{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T14:05:40Z","timestamp":1773065140388,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T00:00:00Z","timestamp":1615248000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T00:00:00Z","timestamp":1615248000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s11277-021-08352-z","type":"journal-article","created":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T12:58:49Z","timestamp":1615294729000},"page":"577-597","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Novel Fuzzy Based Crow Search Optimization Algorithm for Secure Node-to-Node Data Transmission in WSN"],"prefix":"10.1007","volume":"127","author":[{"given":"Shahana Gajala","family":"Qureshi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3308-4445","authenticated-orcid":false,"given":"Shishir Kumar","family":"Shandilya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,9]]},"reference":[{"issue":"3","key":"8352_CR1","first-page":"198","volume":"7","author":"S Mahajan","year":"2016","unstructured":"Mahajan, S., & Dhiman, P. K. (2016). Clustering in wireless sensor networks: A review. International Journal of Advanced Research in Computer Science, 7(3), 198\u2013201.","journal-title":"International Journal of Advanced Research in Computer Science"},{"issue":"1","key":"8352_CR2","doi-asserted-by":"publisher","first-page":"52","DOI":"10.30537\/sjcms.v2i1.69","volume":"2","author":"AA Mugheri","year":"2018","unstructured":"Mugheri, A. A., Siddiqui, M. A., & Khoso, M. (2018). Analysis on security methods of wireless sensor network (WSN). Sukkur IBA Journal of Computing and Mathematical Sciences, 2(1), 52\u201360.","journal-title":"Sukkur IBA Journal of Computing and Mathematical Sciences"},{"issue":"28","key":"8352_CR3","doi-asserted-by":"publisher","first-page":"42","DOI":"10.5120\/ijca2018916667","volume":"179","author":"C Mallick","year":"2018","unstructured":"Mallick, C., & Satpathy, S. (2018). Challenges and design goals of wireless sensor networks: A state-of-the-art review. International Journal of Computer Applications, 179(28), 42\u201347.","journal-title":"International Journal of Computer Applications"},{"key":"8352_CR4","doi-asserted-by":"crossref","unstructured":"Elhoseny M., & Hassanien A. E. (2019). Secure data transmission in WSN: An overview. In Dynamic wireless sensor networks. Studies in systems, decision and control (vol. 165). Springer.","DOI":"10.1007\/978-3-319-92807-4"},{"key":"8352_CR5","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.comnet.2018.09.015","volume":"146","author":"T Gaber","year":"2018","unstructured":"Gaber, T., Abdelwahab, S., Elhoseny, M., & Hassanien, A. E. (2018). Trust-based secure clustering in WSN-based intelligent transportation systems. Computer Networks, 146, 151\u2013158.","journal-title":"Computer Networks"},{"key":"8352_CR6","doi-asserted-by":"crossref","unstructured":"Silva, H., Hahn Pereira, A., Solano, Y., de\u00a0Oliveira, Bruno\u00a0T., & Margi, C\u0131ntia\u00a0B. (2016). Warm: WSN application development and resource management. XXXIV Simpsio Brasileiro de Telecomunicaes e Processamento de Sinais. Santarm, Brazil: Sociedade Brasileira de Telecomunicaes.","DOI":"10.14209\/sbrt.2016.138"},{"issue":"10","key":"8352_CR7","doi-asserted-by":"publisher","first-page":"1682","DOI":"10.3390\/electronics9101682","volume":"9","author":"D Coc\u00eerlea","year":"2020","unstructured":"Coc\u00eerlea, D., Dobre, C., H\u00eer\u0163an, L.-A., & Purnichescu-Purtan, R. (2020). Blockchain in intelligent transportation systems. Electronics, 9(10), 1682.","journal-title":"Electronics"},{"issue":"1","key":"8352_CR8","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1109\/COMST.2018.2873088","volume":"21","author":"RW van\u00a0der Heijden","year":"2018","unstructured":"van\u00a0der Heijden, R. W., Dietzel, S., Leinm\u00fcller, T., & Kargl, F. (2018). Survey on misbehavior detection in cooperative intelligent transportation systems. IEEE Communications Surveys and Tutorials, 21(1), 779\u2013811.