{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:41:17Z","timestamp":1771702877876,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T00:00:00Z","timestamp":1675814400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T00:00:00Z","timestamp":1675814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11227-023-05053-1","type":"journal-article","created":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T19:40:31Z","timestamp":1675885231000},"page":"10481-10504","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A modified k-means-based cluster head selection and Philippine eagle optimization-based secure routing for MANET"],"prefix":"10.1007","volume":"79","author":[{"given":"R.","family":"Saravanan","sequence":"first","affiliation":[]},{"given":"K.","family":"Suresh","sequence":"additional","affiliation":[]},{"given":"S. S.","family":"Arumugam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,8]]},"reference":[{"key":"5053_CR1","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1016\/j.gltp.2021.10.001","volume":"3","author":"R Prasad","year":"2021","unstructured":"Prasad R (2021) Enhanced energy efficient secure routing protocol for mobile ad-hoc network. Global Trans Proc 3:412\u2013423","journal-title":"Global Trans Proc"},{"key":"5053_CR2","doi-asserted-by":"crossref","unstructured":"Srilakshmi R and Muthukuru J (2021) Intrusion detection in mobile ad-hoc network using hybrid reactive search and bat algorithm. Int J Intell Unmanned Syst","DOI":"10.1108\/IJIUS-09-2020-0049"},{"issue":"3","key":"5053_CR3","first-page":"2818","volume":"12","author":"IA Alameri","year":"2022","unstructured":"Alameri IA, Komarkova J (2022) Performance and statistical analysis of ant colony route in mobile ad-hoc networks. Int J Electr Comput Eng (2088-8708) 12(3):2818\u20132828","journal-title":"Int J Electr Comput Eng (2088-8708)"},{"key":"5053_CR4","doi-asserted-by":"publisher","first-page":"163043","DOI":"10.1109\/ACCESS.2021.3133882","volume":"9","author":"U Srilakshmi","year":"2021","unstructured":"Srilakshmi U, Veeraiah N, Alotaibi Y, Alghamdi SA, Khalaf OI, Subbayamma BV (2021) an improved hybrid secure multipath routing protocol for MANET. IEEE Access 9:163043\u2013163053","journal-title":"IEEE Access"},{"key":"5053_CR5","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.adhoc.2019.03.001","volume":"89","author":"TK Saini","year":"2019","unstructured":"Saini TK, Sharma SC (2019) Prominent unicast routing protocols for mobile ad hoc networks: criterion, classification, and key attributes. Ad Hoc Netw 89:58\u201377","journal-title":"Ad Hoc Netw"},{"issue":"4","key":"5053_CR6","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1007\/s11276-022-02913-1","volume":"28","author":"M Prasad","year":"2022","unstructured":"Prasad M, Tripathi S, Dahal K (2022) An enhanced detection system against routing attacks in mobile ad-hoc network. Wireless Netw 28(4):1411\u20131428","journal-title":"Wireless Netw"},{"key":"5053_CR7","doi-asserted-by":"publisher","first-page":"8814141","DOI":"10.1155\/2021\/8814141","volume":"2021","author":"G Farahani","year":"2021","unstructured":"Farahani G (2021) Black hole attack detection using K-nearest neighbor algorithm and reputation calculation in mobile ad hoc networks. Secur Commun Netw 2021:8814141","journal-title":"Secur Commun Netw"},{"key":"5053_CR8","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1016\/j.matpr.2021.08.039","volume":"50","author":"B Reddy","year":"2022","unstructured":"Reddy B, Dhananjaya B (2022) The AODV routing protocol with built-in security to counter blackhole attack in MANET. Mater Today Proc 50:1152\u20131158","journal-title":"Mater Today Proc"},{"issue":"4","key":"5053_CR9","doi-asserted-by":"publisher","first-page":"3063","DOI":"10.1007\/s11277-021-08387-2","volume":"119","author":"K Karthick","year":"2021","unstructured":"Karthick K, Asokan R (2021) Mobility aware quality enhanced cluster based routing protocol for mobile ad-hoc networks using hybrid optimization algorithm. Wirel Pers Commun 119(4):3063\u20133087","journal-title":"Wirel Pers Commun"},{"key":"5053_CR10","doi-asserted-by":"publisher","first-page":"14260","DOI":"10.1109\/ACCESS.2022.3144679","volume":"10","author":"U Srilakshmi","year":"2022","unstructured":"Srilakshmi U, Alghamdi SA, Vuyyuru VA, Veeraiah N, Alotaibi Y (2022) A secure optimization routing algorithm for mobile ad hoc networks. IEEE Access 10:14260\u201314269","journal-title":"IEEE Access"},{"issue":"7","key":"5053_CR11","doi-asserted-by":"publisher","first-page":"6987","DOI":"10.1007\/s12652-020-02358-4","volume":"12","author":"P Sathyaraj","year":"2021","unstructured":"Sathyaraj P, Rukmani Devi D (2021) Designing the routing protocol with secured IoT devices and QoS over Manet using trust-based performance evaluation method. J Ambient Intell Hum Comput 12(7):6987\u20136995","journal-title":"J Ambient Intell Hum Comput"},{"issue":"5","key":"5053_CR12","doi-asserted-by":"publisher","first-page":"1076","DOI":"10.1007\/s12083-019-00766-8","volume":"12","author":"AR Rajeswari","year":"2019","unstructured":"Rajeswari AR, Kulothungan K, Ganapathy S, Kannan A (2019) A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. Peer