{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T21:05:29Z","timestamp":1778015129269,"version":"3.51.4"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,8,3]],"date-time":"2021-08-03T00:00:00Z","timestamp":1627948800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,3]],"date-time":"2021-08-03T00:00:00Z","timestamp":1627948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11227-021-04001-1","type":"journal-article","created":{"date-parts":[[2021,8,3]],"date-time":"2021-08-03T14:02:49Z","timestamp":1627999369000},"page":"3646-3675","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":80,"title":["An intelligent fault detection approach based on reinforcement learning system in wireless sensor network"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4299-7756","authenticated-orcid":false,"given":"Tariq","family":"Mahmood","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1995-9249","authenticated-orcid":false,"given":"Jianqiang","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1545-9204","authenticated-orcid":false,"given":"Yan","family":"Pei","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6755-1972","authenticated-orcid":false,"given":"Faheem","family":"Akhtar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4605-9265","authenticated-orcid":false,"given":"Suhail Ashfaq","family":"Butt","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1519-5982","authenticated-orcid":false,"given":"Allah","family":"Ditta","sequence":"additional","affiliation":[]},{"given":"Sirajuddin","family":"Qureshi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,3]]},"reference":[{"issue":"4","key":"4001_CR1","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1023\/A:1019106118419","volume":"6","author":"YB Ko","year":"2000","unstructured":"Ko YB, Vaidya NH (2000) Location-aided routing (lar) in mobile ad hoc networks. Wirel Netw, 6(4):307\u2013321","journal-title":"Wirel Netw"},{"key":"4001_CR2","doi-asserted-by":"crossref","unstructured":"Biswas S, Das R, Chatterjee P (2018) Energy-efficient connected target coverage in multi-hop wireless sensor networks. Ind Interactive Innov Sci Eng Technol, pp 411\u2013421. Springer","DOI":"10.1007\/978-981-10-3953-9_40"},{"key":"4001_CR3","doi-asserted-by":"crossref","unstructured":"Sotheara S, Aso K, Aomi N, Shimamoto S (2014) Effective data gathering and energy efficient communication protocol in wireless sensor networks employing uav. In: 2014 IEEE wireless communications and networking Conference (WCNC), pages 2342\u20132347. IEEE","DOI":"10.1109\/WCNC.2014.6952715"},{"key":"4001_CR4","first-page":"1","volume":"40","author":"J Amutha","year":"2021","unstructured":"Amutha J, Sharma S, Sharma SK (2021) Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: review, taxonomy, research findings, challenges and future directions. Comput Sci Revi, 40:1\u201345","journal-title":"Comput Sci Revi"},{"issue":"3","key":"4001_CR5","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1016\/j.jnca.2011.12.006","volume":"35","author":"O Diallo","year":"2012","unstructured":"Diallo O, Rodrigues JJ, Sene M (2012) Real-time data management on wireless sensor networks: a survey. J Netw Comput Appl, 35(3), 1013\u20131021","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"4001_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSEN.2020.3042733","volume":"21","author":"O Kanoun","year":"2021","unstructured":"Kanoun O, Bradai S, Khriji S, Bouattour G, El Houssaini D, Ben Ammar M, Naifar S, Bouhamed A., Derbel F, Viehweger C, (2021) Energy-aware system design for autonomous wireless sensor nodes: a comprehensive review. Sensors, 