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"4","key":"8352_CR9","doi-asserted-by":"publisher","first-page":"155014771770555","DOI":"10.1177\/1550147717705552","volume":"13","author":"W Liang","year":"2017","unstructured":"Liang, W., Huang, Y., Jianbo, X., & Xie, S. (2017). A distributed data secure transmission scheme in wireless sensor network. International Journal of Distributed Sensor Networks, 13(4), 1550147717705552.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"8352_CR10","doi-asserted-by":"crossref","unstructured":"Qureshi, S.\u00a0G., & Shandilya, S.\u00a0K. (2019). Advances in cyber security paradigm: A review. In International conference on hybrid intelligent systems (pp. 268\u2013276). Springer.","DOI":"10.1007\/978-3-030-49336-3_27"},{"issue":"1","key":"8352_CR11","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1109\/TNSE.2018.2863680","volume":"7","author":"M Usman","year":"2018","unstructured":"Usman, M., Jan, M. A., He, X., & Chen, J. (2018). A mobile multimedia data collection scheme for secured wireless multimedia sensor networks. IEEE Transactions on Network Science and Engineering, 7(1), 274\u2013284.","journal-title":"IEEE Transactions on Network Science and Engineering"},{"issue":"6","key":"8352_CR12","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/MWC.2016.1400052WC","volume":"23","author":"G Han","year":"2016","unstructured":"Han, G., Jiang, J., Guizani, M., & Rodrigues, J. J. P. C. (2016). Green routing protocols for wireless multimedia sensor networks. IEEE Wireless Communications, 23(6), 140\u2013146.","journal-title":"IEEE Wireless Communications"},{"key":"8352_CR13","doi-asserted-by":"publisher","unstructured":"Sumalatha, M. S., & Nandalal, V. (2020). An intelligent cross layer security based fuzzy trust calculation mechanism (CLS-FTCM) for securing wireless sensor network (WSN). Journal of Ambient Intelligence and Humanized Computing. https:\/\/doi.org\/10.1007\/s12652-020-01834-1","DOI":"10.1007\/s12652-020-01834-1"},{"issue":"4","key":"8352_CR14","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1080\/1206212X.2017.1398214","volume":"40","author":"H Radhappa","year":"2018","unstructured":"Radhappa, H., Pan, L., Zheng, J. X., & Wen, S. (2018). Practical overview of security issues in wireless sensor network applications. International Journal of Computers and Applications, 40(4), 202\u2013213.","journal-title":"International Journal of Computers and Applications"},{"key":"8352_CR15","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1016\/j.cose.2017.07.001","volume":"70","author":"A Razaque","year":"2017","unstructured":"Razaque, A., & Rizvi, S. S. (2017). Secure data aggregation using access control and authentication for wireless sensor networks. Computers and Security, 70, 532\u2013545.","journal-title":"Computers and Security"},{"issue":"2","key":"8352_CR16","doi-asserted-by":"publisher","first-page":"76","DOI":"10.22266\/ijies2018.0430.09","volume":"11","author":"S Karthick","year":"2018","unstructured":"Karthick, S. (2018). Tdp: A novel secure and energy aware routing protocol for wireless sensor networks. International Journal of Intelligent Engineering and Systems, 11(2), 76\u201384.","journal-title":"International Journal of Intelligent Engineering and Systems"},{"key":"8352_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-1154-z","author":"SKSL Preeth","year":"2018","unstructured":"Preeth, S. K. S. L., Dhanalakshmi, R., Kumar, R., et al. (2018). An adaptive fuzzy rule based energy efficient clustering and