Peer Netw Appl 12(5):1076\u20131096","journal-title":"Peer Peer Netw Appl"},{"key":"5053_CR13","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.comcom.2019.09.005","volume":"148","author":"N Rajendran","year":"2019","unstructured":"Rajendran N, Jawahar PK, Priyadarshini R (2019) Cross centric intrusion detection system for secure routing over black hole attacks in MANETs. Comput Commun 148:129\u2013135","journal-title":"Comput Commun"},{"key":"5053_CR14","doi-asserted-by":"crossref","first-page":"e4713","DOI":"10.1002\/dac.4713","volume":"35","author":"YM Mahaboob John","year":"2021","unstructured":"Mahaboob John YM, Ravi G (2021) Real time regional mobility energy feature approximation-based secure routing for improved quality of service in MANET. Int J Commun Syst 35:e4713","journal-title":"Int J Commun Syst"},{"key":"5053_CR15","doi-asserted-by":"publisher","first-page":"177534","DOI":"10.1109\/ACCESS.2020.3027043","volume":"8","author":"A Bhardwaj","year":"2020","unstructured":"Bhardwaj A, El-Ocla H (2020) Multipath routing protocol using genetic algorithm in mobile ad hoc networks. IEEE Access 8:177534\u2013177548","journal-title":"IEEE Access"},{"key":"5053_CR16","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1016\/j.procs.2018.05.064","volume":"132","author":"MK Garg","year":"2018","unstructured":"Garg MK, Singh N, Verma P (2018) A fuzzy rule-based approach for design and analysis of a trust-based secure routing protocol for MANETs. Procedia Comput Sci 132:653\u2013658","journal-title":"Procedia Comput Sci"},{"issue":"11","key":"5053_CR17","first-page":"2704","volume":"14","author":"NR Srinadh","year":"2019","unstructured":"Srinadh NR, Satyanarayana B (2019) The power-aware secure routing protocol in MANET is based on a reputation model and optimization. Int J Appl Eng Res 14(11):2704\u20132716","journal-title":"Int J Appl Eng Res"},{"key":"5053_CR18","doi-asserted-by":"crossref","unstructured":"Shahdad SY, Khan M, Sultana H, Hussain MA and Bilfaqih SM (2019) Routing protocols for constraint devices internet of things network. In: 2019 International Conference on Communication and Signal Processing (ICCSP) 0114\u20130117. IEEE","DOI":"10.1109\/ICCSP.2019.8697933"},{"issue":"1","key":"5053_CR19","first-page":"221","volume":"31","author":"L Ting","year":"2022","unstructured":"Ting L, Khan M, Sharma A, Ansari MD (2022) A secure framework for IoT-based smart climate agriculture system: toward blockchain and edge computing. J Intell Syst 31(1):221\u2013236","journal-title":"J Intell Syst"},{"issue":"4","key":"5053_CR20","doi-asserted-by":"publisher","first-page":"267","DOI":"10.12720\/jcm.14.4.267-274","volume":"14","author":"VK Quy","year":"2019","unstructured":"Quy VK, Ban NT, Han ND (2019) A high-performance routing protocol for multimedia applications in MANETs. J Commun 14(4):267\u2013274","journal-title":"J Commun"},{"issue":"12","key":"5053_CR21","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.12720\/jcm.14.12.1211-1217","volume":"14","author":"VK Quy","year":"2019","unstructured":"Quy VK, Hung LN, Han ND (2019) CEPRM: a cloud-assisted energy-saving and performance-improving routing mechanism for MANETs. J Commun 14(12):1211\u20131217","journal-title":"J Commun"},{"key":"5053_CR22","doi-asserted-by":"crossref","unstructured":"Nguyen VH, Nam V, Linh D and Quy V (2021) An improved agent-based AODV routing protocol for MANET. EAI Endorsed Trans Ind Netw Intell Syst 8(27)","DOI":"10.4108\/eai.23-6-2021.170241"},{"issue":"3","key":"5053_CR23","first-page":"565","volume":"23","author":"B Devika","year":"2020","unstructured":"Devika B, Sudha PN (2020) Power optimization in MANET using topology management. Eng Sci Technol Int J 23(3):565\u2013575","journal-title":"Eng Sci Technol Int J"},{"issue":"15","key":"5053_CR24","doi-asserted-by":"publisher","first-page":"1718","DOI":"10.3390\/math9151718","volume":"9","author":"H Liu","year":"2021","unstructured":"Liu H, Chu Y, Zhang Y, Hou W, Li Y, Yao Y, Cai Y (2021) Strategy of multi-beam spot allocation for GEO data relay satellite based on modified k-means algorithm. Mathematics 9(15):1718","journal-title":"Mathematics"},{"key":"5053_CR25","doi-asserted-by":"publisher","first-page":"29089","DOI":"10.1109\/ACCESS.2022.3158357","volume":"10","author":"EAT Enriquez","year":"2022","unstructured":"Enriquez EAT, Mendoza RG, Velasco ACT (2022) Philippine eagle optimization algorithm. IEEE Access 10:29089\u201329120","journal-title":"IEEE Access"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05053-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05053-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05053-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T14:26:35Z","timestamp":1701872795000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05053-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,8]]},"references-count":25,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["5053"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05053-1","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,8]]},"assertion":[{"value":"9 January 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ehical approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}