{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:45:45Z","timestamp":1778345145395,"version":"3.51.4"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s12083-022-01351-2","type":"journal-article","created":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T08:02:45Z","timestamp":1663574565000},"page":"22-34","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Adaptive trust-based secure and optimal route selection algorithm for MANET using hybrid fuzzy optimization"],"prefix":"10.1007","volume":"16","author":[{"given":"Srivel","family":"Ravi","sequence":"first","affiliation":[]},{"given":"Saravanan","family":"Matheswaran","sequence":"additional","affiliation":[]},{"given":"Uma","family":"Perumal","sequence":"additional","affiliation":[]},{"given":"Shanthi","family":"Sivakumar","sequence":"additional","affiliation":[]},{"given":"Srinivas Kumar","family":"Palvadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,19]]},"reference":[{"issue":"24","key":"1351_CR1","doi-asserted-by":"publisher","DOI":"10.4108\/eai.13-7-2018.160834","volume":"6","author":"M Ponguwala","year":"2019","unstructured":"Ponguwala M, Rao DR (2019) Secure group based routing and flawless trust formulation in MANET using unsupervised machine learning approach for IoT applications. EAI Endorsed Trans Energy Web 6(24):160834","journal-title":"EAI Endorsed Trans Energy Web"},{"issue":"4","key":"1351_CR2","first-page":"400","volume":"8","author":"V Alappatt","year":"2021","unstructured":"Alappatt V, PM JP (2021) Trust-based energy efficient secure multipath routing in MANET using LF-SSO and SH2E. Int J Comput Netw Appl 8(4):400\u2013411","journal-title":"Int J Comput Netw Appl"},{"key":"1351_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11036-020-01724-y","volume":"-","author":"M Nabati","year":"2021","unstructured":"Nabati M, Maadani M, Pourmina MA (2021) AGEN-AODV: an intelligent energy-aware routing protocol for heterogeneous mobile ad-hoc networks. Mob Netw Appl 1\u201312","journal-title":"Mob Netw Appl"},{"key":"1351_CR4","doi-asserted-by":"publisher","first-page":"21735","DOI":"10.1109\/ACCESS.2021.3055422","volume":"9","author":"KS Sankaran","year":"2021","unstructured":"Sankaran KS, Vasudevan N, Devabalaji KR, Babu TS, Alhelou HH, Yuvaraj T (2021) A recurrent reward based learning technique for secure neighbor selection in mobile AD-HOC networks. IEEE Access 9:21735\u201321745","journal-title":"IEEE Access"},{"key":"1351_CR5","doi-asserted-by":"crossref","unstructured":"Sirajuddin M, Rupa C, Iwendi C, Biamba C (2021) TBSMR: A trust-based secure multipath routing protocol for enhancing the QoS of the mobile Ad Hoc network. Secur Commun Netw","DOI":"10.1155\/2021\/5521713"},{"issue":"3","key":"1351_CR6","first-page":"973","volume":"18","author":"R Dhanapal","year":"2021","unstructured":"Dhanapal R, Kalpana V, Chiwariro R, Thangadurai N, Sentamilselvan K, Immanuel DJ (2021) An energy efficient secure routing for mobile nodes for Multihop Adhoc network. J Comput Theor Nanosci 18(3):973\u2013976","journal-title":"J Comput Theor Nanosci"},{"issue":"11","key":"1351_CR7","doi-asserted-by":"crossref","first-page":"186","DOI":"10.17762\/turcomat.v12i11.5860","volume":"12","author":"AJ Johnson","year":"2021","unstructured":"Johnson AJ (2021) QoS improvement in MANET using self organized balanced optimization. Turk J Comput Math Educ (TURCOMAT) 12(11):186\u2013194","journal-title":"Turk J Comput Math Educ (TURCOMAT)"},{"key":"1351_CR8","doi-asserted-by":"crossref","unstructured":"Bisen D, Mishra S, Saurabh P (2021)\u00a0K-means based cluster formation and head selection through artificial neural network in MANET","DOI":"10.21203\/rs.3.rs-667651\/v1"},{"issue":"7","key":"1351_CR9","doi-asserted-by":"publisher","first-page":"6987","DOI":"10.1007\/s12652-020-02358-4","volume":"12","author":"P Sathyaraj","year":"2021","unstructured":"Sathyaraj P, Rukmani Devi D (2021) Designing the routing protocol with secured IoT devices and QoS over Manet using trust-based performance evaluation method. J Ambient Intell Humaniz Comput 12(7):6987\u20136995","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"10","key":"1351_CR10","doi-asserted-by":"publisher","first-page":"1528","DOI":"10.1093\/comjnl\/bxz061","volume":"62","author":"MM