immune-inspired routing protocol for WSN-assisted IoT system. Journal of Ambient Intelligence and Humanized Computing. https:\/\/doi.org\/10.1007\/s12652-018-1154-z","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"1","key":"8352_CR18","first-page":"3321","volume":"9","author":"HG Chandrakanth","year":"2017","unstructured":"Chandrakanth, H. G., Anand, D. G., John Peter, T., et al. (2017). Research challenges and characteristic features in wireless sensor networks. International Journal of Advanced Networking and Applications, 9(1), 3321.","journal-title":"International Journal of Advanced Networking and Applications"},{"key":"8352_CR19","first-page":"1","volume":"5","author":"P Rodrigues","year":"2020","unstructured":"Rodrigues, P., & John, J. (2020). Joint trust: An approach for trust-aware routing in WSN. Wireless Networks, 5, 1\u201316.","journal-title":"Wireless Networks"},{"key":"8352_CR20","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.1016\/j.procs.2018.04.289","volume":"131","author":"X Tao Yang","year":"2018","unstructured":"Tao Yang, X., Xiangyang, L. P., Tonghui, L., & Leina, P. (2018). A secure routing of wireless sensor networks based on trust evaluation model. Procedia Computer Science, 131, 1156\u20131163.","journal-title":"Procedia Computer Science"},{"issue":"2","key":"8352_CR21","first-page":"186","volume":"2","author":"PG Scholar","year":"2016","unstructured":"Scholar, P. G. (2016). Trust value estimation for secure data forwarding in wireless sensor network. International Journal of Future Innovative Science and Engineering Research (IJFISER), 2(2), 186.","journal-title":"International Journal of Future Innovative Science and Engineering Research (IJFISER)"},{"issue":"2","key":"8352_CR22","doi-asserted-by":"publisher","first-page":"2205","DOI":"10.1109\/JIOT.2018.2883403","volume":"6","author":"H Xie","year":"2018","unstructured":"Xie, H., Yan, Z., Yao, Z., & Atiquzzaman, M. (2018). Data collection for security measurement in wireless sensor networks: A survey. IEEE Internet of Things Journal, 6(2), 2205\u20132224.","journal-title":"IEEE Internet of Things Journal"},{"issue":"5","key":"8352_CR23","doi-asserted-by":"publisher","first-page":"1509","DOI":"10.1007\/s11036-019-01271-1","volume":"24","author":"J John","year":"2019","unstructured":"John, J., & Rodrigues, P. (2019). Motco: Multi-objective Taylor crow optimization algorithm for cluster head selection in energy aware wireless sensor network. Mobile Networks and Applications, 24(5), 1509\u20131525.","journal-title":"Mobile Networks and Applications"},{"issue":"5","key":"8352_CR24","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1007\/s11036-019-01320-9","volume":"24","author":"B Li","year":"2019","unstructured":"Li, B., Xiao, S., & Li, Y. (2019). Networking and communications for the next generation IoT. Mobile Networks and Applications, 24(5), 1411\u20131413.","journal-title":"Mobile Networks and Applications"},{"issue":"9","key":"8352_CR25","doi-asserted-by":"publisher","first-page":"1058","DOI":"10.35940\/ijitee.I7787.078919","volume":"8","author":"Hr Singh","year":"2019","unstructured":"Singh, Hr, Tyagi, S., & Kumar, P. (2019). Crow search based scheduling algorithm for load balancing in cloud environment. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(9), 1058\u20131064.","journal-title":"International Journal of Innovative Technology and Exploring Engineering (IJITEE)"},{"key":"8352_CR26","doi-asserted-by":"publisher","first-page":"7","DOI":"10.21608\/eijest.2018.97238","volume":"25","author":"M El-Saeed","year":"2018","unstructured":"El-Saeed, M., El-Hameed, M., & AbdElGwaad, A. (2018). Crow search algorithm for allocation of multi-type distributed generation in unbalanced radial distribution system. Egyptian Journal for Engineering Sciences and Technology, 25, 7\u201323.","journal-title":"Egyptian Journal for Engineering Sciences and Technology"},{"issue":"1","key":"8352_CR27","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s00521-018-3637-4","volume":"31","author":"N Mahesh","year":"2019","unstructured":"Mahesh, N., & Vijayachitra, S. (2019). Decsa: hybrid dolphin echolocation and crow search optimization for cluster-based energy-aware routing in WSN. Neural Computing and Applications, 31(1), 47\u201362.","journal-title":"Neural Computing and Applications"},{"key":"8352_CR28","doi-asserted-by":"publisher","first-page":"100772","DOI":"10.1016\/j.swevo.2020.100772","volume":"60","author":"BM Sahoo","year":"2020","unstructured":"Sahoo, B. M., Pandey, H. M., & Amgoth, T. (2020). Gapso-h: A hybrid approach towards optimizing the cluster based routing in wireless sensor network. Swarm and Evolutionary Computation, 60, 100772.","journal-title":"Swarm and Evolutionary Computation"},{"issue":"3","key":"8352_CR29","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.11591\/ijeecs.v16.i3.pp1154-1162","volume":"16","author":"H Ouldzira","year":"2019","unstructured":"Ouldzira, H., Mouhsen, A., Lagraini, H., Chhiba, M., Tabyaoui, A., & Amrane, S. (2019). Remote monitoring of an object using a wireless sensor network based on nodemcu esp8266. Indonesian Journal of Electrical Engineering and Computer Science, 16(3), 1154\u20131162.","journal-title":"Indonesian Journal of Electrical Engineering and Computer Science"},{"issue":"9","key":"8352_CR30","doi-asserted-by":"publisher","first-page":"e3524","DOI":"10.1002\/ett.3524","volume":"30","author":"D Gupta","year":"2019","unstructured":"Gupta, D., Khanna, A., Lakshmanaprabu, S. K., Shankar, K., Furtado, V., & Rodrigues, J. J. P. C. (2019). Efficient artificial fish swarm based clustering approach on mobility aware energy-efficient for manet. Transactions on Emerging Telecommunications Technologies, 30(9), e3524.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"8352_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09911-9","author":"Y Meraihi","year":"2020","unstructured":"Meraihi, Y., Gabis, A. B., Ramdane-Cherif, A., & Acheli, D. (2020). A comprehensive survey of crow search algorithm and its applications. Artificial Intelligence Review. https:\/\/doi.org\/10.1007\/s10462-020-09911-9","journal-title":"Artificial Intelligence Review"},{"issue":"11","key":"8352_CR32","first-page":"1011","volume":"7","author":"YK Vani","year":"2020","unstructured":"Vani, Y. K., & Ranjana, P. (2020). Detection of distributed denial of service attack using DLMN algorithm in hadoop. Journal of Critical Review, 7(11), 1011\u20131017.","journal-title":"Journal of Critical Review"},{"key":"8352_CR33","doi-asserted-by":"publisher","first-page":"103261","DOI":"10.1016\/j.micpro.2020.103261","volume":"79","author":"S Manimurugan","year":"2020","unstructured":"Manimurugan, S., Majdi, A., Mohmmed, M., Narmatha, C., & Varatharajan, R. (2020). Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system. Microprocessors and Microsystems, 79, 103261.","journal-title":"Microprocessors and Microsystems"},{"issue":"21","key":"8352_CR34","doi-asserted-by":"publisher","first-page":"16483","DOI":"10.1007\/s00500-020-04955-z","volume":"24","author":"K Thangaramya","year":"2020","unstructured":"Thangaramya, K., Kulothungan, K., Indira Gandhi, S., Selvi, M., Santhosh Kumar, S. V. N., & Arputharaj, K. (2020). Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Computing, 24(21), 16483\u201316497.","journal-title":"Soft Computing"},{"key":"8352_CR35","doi-asserted-by":"publisher","first-page":"2550","DOI":"10.1109\/ACCESS.2017.2672827","volume":"5","author":"IA Umar","year":"2017","unstructured":"Umar, I. A., Hanapi, Z. M., Sali, A., & Zulkarnain, Z. A. (2017). Trufix: A configurable trust-based cross-layer protocol for wireless sensor networks. IEEE Access, 5, 2550\u20132562.","journal-title":"IEEE Access"},{"key":"8352_CR36","doi-asserted-by":"publisher","first-page":"131397","DOI":"10.1109\/ACCESS.2020.3007405","volume":"8","author":"G Mehmood","year":"2020","unstructured":"Mehmood, G., Khan, M. Z., Waheed, A., Zareei, M., & Mohamed, E. M. (2020). A trust-based energy-efficient and reliable communication scheme (trust-based ERCS) for remote patient monitoring in wireless body area networks. IEEE Access, 8, 131397\u2013131413.","journal-title":"IEEE Access"},{"issue":"5","key":"8352_CR37","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1109\/LAWP.2019.2906829","volume":"18","author":"A Arif","year":"2019","unstructured":"Arif, A., Zubair, M., Ali, M., Khan, M. U., & Mehmood, M. Q. (2019). A compact, low-profile fractal antenna for wearable on-body WBAN applications. IEEE Antennas and Wireless Propagation Letters, 18(5), 981\u2013985.","journal-title":"IEEE Antennas and Wireless Propagation Letters"},{"issue":"7","key":"8352_CR38","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1007\/s00607-018-0685-7","volume":"101","author":"M Dahman Alshehri","year":"2019","unstructured":"Dahman Alshehri, M., & Hussain, F. K. (2019). A fuzzy security protocol for trust management in the internet of things (fuzzy-IoT). Computing, 101(7), 791\u2013818.","journal-title":"Computing"},{"issue":"2","key":"8352_CR39","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1108\/IJICC-04-2017-0038","volume":"11","author":"A Beghriche","year":"2018","unstructured":"Beghriche, A., & Bilami, A. (2018). A fuzzy trust-based routing model for mitigating the misbehaving nodes in mobile ad hoc networks. International Journal of Intelligent Computing and Cybernetics, 11(2), 309\u2013340.","journal-title":"International Journal of Intelligent Computing and Cybernetics"},{"issue":"4","key":"8352_CR40","doi-asserted-by":"publisher","first-page":"2149","DOI":"10.1007\/s11277-016-3366-x","volume":"94","author":"K Gomathi","year":"2017","unstructured":"Gomathi, K., Parvathavarthini, B., & Saravanakumar, C. (2017). An efficient secure group communication in manet using fuzzy trust based clustering and hierarchical distributed group key management. Wireless Personal Communications, 94(4), 2149\u20132162.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"8352_CR41","doi-asserted-by":"publisher","first-page":"33","DOI":"10.4018\/IJACI.2016070102","volume":"7","author":"NA Mhetre","year":"2016","unstructured":"Mhetre, N. A., Deshpande, A. V., & Mahalle, P. N. (2016). Trust management model based on fuzzy approach for ubiquitous computing. International Journal of Ambient Computing and Intelligence (IJACI), 7(2), 33\u201346.","journal-title":"International Journal of Ambient Computing and Intelligence (IJACI)"},{"issue":"5","key":"8352_CR42","doi-asserted-by":"publisher","first-page":"1076","DOI":"10.1007\/s12083-019-00766-8","volume":"12","author":"AR Rajeswari","year":"2019","unstructured":"Rajeswari, A. R., Kulothungan, K., Ganapathy, S., & Kannan, A. (2019). A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. Peer-to-Peer Networking and Applications, 12(5), 1076\u20131096.","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"4","key":"8352_CR43","doi-asserted-by":"publisher","first-page":"2549","DOI":"10.1007\/s11277-016-3666-1","volume":"94","author":"V Ram Prabha","year":"2017","unstructured":"Ram Prabha, V., & Latha, P. (2017). Fuzzy trust protocol for malicious node detection in wireless sensor networks. Wireless Personal Communications, 94(4), 2549\u20132559.","journal-title":"Wireless Personal Communications"},{"key":"8352_CR44","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3548607","author":"Rupinder