{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T21:21:25Z","timestamp":1778275285212,"version":"3.51.4"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s12083-024-01697-9","type":"journal-article","created":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T09:01:46Z","timestamp":1717405306000},"page":"2796-2809","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Advancing security and efficiency in MANET using dynamic algorithm switching"],"prefix":"10.1007","volume":"17","author":[{"given":"M. Vijay","family":"Anand","sequence":"first","affiliation":[]},{"given":"Anand","family":"Krishnamurthy","sequence":"additional","affiliation":[]},{"given":"Karuppiah","family":"Subramanian","sequence":"additional","affiliation":[]},{"given":"Saravanan","family":"Raju","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,3]]},"reference":[{"issue":"7","key":"1697_CR1","doi-asserted-by":"publisher","first-page":"2355","DOI":"10.3390\/s21072355","volume":"21","author":"P Wang","year":"2021","unstructured":"Wang P, Zhou M, Ding Z (2021) A two-layer IP hopping-based moving target defense approach to enhancing the security of mobile ad-hoc networks. Sensors 21(7):2355. https:\/\/doi.org\/10.3390\/s21072355","journal-title":"Sensors"},{"issue":"1","key":"1697_CR2","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1186\/s13677-023-00443-5","volume":"12","author":"T Hai","year":"2023","unstructured":"Hai T, Zhou J, Lu Y, Jawawi D, Wang D, Onyema EM, Biamba C (2023) Enhanced security using multiple paths routine scheme in cloud-MANETs. J Cloud Comput 12(1):68. https:\/\/doi.org\/10.1186\/s13677-023-00443-5","journal-title":"J Cloud Comput"},{"issue":"3","key":"1697_CR3","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.3390\/app12031041","volume":"12","author":"P Bondada","year":"2022","unstructured":"Bondada P, Samanta D, Kaur M, Lee HN (2022) Data security-based routing in MANETs using key management mechanism. Appl Sci 12(3):1041. https:\/\/doi.org\/10.3390\/app12031041","journal-title":"Appl Sci"},{"key":"1697_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3296595","author":"C Li","year":"2023","unstructured":"Li C, Dong M, Xin X, Li J, Chen XB, Ota K (2023) Efficient privacy-preserving in IoMT with blockchain and lightweight secret sharing. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2023.3296595","journal-title":"IEEE Internet Things J"},{"issue":"11","key":"1697_CR5","doi-asserted-by":"publisher","first-page":"2909","DOI":"10.1093\/comjnl\/bxac085","volume":"65","author":"P Chen","year":"2022","unstructured":"Chen P, Liu H, Xin R, Carval T, Zhao J, Xia Y, Zhao Z (2022) Effectively detecting operational anomalies in large-scale iot data infrastructures by using a gan-based predictive model. Comput J 65(11):2909\u20132925. https:\/\/doi.org\/10.1093\/comjnl\/bxac085","journal-title":"Comput J"},{"issue":"01","key":"1697_CR6","doi-asserted-by":"publisher","first-page":"078","DOI":"10.30574\/gjeta.2022.12.1.0114","volume":"12","author":"F Korir","year":"2022","unstructured":"Korir F, Cheruiyot W (2022) A survey on security challenges in the current MANET routing protocols. Global J Eng Technol Adv 12(01):078\u2013091","journal-title":"Global J Eng Technol Adv"},{"issue":"3","key":"1697_CR7","doi-asserted-by":"publisher","first-page":"2731","DOI":"10.21917\/ijct.2022.0404","volume":"13","author":"CC Prabha","year":"2022","unstructured":"Prabha CC, Sakkarapani K (2022) Four stage security algorithm for data transfer to improve security in MANET. ICTACT J Commun Technol 13(3):2731","journal-title":"ICTACT J Commun Technol"},{"issue":"3","key":"1697_CR8","first-page":"2701","volume":"10","author":"S Laqtib","year":"2020","unstructured":"Laqtib S, El Yassini K, Hasnaoui ML (2020) A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET. Int J Electr Comput Eng 10(3):2701","journal-title":"Int J Electr Comput Eng"},{"key":"1697_CR9","first-page":"88","volume":"12","author":"NC Singh","year":"2020","unstructured":"Singh NC, Sharma A (2020) Resilience of mobile ad hoc networks to security attacks and optimization of routing process. Mater Today: Proc 