{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T19:00:11Z","timestamp":1778698811072,"version":"3.51.4"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T00:00:00Z","timestamp":1761782400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T00:00:00Z","timestamp":1761782400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s11276-025-04032-z","type":"journal-article","created":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:10:04Z","timestamp":1761811804000},"page":"4929-4943","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Implementation of an energy-efficient secure clustering algorithm with trusted path for flying ad hoc networks"],"prefix":"10.1007","volume":"31","author":[{"given":"J. Vijitha","family":"Ananthi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,30]]},"reference":[{"issue":"2","key":"4032_CR1","doi-asserted-by":"publisher","first-page":"30","DOI":"10.3390\/jsan14020030","volume":"14","author":"WM Othman","year":"2025","unstructured":"Othman, W. M., Abdelhamied, A., Ateya, M. E., Nasr, A., Muthanna, M., ElAffendi, A., Koucheryavy, A. & Hamdi, A. A. (2025). Key enabling technologies for 6G: The role of UAVs, Terahertz Communication, and intelligent reconfigurable surfaces in shaping the future of wireless networks. Journal of Sensor and Actuator Networks, 14(2), 30.","journal-title":"Journal of Sensor and Actuator Networks"},{"key":"4032_CR2","doi-asserted-by":"crossref","unstructured":"Neha, M. V., & Thampi, S. M. (2025). Smart surveillance in physical security systems and ethical frameworks in IoD. In Securing the connected world: Exploring emerging threats and innovative solutions (pp. 447\u2013477). Springer.","DOI":"10.1007\/978-3-031-82826-3_13"},{"key":"4032_CR3","doi-asserted-by":"crossref","unstructured":"Son, H., Jang, J., Park, J., Balog, A., Ballantyne, P., Kwon, H. R., Singleton, A., & Hwang, J. (2025). Leveraging advanced technologies for (smart) transportation planning: A systematic review. Sustainability, 17(5), 2245.","DOI":"10.3390\/su17052245"},{"key":"4032_CR4","doi-asserted-by":"crossref","unstructured":"Kundu, J., Alam, S., Das, J. C., Dey, A., & De, D. (2024). Trust based flying ad-hoc network: A survey. IEEE Access.","DOI":"10.1109\/ACCESS.2024.3419904"},{"issue":"1","key":"4032_CR5","doi-asserted-by":"publisher","first-page":"1902","DOI":"10.30574\/wjarr.2024.23.1.2166","volume":"23","author":"E Asituha","year":"2024","unstructured":"Asituha, E. (2024). A comprehensive overview of privacy, security and performance issues in flying ad hoc networks. World Journal of Advanced Research and Reviews, 23(1), 1902\u20131930.","journal-title":"World Journal of Advanced Research and Reviews"},{"issue":"3","key":"4032_CR6","doi-asserted-by":"publisher","first-page":"3743","DOI":"10.1007\/s40747-024-01348-9","volume":"10","author":"S Gupta","year":"2024","unstructured":"Gupta, S., & Sharma, N. (2024). SCFS-securing flying ad hoc network using cluster-based trusted fuzzy scheme. Complex & Intelligent Systems, 10(3), 3743\u20133762.","journal-title":"Complex & Intelligent Systems"},{"issue":"1","key":"4032_CR7","doi-asserted-by":"publisher","first-page":"100170","DOI":"10.1016\/j.hcc.2023.100170","volume":"4","author":"J Ananthi","year":"2024","unstructured":"Ananthi, J., Vijitha, & Subha Hency Jose, P. (2024). Performance of unique and secure routing protocol (USRP) in flying adhoc networks for healthcare applications. High-Confidence Computing, 4(1), 100170.","journal-title":"High-Confidence Computing"},{"issue":"1","key":"4032_CR8","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/s11277-024-11412-9","volume":"137","author":"S Sahoo","year":"2024","unstructured":"Sahoo, S., & Kabat, M. R. (2024). A pragmatic review of QoS optimisations in IoT driven networks. Wireless Personal Communications, 137(1), 325\u2013366.","journal-title":"Wireless Personal Communications"},{"issue":"9","key":"4032_CR9","doi-asserted-by":"publisher","first-page":"7495","DOI":"10.1080\/03772063.2024.2352646","volume":"70","author":"B Jaishankar","year":"2024","unstructured":"Jaishankar, B., Gururaj, B., Muruganandham, A., & Nagarajan, G. (2024). Hybrid clustering approach (SG-MFOA) using multipath cross-layer design in MANET network. IETE Journal of Research, 70(9), 7495\u20137503.","journal-title":"IETE Journal of Research"},{"key":"4032_CR10","unstructured":"Liu, T., & Ramachandran, G., & Jurdak, R. (2024). Post-quantum cryptography for internet of things: A survey on performance and optimization. arXiv preprint arXiv:2401.17538."