Singh","year":"2017","unstructured":"Singh, Rupinder, Singh, Jatinder, & Singh, Ravinder. (2017). Fuzzy based advanced hybrid intrusion detection system to detect malicious nodes in wireless sensor networks. Wireless Communications and Mobile Computing. https:\/\/doi.org\/10.1155\/2017\/3548607","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"3","key":"8352_CR45","doi-asserted-by":"publisher","first-page":"923","DOI":"10.1007\/s11277-018-5358-5","volume":"100","author":"VS Devi","year":"2018","unstructured":"Devi, V. S., & Hegde, N. P. (2018). Multipath security aware routing protocol for manet based on trust enhanced cluster mechanism for lossless multimedia data transfer. Wireless Personal Communications, 100(3), 923\u2013940.","journal-title":"Wireless Personal Communications"},{"key":"8352_CR46","doi-asserted-by":"publisher","first-page":"102215","DOI":"10.1016\/j.adhoc.2020.102215","volume":"106","author":"A Saidi","year":"2020","unstructured":"Saidi, A., Benahmed, K., & Seddiki, N. (2020). Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks. Ad Hoc Networks, 106, 102215.","journal-title":"Ad Hoc Networks"},{"key":"8352_CR47","doi-asserted-by":"crossref","unstructured":"Kumar, S.\u00a0R., & Gayathri, N. (2016). Trust based data transmission mechanism in manet using SOLSR. In Annual Convention of the Computer Society of India (pp. 169\u2013180). Springer.","DOI":"10.1007\/978-981-10-3274-5_14"},{"issue":"10","key":"8352_CR48","doi-asserted-by":"publisher","first-page":"1528","DOI":"10.1093\/comjnl\/bxz061","volume":"62","author":"MM Mukhedkar","year":"2019","unstructured":"Mukhedkar, M. M., & Kolekar, U. (2019). Trust-based secure routing in mobile ad hoc network using hybrid optimization algorithm. The Computer Journal, 62(10), 1528\u20131545.","journal-title":"The Computer Journal"},{"issue":"1","key":"8352_CR49","doi-asserted-by":"publisher","first-page":"74","DOI":"10.22266\/ijies2019.0228.08","volume":"12","author":"H Kanagasundaram","year":"2019","unstructured":"Kanagasundaram, H., & Ayyaswamy, K. (2019). Multi objective ALO based energy efficient and secure routing OLSR protocol in manet. International Journal of Intelligent Engineering and Systems, 12(1), 74\u201383.","journal-title":"International Journal of Intelligent Engineering and Systems"},{"key":"8352_CR50","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.asoc.2019.03.053","volume":"80","author":"D Zhang","year":"2019","unstructured":"Zhang, D., Cui, Y., & Zhang, T. (2019). New quantum-genetic based OLSR protocol (GG-OLSR) for mobile ad hoc network. Applied Soft Computing, 80, 285\u2013296.","journal-title":"Applied Soft Computing"},{"key":"8352_CR51","doi-asserted-by":"crossref","unstructured":"Singh, A., Singh, G., & Singh, M. (2018). Comparative study of olsr, dsdv, aodv, dsr and zrp routing protocols under blackhole attack in mobile ad hoc network. In Intelligent Communication, control and devices (pp. 443\u2013453). Springer.","DOI":"10.1007\/978-981-10-5903-2_45"},{"issue":"1","key":"8352_CR52","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1504\/IJTMCC.2017.089602","volume":"4","author":"K Saddiki","year":"2017","unstructured":"Saddiki, K., Boukli-Hacene, S., Lorenz, P., & Gilg, M. (2017). Black hole attack detection and ignoring in OLSR protocol. International Journal of Trust Management in Computing and Communications, 4(1), 75\u201393.","journal-title":"International Journal of Trust Management in Computing and Communications"},{"issue":"3","key":"8352_CR53","first-page":"27","volume":"4","author":"B Najafpour","year":"2016","unstructured":"Najafpour, B., Mahdavi, B., Soleimani, P., & Rahmani, R. (2016). Optimizing security issue of OLSR routing protocol based on trust method in wireless sensor