21(2): 1\u201325","journal-title":"Sensors"},{"key":"4001_CR7","doi-asserted-by":"crossref","unstructured":"Papadimitratos P and Haas Z (2002) Secure routing for mobile ad hoc networks. In: communication networks and distributed systems modeling and simulation Conference (CNDS 2002), number CONF, pp 1\u201313. SCS","DOI":"10.1201\/9781420040401.ch31"},{"key":"4001_CR8","doi-asserted-by":"crossref","unstructured":"Heinzelman WR, Chandrakasan A, Balakrishnan H (2000) Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd annual Hawaii international Conference on system sciences, pages 1\u201310. IEEE","DOI":"10.1109\/HICSS.2000.926982"},{"issue":"4","key":"4001_CR9","first-page":"2748","volume":"4","author":"N Chawla","year":"2014","unstructured":"Chawla N, Jasuja A (2014) Algorithm for optimizing first node die (fnd) time in leach protocol. Int J Curr Eng Technol, 4(4): 2748\u20132750","journal-title":"Int J Curr Eng Technol"},{"issue":"1","key":"4001_CR10","first-page":"1","volume":"10","author":"W Tiberti","year":"2021","unstructured":"Tiberti W, Cassioli D, Di Marco A, Pomante L, Santic M (2021) A model-based approach for adaptable middleware evolution in wsn platforms. J Sensor Actuator Netw, 10(1): 1\u201322","journal-title":"J Sensor Actuator Netw"},{"issue":"4\u20135","key":"4001_CR11","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1016\/j.sysarc.2012.12.003","volume":"59","author":"M Qiu","year":"2013","unstructured":"Qiu M, Ming Z, Li J, Liu J, Quan G, Zhu Y (2013) Informer homed routing fault tolerance mechanism for wireless sensor networks. J Syst Archit, 59(4\u20135): 260\u2013270","journal-title":"J Syst Archit"},{"issue":"5","key":"4001_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14569\/IJACSA.2019.0100576","volume":"10","author":"T Mahmood","year":"2019","unstructured":"Mahmood T, Akhtar F, Ur Rehman K, Ali S, Mokbal FM, Daudpota S (2019) A comprehensive survey on the performance analysis of underwater wireless sensor networks (uwsn) routing protocols. IJACSA, 10(5):1\u201311","journal-title":"IJACSA"},{"issue":"7553","key":"4001_CR13","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1038\/nature14540","volume":"521","author":"L Littman Michael","year":"2015","unstructured":"Littman Michael L (2015) Reinforcement learning improves behaviour from evaluative feedback. Nature, 521(7553): 445\u2013451","journal-title":"Nature"},{"key":"4001_CR14","doi-asserted-by":"crossref","unstructured":"Wang D, Liu J, Yao D, Member IEEE (2020) An energy-efficient distributed adaptive cooperative routing based on reinforcement learning in wireless multimedia sensor networks. Comput Netw, pp 1\u201312","DOI":"10.1016\/j.comnet.2020.107313"},{"key":"4001_CR15","unstructured":"Banerjee A, Sufian A (2020) Reinforcement learning based transmission range control (rl-trc) in sd-wsn with moving sensors. arXiv preprint arXiv:2005.08215, pp 1\u201327"},{"key":"4001_CR16","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.procs.2017.12.034","volume":"125","author":"P Sivakumar","year":"2018","unstructured":"Sivakumar P, Radhika M (2018) Performance analysis of leach-ga over leach and leach-c in wsn. Procedia Comput Sci, 125:248\u2013256","journal-title":"Procedia Comput Sci"},{"issue":"1","key":"4001_CR17","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s11276-014-0782-2","volume":"21","author":"M Azharuddin","year":"2015","unstructured":"Azharuddin M, Jana Prasanta K (2015) A distributed algorithm for energy efficient and fault tolerant routing in wireless sensor networks. Wirel Netw, 21(1), 251\u2013267","journal-title":"Wirel