Mukhedkar","year":"2019","unstructured":"Mukhedkar MM, Kolekar U (2019) Trust-based secure routing in mobile ad hoc network using hybrid optimization algorithm. Comput J 62(10):1528\u20131545","journal-title":"Comput J"},{"issue":"2","key":"1351_CR11","doi-asserted-by":"publisher","first-page":"16","DOI":"10.3390\/fi10020016","volume":"10","author":"MS Pathan","year":"2018","unstructured":"Pathan MS, Zhu N, He J, Zardari ZA, Memon MQ, Hussain MI (2018) An efficient trust-based scheme for secure and quality of service routing in MANETs. Future Internet 10(2):16","journal-title":"Future Internet"},{"key":"1351_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12083-020-00957-8","volume":"-","author":"R Hemalatha","year":"2021","unstructured":"Hemalatha R, Umamaheswari R, Jothi S (2021) Optimal route maintenance based on adaptive equilibrium optimization and GTA based route discovery model in MANET. Peer Peer Netw Appl 1\u201315","journal-title":"Peer Peer Netw Appl"},{"key":"1351_CR13","first-page":"1","volume":"-","author":"S Sankar Ganesh","year":"2020","unstructured":"Sankar Ganesh S, Ravi G (2020) Real time link quality based route selection and transmission in industrial Manet for improved QoS. J Ambient Intell Humaniz Comput 1\u201311","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1351_CR14","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1016\/j.procs.2018.05.064","volume":"132","author":"MK Garg","year":"2018","unstructured":"Garg MK, Singh N, Verma P (2018) Fuzzy rule-based approach for design and analysis of a trust-based secure routing protocol for MANETs. Procedia Comput Sci 132:653\u2013658","journal-title":"Procedia Comput Sci"},{"key":"1351_CR15","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.jnca.2018.07.008","volume":"123","author":"AM Shabut","year":"2018","unstructured":"Shabut AM, Kaiser MS, Dahal KP, Chen W (2018) A multidimensional trust evaluation model for MANETs. J Netw Comput Appl 123:32\u201341","journal-title":"J Netw Comput Appl"},{"key":"1351_CR16","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.pmcj.2013.06.004","volume":"13","author":"B Wang","year":"2014","unstructured":"Wang B, Chen X, Chang W (2014) A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive Mob Comput 13:164\u2013180","journal-title":"Pervasive Mob Comput"},{"issue":"3","key":"1351_CR17","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/s00500-018-3102-4","volume":"23","author":"S Arora","year":"2019","unstructured":"Arora S, Singh S (2019) Butterfly optimization algorithm: a novel approach for global optimization. Soft Comput 23(3):715\u2013734","journal-title":"Soft Comput"},{"key":"1351_CR18","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.ins.2016.05.051","volume":"367","author":"A Comi","year":"2016","unstructured":"Comi A, Fotia L, Messina F, Rosaci D, Sarn\u00e9 GM (2016) A partnership-based approach to improve QoS on federated computing infrastructures. Inf Sci 367:246\u2013258","journal-title":"Inf Sci"},{"key":"1351_CR19","doi-asserted-by":"crossref","unstructured":"Bai Y, Wang D (2006) Fundamentals of fuzzy logic control\u2014fuzzy sets, fuzzy rules and defuzzifications. In Advanced fuzzy logic technologies in industrial applications (pp. 17\u201336). Springer, London","DOI":"10.1007\/978-1-84628-469-4_2"},{"key":"1351_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107291","volume":"228","author":"A Mortazavi","year":"2021","unstructured":"Mortazavi A, Moloodpoor M (2021) Enhanced butterfly optimization algorithm with a new fuzzy regulator strategy and virtual butterfly concept. Knowl-Based Syst 228:107291","journal-title":"Knowl-Based Syst"},{"key":"1351_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103740","volume":"81","author":"S Sheikhpour","year":"2021","unstructured":"Sheikhpour S, Mahani A, Bagheri N (2021) Reliable advanced encryption standard hardware implementation: 32-bit and 64-bit data-paths. Microprocess Microsyst 81:103740","journal-title":"Microprocess Microsyst"},{"issue":"8","key":"1351_CR22","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the