE Sens J"},{"key":"20844_CR42","doi-asserted-by":"crossref","unstructured":"Ushakov M, Vinichenko E, Frolova (2019) Environmental capital: a reason for interregional differentiation or a factor of economy stimulation (the case of Russia. IOP Conf Ser: Earth Environ Sci 272(3)","DOI":"10.1088\/1755-1315\/272\/3\/032111"},{"issue":"3","key":"20844_CR43","doi-asserted-by":"publisher","first-page":"1180","DOI":"10.30892\/gtg.31333-556","volume":"31","author":"V Ushakov","year":"2020","unstructured":"Ushakov V, Fedorchenko V, Fedorchenko N et al (2020) Brief geographical and historic overview of tourism transnationalization. Geojournal Tourism Geosites 31(3):1180\u20131185","journal-title":"Geojournal Tourism Geosites"},{"key":"20844_CR44","doi-asserted-by":"crossref","unstructured":"Varghese R, Sharma S (2018) Affordable smart farming using IoT and machine learning. In: Proceedings of the IEEE Second International Conference on Intelligent Computing and Control Systems (ICICCS), pp 645\u2013650","DOI":"10.1109\/ICCONS.2018.8663044"},{"key":"20844_CR45","doi-asserted-by":"crossref","unstructured":"Verma N, Rakhra M, Bhatt MW, et\u00a0al (2022) Engineering technology characterization of source solution for ZnO and their data analytics effect with aloe vera extract. Neuroscience Inform 2(3)","DOI":"10.1016\/j.neuri.2021.100015"},{"key":"20844_CR46","doi-asserted-by":"crossref","unstructured":"Visumathi J, Shunmuganathan KL (2011) A computational intelligence for evaluation of intrusion detection system. Indian J Sci Technol 4(1)","DOI":"10.17485\/ijst\/2011\/v4i1.16"},{"key":"20844_CR47","doi-asserted-by":"crossref","unstructured":"Wang B, Yao X, Jiang Y, et\u00a0al (2021) Design of a real-time monitoring system for smoke and dust in thermal power plants based on improved genetic algorithm. Journal of Healthcare Engineering 2021","DOI":"10.1155\/2021\/7212567"},{"key":"20844_CR48","doi-asserted-by":"crossref","unstructured":"Wang W, Wu J, Xiao Q, et\u00a0al (2020) Effects of different drip irrigation modes on water use efficiency of pear trees in northern China. Agricultural Water Manag 245","DOI":"10.1016\/j.agwat.2020.106660"},{"key":"20844_CR49","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","volume":"84","author":"BB Zarpel\u00e3o","year":"2017","unstructured":"Zarpel\u00e3o BB, Miani RS, Kawakani CT et al (2017) A survey of intrusion detection in Internet of Things. J Netw Comput Appl 84:25\u201337","journal-title":"J Netw Comput Appl"},{"issue":"7","key":"20844_CR50","doi-asserted-by":"publisher","first-page":"850","DOI":"10.3390\/sym16070850","volume":"16","author":"Z Zhang","year":"2024","unstructured":"Zhang Z, Kong S, Xiao T et al (2024) A network intrusion detection method based on bagging ensemble. Symmetry 16(7):850. https:\/\/doi.org\/10.3390\/sym16070850","journal-title":"Symmetry"}],"updated-by":[{"DOI":"10.1007\/s11042-026-21576-0","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T00:00:00Z","timestamp":1777075200000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20844-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-025-20844-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20844-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T05:23:01Z","timestamp":1777094581000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-025-20844-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,24]]},"references-count":50,"journal-issue":{"issue":"34","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["20844"],"URL":"https:\/\/doi.org\/10.1007\/s11042-025-20844-9","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,24]]},"assertion":[{"value":"21 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2026","order":6,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":7,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article has been retracted. Please see the Retraction Notice for more detail:","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11042-026-21576-0","URL":"https:\/\/doi.org\/10.1007\/s11042-026-21576-0","order":9,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Allowed","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Allowed","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Allowed","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}},{"value":"The authors have no financial or other conflicts of interests to declare.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}