networks. International Journal of Research in Computer Applications and Robotics, 4(3), 27\u201337.","journal-title":"International Journal of Research in Computer Applications and Robotics"},{"key":"8352_CR54","doi-asserted-by":"publisher","first-page":"102022","DOI":"10.1016\/j.adhoc.2019.102022","volume":"97","author":"BD Deebak","year":"2020","unstructured":"Deebak, B. D., & Al-Turjman, F. (2020). A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Networks, 97, 102022.","journal-title":"Ad Hoc Networks"},{"key":"8352_CR55","doi-asserted-by":"publisher","first-page":"3182","DOI":"10.1109\/ACCESS.2016.2576475","volume":"4","author":"GS Brar","year":"2016","unstructured":"Brar, G. S., Rani, S., Chopra, V., Malhotra, R., Song, H., & Ahmed, S. H. (2016). Energy efficient direction-based PDORP routing protocol for WSN. IEEE Access, 4, 3182\u20133194.","journal-title":"IEEE Access"},{"key":"8352_CR56","doi-asserted-by":"publisher","first-page":"97","DOI":"10.20894\/IJCNES.103.004.002.011","volume":"4","author":"P Bagyalakshmi","year":"2015","unstructured":"Bagyalakshmi, P., & Anitha, R. (2015). Secure data transmission in wireless sensor network using MP-OLSR. International Journal of Communication and Networking System, 4, 97\u2013101.","journal-title":"International Journal of Communication and Networking System"},{"issue":"1","key":"8352_CR57","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s00521-015-2037-2","volume":"28","author":"AA Heidari","year":"2017","unstructured":"Heidari, A. A., Abbaspour, R. A., & Jordehi, A. R. (2017). An efficient chaotic water cycle algorithm for optimization tasks. Neural Computing and Applications, 28(1), 57\u201385.","journal-title":"Neural Computing and Applications"},{"key":"8352_CR58","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1016\/j.asoc.2017.04.048","volume":"57","author":"AA Heidari","year":"2017","unstructured":"Heidari, A. A., Abbaspour, R. A., & Jordehi, A. R. (2017). Gaussian bare-bones water cycle algorithm for optimal reactive power dispatch in electrical power systems. Applied Soft Computing, 57, 657\u2013671.","journal-title":"Applied Soft Computing"},{"key":"8352_CR59","first-page":"24","volume":"6","author":"RS Aashmi","year":"2017","unstructured":"Aashmi, R. S., Santhana, J., & Jeeva, S. (2017). Ranked key search and efficient retrieval of grand data on cloud computing. Indian Journal of Research Foundation, 6, 24\u201329.","journal-title":"Indian Journal of Research Foundation"},{"issue":"3","key":"8352_CR60","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1007\/s00521-013-1525-5","volume":"25","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili, S., Mirjalili, S. M., & Yang, X.-S. (2014). Binary bat algorithm. Neural Computing and Applications, 25(3), 663\u2013681.","journal-title":"Neural Computing and Applications"},{"key":"8352_CR61","unstructured":"Sameswari, V., & Ramaraj,\u00a0E. (2014). Shortest route discovery using hybrid (AODV and OLSR) routing protocols in manet. In UGC sponsored national conference on data science and engineering-proceedings (pp. 273\u2013279). Elsevier."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08352-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08352-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08352-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T14:16:33Z","timestamp":1671027393000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08352-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,9]]},"references-count":61,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["8352"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08352-z","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,9]]},"assertion":[{"value":"19 February 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}