Internet of Things: perspectives and challenges. Wirel Netw 20(8):2481\u20132501","journal-title":"Wirel Netw"},{"key":"1351_CR23","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.swevo.2018.01.001","volume":"44","author":"S Gupta","year":"2019","unstructured":"Gupta S, Deep K (2019) A novel random walk grey wolf optimizer. Swarm Evol Comput 44:101\u2013112","journal-title":"Swarm Evol Comput"},{"issue":"4","key":"1351_CR24","doi-asserted-by":"publisher","first-page":"1359","DOI":"10.1007\/s00366-018-0668-5","volume":"35","author":"FA \u015eenel","year":"2019","unstructured":"\u015eenel FA, G\u00f6k\u00e7e F, Y\u00fcksel AS, Yi\u011fit T (2019) A novel hybrid PSO\u2013GWO algorithm for optimization problems. Eng Comput 35(4):1359\u20131373","journal-title":"Eng Comput"},{"key":"1351_CR25","doi-asserted-by":"crossref","unstructured":"Djellali H, Ghoualmi N (2019) Improved chaotic initialization of particle swarm applied to feature selection. In 2019 International Conference on Networking and Advanced Systems (ICNAS) (pp. 1\u20135). IEEE","DOI":"10.1109\/ICNAS.2019.8807837"},{"issue":"30","key":"1351_CR26","doi-asserted-by":"publisher","first-page":"1801837","DOI":"10.1002\/aenm.201801837","volume":"8","author":"M Hong","year":"2018","unstructured":"Hong M, Wang Y, Liu W, Matsumura S, Wang H, Zou J, Chen ZG (2018) Arrays of planar vacancies in superior thermoelectric Ge1\u2212 x\u2212 yCdxBiyTe with band convergence. Adv Energy Mater 8(30):1801837","journal-title":"Adv Energy Mater"},{"key":"1351_CR27","doi-asserted-by":"crossref","unstructured":"Hao P, Sobhani B (2021) Application of the improved chaotic grey wolf optimization algorithm as a novel and efficient method for parameter estimation of solid oxide fuel cells model. Int J Hydrog Energy","DOI":"10.1016\/j.ijhydene.2021.08.174"},{"key":"1351_CR28","first-page":"1","volume":"-","author":"SA Alghamdi","year":"2021","unstructured":"Alghamdi SA (2021) Novel trust-aware intrusion detection and prevention system for 5G MANET\u2013Cloud. Int J Inf Secur 1\u201320","journal-title":"Int J Inf Secur"},{"issue":"03","key":"1351_CR29","doi-asserted-by":"publisher","first-page":"1950014","DOI":"10.1142\/S1793962319500144","volume":"10","author":"C Ram Mohan","year":"2019","unstructured":"Ram Mohan C, Ananthula VR (2019) Reputation-based secure routing protocol in mobile ad-hoc network using Jaya Cuckoo optimization. Int J Model Simul Sci Comput 10(03):1950014","journal-title":"Int J Model Simul Sci Comput"},{"issue":"19","key":"1351_CR30","doi-asserted-by":"publisher","first-page":"3207","DOI":"10.1049\/iet-com.2019.0039","volume":"13","author":"M Ponguwala","year":"2019","unstructured":"Ponguwala M, Rao S (2019) E 2-SR: a novel energy-efficient secure routing scheme to protect MANET-IoT. IET Commun 13(19):3207\u20133216","journal-title":"IET Commun"},{"issue":"3","key":"1351_CR31","first-page":"299","volume":"12","author":"MM Gowthul Alam","year":"2017","unstructured":"Gowthul Alam MM, Baulkani S (2017) Reformulated query-based document retrieval using optimised kernel fuzzy clustering algorithm. Int J Bus Intell Data Min 12(3):299","journal-title":"Int J Bus Intell Data Min"},{"issue":"3","key":"1351_CR32","first-page":"117","volume":"9","author":"V Sundararaj","year":"2016","unstructured":"Sundararaj V (2016) An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. Int J Intell Eng Syst 9(3):117\u2013126","journal-title":"Int J Intell Eng Syst"},{"issue":"4","key":"1351_CR33","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1007\/s00500-018-3124-y","volume":"23","author":"MM Gowthul Alam","year":"2019","unstructured":"Gowthul Alam MM, Baulkani S (2019) Geometric structure information based multi-objective function to increase fuzzy clustering performance with artificial and real-life data. Soft Comput 23(4):1079\u20131098","journal-title":"Soft Comput"},{"issue":"4","key":"1351_CR34","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1504\/IJBET.2019.103242","volume":"31","author":"V Sundararaj","year":"2019","unstructured":"Sundararaj V (2019) Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction. Int J Biomed Eng Technol 