},{"key":"4032_CR11","doi-asserted-by":"crossref","unstructured":"Kaur, M., Prashar, D., Mrsic, L., & Khan, A. A. (2025). Machine learning-based routing protocol in flying ad hoc networks: A review. Computers Materials & Continua, 82, 2.","DOI":"10.32604\/cmc.2025.059043"},{"key":"4032_CR12","doi-asserted-by":"crossref","unstructured":"Khoshvaght, P., Tanveer, J., Rahmani, A. M., Altulyan, M., Alkhrijah, Y., Yousefpoor, M. S., Yousefpoor, E., Mohammadi, M., & Hosseinzadeh, M. (2025). Computational intelligence-based routing schemes in flying ad-hoc networks (FANETs): A review. Vehicular Communications, 100913.","DOI":"10.1016\/j.vehcom.2025.100913"},{"issue":"4","key":"4032_CR13","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.3390\/s25041194","volume":"25","author":"MA Sen","year":"2025","unstructured":"Sen, M. A., & Al-Rubaye, S. (2025). Securing UAV flying ad hoc wireless networks: Authentication development for robust communications. Sensors (Basel, Switzerland), 25(4), 1194.","journal-title":"Sensors (Basel, Switzerland)"},{"issue":"4","key":"4032_CR14","doi-asserted-by":"publisher","first-page":"e6138","DOI":"10.1002\/dac.6138","volume":"38","author":"V Prabhakar, Prajith","year":"2025","unstructured":"Prabhakar, Prajith, V., Yokesh, P., & Aruchamy (2025). Artificial intelligence-enabled fully echoed Q\u2010routing and adaptive directional medium access control protocol for flying ad\u2010hoc networks. International Journal of Communication Systems, 38(4), e6138.","journal-title":"International Journal of Communication Systems"},{"key":"4032_CR15","doi-asserted-by":"crossref","unstructured":"Paredes, W. D., Kaushal, H., Prodanoff, Z., & Vakilinia, I. (2025). Investigating particle swarm optimization and various mobility algorithms for autonomous navigation in flying ad-hoc networks. Natural Computing 1\u201318.","DOI":"10.1007\/s11047-024-10009-2"},{"key":"4032_CR16","doi-asserted-by":"crossref","unstructured":"Bharany, S., Sharma, S., Badotra, S., Khalaf, O. I. Alotaibi, Y., Alghamdi, S., & Alassery, F. (2021). Energy-efficient clustering scheme for flying ad-hoc networks using an optimized LEACH protocol. Energies, 14(19), 6016.","DOI":"10.3390\/en14196016"},{"key":"4032_CR17","doi-asserted-by":"crossref","unstructured":"Aadil, F., Raza, A., Khan, M. F., Maqsood, M., Mehmood, I., & Rho, S. (2018). Energy aware cluster-based routing in flying ad-hoc networks. Sensors, 18(5), 1413.","DOI":"10.3390\/s18051413"},{"issue":"1","key":"4032_CR18","doi-asserted-by":"publisher","first-page":"7818","DOI":"10.1038\/s41598-024-57480-6","volume":"14","author":"V Chandrasekar","year":"2024","unstructured":"Chandrasekar, V., Shanmugavalli, V., Mahesh, T. R., Shashikumar, R., Borah, N., Kumar, V. V., & Guluwadi, S. (2024). Secure malicious node detection in flying ad-hoc networks using enhanced AODV algorithm. Scientific Reports, 14(1), 7818.","journal-title":"Scientific Reports"},{"issue":"01","key":"4032_CR19","doi-asserted-by":"publisher","first-page":"2341003","DOI":"10.1142\/S1469026823410031","volume":"22","author":"S Sugantha Priya","year":"2023","unstructured":"Sugantha Priya, S., & Mohanraj, M. (2023). An energy-efficient clustering and fuzzy-based path selection for flying ad-hoc networks. International Journal of Computational Intelligence and Applications, 22(01), 2341003.","journal-title":"International Journal of Computational Intelligence and Applications"},{"issue":"3","key":"4032_CR20","doi-asserted-by":"publisher","first-page":"1879","DOI":"10.1007\/s11277-021-08728-1","volume":"127","author":"M Selvakumar","year":"2022","unstructured":"Selvakumar, M., & Sudhakar, B. (2022). Energy efficient clustering with secure routing protocol using hybrid evolutionary algorithms for mobile adhoc networks. Wireless Personal Communications, 127(3), 1879\u20131897.","journal-title":"Wireless Personal Communications"},{"key":"4032_CR21","doi-asserted-by":"crossref","unstructured":"Abdulhae, O. T., Singh Mandeep, J., & Islam, M. (2022). Cluster-based routing protocols for flying ad hoc networks (FANETs). IEEE Access, 10, 32981\u201333004.","DOI":"10.1109\/ACCESS.2022.3161446"},{"issue":"4","key":"4032_CR22","doi-asserted-by":"publisher","first-page":"329","DOI":"10.2174\/0122103279296700240430095450","volume":"14","author":"M Dongare","year":"2024","unstructured":"Dongare, M., Prabhakar, S. R., Jondhale, & Balasaheb Shrirangrao, A. (2024). Novel energy-efficient modified LEACH routing protocol for wireless sensor networks. International Journal of Sensors Wireless Communications and Control, 14(4), 329\u2013341.","journal-title":"International Journal of Sensors Wireless Communications and Control"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-04032-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-025-04032-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-04032-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T16:57:26Z","timestamp":1763485046000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-025-04032-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,30]]},"references-count":22,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["4032"],"URL":"https:\/\/doi.org\/10.1007\/s11276-025-04032-z","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,30]]},"assertion":[{"value":"11 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}