Netw"},{"issue":"3","key":"4001_CR18","doi-asserted-by":"publisher","first-page":"1581","DOI":"10.1109\/TII.2019.2927292","volume":"16","author":"F Shi","year":"2019","unstructured":"Shi F, Tuo X, Yang SX, Lu J, Li H (2019) Rapid-flooding time synchronization for large-scale wireless sensor networks. IEEE Trans Ind Inf, 16(3): 1581\u20131590","journal-title":"IEEE Trans Ind Inf"},{"issue":"3","key":"4001_CR19","first-page":"316","volume":"24","author":"T Mahmood","year":"2020","unstructured":"Mahmood T, Akhtar F, Rehman KU, Azeem M, Mudassir A, Daudpota SM (2020) Introducing robustness in dbr routing protocol. Int J Commun Netw Distrib Syst, 24(3): 316\u2013338","journal-title":"Int J Commun Netw Distrib Syst"},{"key":"4001_CR20","doi-asserted-by":"crossref","unstructured":"Tripathi M, Gaur MS, Laxmi V, Battula RB (2013) Energy efficient leach-c protocol for wireless sensor network. pp 1\u20134","DOI":"10.1155\/2013\/843626"},{"issue":"8","key":"4001_CR21","first-page":"14","volume":"10","author":"B Ali","year":"2019","unstructured":"Ali B, Mahmood T, Mirza MA, Memon S, Rashid M, Ajebesone EF (2019) Study and analysis of delay sensitive and energy efficient routing approach. IJACSA, 10(8):14\u201320","journal-title":"IJACSA"},{"issue":"7","key":"4001_CR22","first-page":"118","volume":"9","author":"SY Moon","year":"2009","unstructured":"Moon SY, Cho TH (2009) Intrusion detection scheme against sinkhole attacks in directed diffusion based sensor networks. Int J Comput Sci Netw Secur, 9(7): 118\u2013122","journal-title":"Int J Comput Sci Netw Secur"},{"key":"4001_CR23","doi-asserted-by":"crossref","unstructured":"Loscri V, Morabito G, Marano S (2005) A two-levels hierarchy for low-energy adaptive clustering hierarchy (tl-leach). In: IEEE vehicular technology conference, 62, pp 1809\u20131813. IEEE","DOI":"10.1109\/VETECF.2005.1558418"},{"key":"4001_CR24","doi-asserted-by":"crossref","unstructured":"Ko YB, Choi JM, and Kim JH (2004) A new directional flooding protocol for wireless sensor networks. In: international Conference on information networking, pp 93\u2013102. Springer","DOI":"10.1007\/978-3-540-25978-7_10"},{"issue":"1","key":"4001_CR25","first-page":"35","volume":"53","author":"H Zhe","year":"2009","unstructured":"Zhe H, Maiko S (2009) New bounds on the minimum number of calls in failure-tolerant gossiping. Netw Int J, 53(1):35\u201338","journal-title":"Netw Int J"},{"issue":"2","key":"4001_CR26","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1007\/s11276-019-02142-z","volume":"26","author":"SA Dehkordi","year":"2020","unstructured":"Dehkordi SA, Farajzadeh K, Rezazadeh J, Farahbakhsh R, Sandrasegaran K, Dehkordi MA (2020) A survey on data aggregation techniques in iot sensor networks. Wirel Netw, 26(2): 1243\u20131263","journal-title":"Wirel Netw"},{"key":"4001_CR27","doi-asserted-by":"crossref","unstructured":"Lindsey S and Raghavendra CS (2020) Pegasis: power-efficient gathering in sensor information systems. In: Proceedings, IEEE aerospace conference, 3: 1125\u20131130. IEEE","DOI":"10.1109\/AERO.2002.1035242"},{"key":"4001_CR28","first-page":"1","volume":"1","author":"M Arati","year":"2001","unstructured":"Arati M and Agrawal Dharma P (2001) Teen: arouting protocol for enhanced efficiency in wireless sensor networks. In ipdps, 1: 1\u20137","journal-title":"ipdps"},{"key":"4001_CR29","unstructured":"Yao Y, Gehrke J, et al. (2003) Query processing in sensor networks. In Cidr, pp 233\u2013244"},{"issue":"4","key":"4001_CR30","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/TMC.2004.41","volume":"3","author":"O Younis","year":"2004","unstructured":"Younis O, Fahmy S (2004) Heed: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Trans Mobile Comput, 3(4):366\u2013379","journal-title":"IEEE Trans Mobile Comput"},{"key":"4001_CR31","doi-asserted-by":"crossref","unstructured":"Qiu M, Liu J, Li J, Fei Z, Ming Z, Edwin HM (2011) A novel energy-aware fault tolerance mechanism for wireless sensor networks. In: 2011 IEEE\/ACM international Conference on green computing and communications, pp 56\u201361. IEEE","DOI":"10.1109\/GreenCom.2011.18"},{"key":"4001_CR32","doi-asserted-by":"crossref","unstructured":"Liu X, Cao J, Bhuiyan M, Lai S, Wu H, Wang G (2011) Fault tolerant wsn-based structural health monitoring. In: 2011 IEEE\/IFIP 41st international Conference on dependable systems and networks (DSN), pp 37\u201348. IEEE","DOI":"10.1109\/DSN.2011.5958205"},{"issue":"03","key":"4001_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0218126614500418","volume":"23","author":"MN Cheraghlou","year":"2014","unstructured":"Cheraghlou MN, Haghparast M (2014) A novel fault-tolerant leach clustering protocol for wireless sensor networks. J Circuits Syst Comput, 23(03): 1\u201317","journal-title":"J Circuits Syst Comput"},{"issue":"2","key":"4001_CR34","first-page":"624","volume":"5","author":"M Mehdi","year":"2017","unstructured":"Mehdi M, A Al-Fuqaha, M Guizani, JS Oh (2017) Semisupervised deep reinforcement learning in support of iot and smart city services. IEEE Internet Things J, 5(2): 624\u2013635","journal-title":"IEEE Internet Things J"},{"issue":"12","key":"4001_CR35","doi-asserted-by":"publisher","first-page":"2773","DOI":"10.1109\/JSAC.2020.3005495","volume":"38","author":"F Tang","year":"2020","unstructured":"Tang F, Zhou, Y, Kato N (2020) Deep reinforcement learning for dynamic uplink\/downlink resource allocation in high mobility 5g hetnet. IEEE J Sel Areas Commun, 38(12): 2773\u20132782","journal-title":"IEEE J Sel Areas Commun"},{"issue":"1","key":"4001_CR36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/dac.4637","volume":"34","author":"N Ajmi","year":"2021","unstructured":"Ajmi N, Helali A, Lorenz P, Mghaieth R (2021) Speech-mac: special purpose energy-efficient contention-based hybrid mac protocol for wsn and zigbee network. Int J Commun Syst, 34(1): 1\u201318","journal-title":"Int J Commun Syst"},{"key":"4001_CR37","doi-asserted-by":"crossref","unstructured":"Zhao T, Xu XB, Wang SG (2020) Centralized q-learning based routing in eh-wsns with dual alternative batteries. J Phys Conf Series, 1544: 1\u201310. IOP Publishing","DOI":"10.1088\/1742-6596\/1544\/1\/012083"},{"key":"4001_CR38","doi-asserted-by":"crossref","unstructured":"Seah MWM, Tham CK, Srinivasan V, Xin A (2007) Achieving coverage through distributed reinforcement learning in wireless sensor networks. In: 2007 3rd international Conference on intelligent sensors, sensor networks and information, pp 425\u2013430. IEEE","DOI":"10.1109\/ISSNIP.2007.4496881"},{"key":"4001_CR39","doi-asserted-by":"crossref","unstructured":"Wang CW, Xia Q, Yao X, Wang W, Jornet JM (2018) Multi-hop deflection routing algorithm based on q-learning for energy-harvesting nanonetworks. In: 2018 IEEE 15th international Conference on mobile ad hoc and sensor systems (MASS), pp 362\u2013370. IEEE","DOI":"10.1109\/MASS.2018.00059"},{"key":"4001_CR40","doi-asserted-by":"crossref","unstructured":"Bouzid SE, Serrestou Y, Raoof K, Omri MN (2020) Efficient routing protocol for wireless sensor network based on reinforcement learning. In 2020 5th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), pp 1\u20135","DOI":"10.1109\/ATSIP49331.2020.9231883"},{"key":"4001_CR41","doi-asserted-by":"crossref","unstructured":"Sun P, Lan J, Guo