31(4):325","journal-title":"Int J Biomed Eng Technol"},{"issue":"2","key":"1351_CR35","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1007\/s10115-018-1263-1","volume":"60","author":"MM Gowthul Alam","year":"2019","unstructured":"Gowthul Alam MM, Baulkani S (2019) Local and global characteristics-based kernel hybridization to increase optimal support vector machine performance for stock market prediction. Knowl Inf Syst 60(2):971\u20131000","journal-title":"Knowl Inf Syst"},{"key":"1351_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2019.105046","volume":"28","author":"BA Hassan","year":"2020","unstructured":"Hassan BA, Rashid TA (2020) Datasets on statistical analysis and performance evaluation of backtracking search optimisation algorithm compared with its counterpart algorithms. Data Brief 28:105046","journal-title":"Data Brief"},{"key":"1351_CR37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00521-018-3693-9","volume":"-","author":"BA Hassan","year":"2020","unstructured":"Hassan BA (2020) CSCF: a chaotic sine cosine firefly algorithm for practical application problems. Neural Comput Appl 1\u201320","journal-title":"Neural Comput Appl"},{"issue":"16","key":"1351_CR38","doi-asserted-by":"publisher","first-page":"22691","DOI":"10.1007\/s11042-019-7577-5","volume":"78","author":"MR Rejeesh","year":"2019","unstructured":"Rejeesh MR (2019) Interest point based face recognition using adaptive neuro fuzzy inference system. Multimed Tools Appl 78(16):22691\u201322710","journal-title":"Multimed Tools Appl"},{"key":"1351_CR39","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.cose.2018.04.009","volume":"77","author":"V Sundararaj","year":"2018","unstructured":"Sundararaj V, Muthukumar S, Kumar RS (2018) An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Comput Secur 77:277\u2013288","journal-title":"Comput Secur"},{"issue":"11","key":"1351_CR40","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1002\/pip.3315","volume":"28","author":"V Sundararaj","year":"2020","unstructured":"Sundararaj V, Anoop V, Dixit P, Arjaria A, Chourasia U, Bhambri P, Rejeesh MR, Sundararaj R (2020) CCGPA-MPPT: Cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system. Prog Photovolt Res Appl 28(11):1128\u20131145","journal-title":"Prog Photovolt Res Appl"},{"issue":"1","key":"1351_CR41","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s11277-018-6014-9","volume":"104","author":"S Vinu","year":"2019","unstructured":"Vinu S (2019) Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wirel Pers Commun 104(1):173\u2013197","journal-title":"Wirel Pers Commun"},{"key":"1351_CR42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12652-020-01742-4","volume":"-","author":"N Malarvizhi","year":"2021","unstructured":"Malarvizhi N, Aswini J, Sasikala S, Chakravarthy MH, Neeba EA (2021) Multi-parameter optimization for load balancing with effective task scheduling and resource sharing. J Ambient Intell Humaniz Comput 1\u20139","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1351_CR43","doi-asserted-by":"crossref","unstructured":"Aswini J, Yamini B, Jatothu R, Nayaki KS, Nalini M (2021) An efficient cloud\u2010based healthcare services paradigm for chronic kidney disease prediction application using boosted support vector machine. Concurr Comput Pract Exp e6722","DOI":"10.1002\/cpe.6722"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01351-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01351-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01351-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T03:16:39Z","timestamp":1728011799000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01351-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,19]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["1351"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01351-2","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,19]]},"assertion":[{"value":"30 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the authors.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}},{"value":"The authors declare that they have no conflict of interest.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}