Z, Xu Y, Hu Y (2020) Improving the scalability of deep reinforcement learning-based routing with control on partial nodes. In: ICASSP 2020-2020 IEEE international Conference on acoustics, speech and signal processing (ICASSP), pp 3557\u20133561. IEEE","DOI":"10.1109\/ICASSP40776.2020.9054483"},{"issue":"1","key":"4001_CR42","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/s10776-019-00463-6","volume":"27","author":"RN Raj","year":"2020","unstructured":"Raj RN, Nayak A, Kumar MS (2020) A survey and performance evaluation of reinforcement learning based spectrum aware routing in cognitive radio ad hoc networks. Int J Wirel Inf Netw, 27(1): 144\u2013163","journal-title":"Int J Wirel Inf Netw"},{"issue":"1","key":"4001_CR43","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.jnca.2011.08.007","volume":"35","author":"KLA Yau","year":"2012","unstructured":"Yau KLA., Komisarczuk P, Teal PD (2012) Reinforcement learning for context awareness and intelligence in wireless networks: review, new features and open issues. J Netw Comput Appl, 35(1), 253\u2013267","journal-title":"J Netw Comput Appl"},{"key":"4001_CR44","unstructured":"Sutton RS, Barto AG (2018) Reinforcement learning: an introduction. MIT press"},{"key":"4001_CR45","unstructured":"Junping H, Yuhui J and Liang D (2008) A time-based cluster-head selection algorithm for leach. In: 2008 IEEE symposium on computers and communications, pp. 1172\u20131176. IEEE"},{"key":"4001_CR46","doi-asserted-by":"crossref","unstructured":"Ali MS, Dey T, Biswas R (2008) Aleach: advanced leach routing protocol for wireless microsensor networks. In: 2008 international Conference on electrical and computer engineering, pp. 909\u2013914. IEEE","DOI":"10.1109\/ICECE.2008.4769341"},{"issue":"1","key":"4001_CR47","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s11276-015-0951-y","volume":"22","author":"PK Batra","year":"2016","unstructured":"Batra PK, Kant K (2016) Leach-mac: a new cluster head selection algorithm for wireless sensor networks. Wirel Netw, 22(1): 49\u201360","journal-title":"Wirel Netw"},{"key":"4001_CR48","doi-asserted-by":"crossref","unstructured":"Subhashree VK, Tharini C, Swarna LM (2014) Modified leach: a qos-aware clustering algorithm for wireless sensor networks. In: 2014 international Conference on communication and network technologies, pages 119\u2013123. IEEE","DOI":"10.1109\/CNT.2014.7062737"},{"key":"4001_CR49","doi-asserted-by":"crossref","unstructured":"Kumar GS, Vinu PMV, Jacob KP (2008) Mobility metric based leach-mobile protocol. In: 2008 16th international Conference on advanced computing and communications, pages 248\u2013253. IEEE, 2008","DOI":"10.1109\/ADCOM.2008.4760456"},{"key":"4001_CR50","doi-asserted-by":"crossref","unstructured":"Sharma V, Alam B, Doja MN (2019) An improvement in dsr routing protocol of manets using anfis. In applications of artificial intelligence techniques in engineering, pages 569\u2013576. Springer","DOI":"10.1007\/978-981-13-1822-1_53"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04001-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04001-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04001-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:37:51Z","timestamp":1725561471000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04001-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,3]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["4001"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04001-1","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,3]]},"assertion":[{"value":"12 July 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}