12:88\u201397","journal-title":"Mater Today: Proc"},{"issue":"1","key":"1697_CR10","first-page":"38","volume":"10","author":"MS Shaik","year":"2020","unstructured":"Shaik MS, Mira F (2020) A comprehensive mechanism of MANET network layer based security attack prevention. Int J Wirel Microw Technol (IJWMT)\u20132020 10(1):38\u201347","journal-title":"Int J Wirel Microw Technol (IJWMT)\u20132020"},{"key":"1697_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3165076","author":"C Liu","year":"2022","unstructured":"Liu C, Wu T, Li Z, Ma T, Huang J (2022) Robust online tensor completion for IoT streaming data recovery. IEEE Trans Neural Netw Learn Syst. https:\/\/doi.org\/10.1109\/TNNLS.2022.3165076","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"2","key":"1697_CR12","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.32604\/csse.2023.026137","volume":"44","author":"G Rajeshkumar","year":"2023","unstructured":"Rajeshkumar G, Kumar MV, Kumar KS, Bhatia S, Mashat A, Dadheech P (2023) An improved multi-objective particle swarm optimization routing on MANET. Comput Syst Sci Eng 44(2):1187","journal-title":"Comput Syst Sci Eng"},{"issue":"1","key":"1697_CR13","first-page":"93","volume":"14","author":"M Anantapur","year":"2021","unstructured":"Anantapur M, Patil VC (2021) PUSR: position update secure routing protocol for MANET. Int J Intell Eng Syst 14(1):93","journal-title":"Int J Intell Eng Syst"},{"issue":"12","key":"1697_CR14","doi-asserted-by":"publisher","first-page":"9654","DOI":"10.1109\/TPAMI.2021.3128271","volume":"44","author":"W Fan","year":"2021","unstructured":"Fan W, Yang L, Bouguila N (2021) Unsupervised grouped axial data modeling via hierarchical Bayesian nonparametric models with Watson distributions. IEEE Trans Pattern Anal Mach Intell 44(12):9654\u20139668. https:\/\/doi.org\/10.1109\/TPAMI.2021.3128271","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1697_CR15","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.1109\/TIFS.2023.3236788","volume":"18","author":"Y Yao","year":"2023","unstructured":"Yao Y, Zhao J, Li Z, Cheng X, Wu L (2023) Jamming and eavesdropping defense scheme based on deep reinforcement learning in autonomous vehicle networks. IEEE Trans Inf Forensics Secur 18:1211\u20131224. https:\/\/doi.org\/10.1109\/TIFS.2023.3236788","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"1697_CR16","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s11277-019-06724-0","volume":"110","author":"VV Sarbhukan","year":"2020","unstructured":"Sarbhukan VV, Ragha L (2020) Establishing secure routing path using trust to enhance security in MANET. Wirel Pers Commun 110(1):245\u2013255. https:\/\/doi.org\/10.1007\/s11277-019-06724-0","journal-title":"Wirel Pers Commun"},{"issue":"8","key":"1697_CR17","doi-asserted-by":"publisher","first-page":"1543","DOI":"10.3390\/sym14081543","volume":"14","author":"MA Al-Shareeda","year":"2022","unstructured":"Al-Shareeda MA, Manickam S (2022) Man-in-the-middle attacks in mobile ad hoc networks (MANETs): analysis and evaluation. Symmetry 14(8):1543. https:\/\/doi.org\/10.3390\/sym14081543","journal-title":"Symmetry"},{"issue":"17","key":"1697_CR18","doi-asserted-by":"publisher","first-page":"2637","DOI":"10.3390\/electronics11172637","volume":"11","author":"R Amalingam","year":"2022","unstructured":"Amalingam R, Muniyan R, Dumka A, Singh DP, Mohamed HG, Singh R, Anand D, Noya ID (2022) Routing protocol for MANET based on QoS-aware service composition with dynamic secured broker selection. Electronics 11(17):2637. https:\/\/doi.org\/10.3390\/electronics11172637","journal-title":"Electronics"},{"issue":"21","key":"1697_CR19","doi-asserted-by":"publisher","first-page":"3480","DOI":"10.3390\/electronics11213480","volume":"11","author":"D Kancharakuntla","year":"2022","unstructured":"Kancharakuntla D, El-Ocla H (2022) EBR: routing protocol to detect blackhole attacks in mobile ad hoc networks. Electronics 11(21):3480. https:\/\/doi.org\/10.3390\/electronics11213480","journal-title":"Electronics"},{"issue":"2","key":"1697_CR20","doi-asserted-by":"publisher","first-page":"274","DOI":"10.3390\/electronics12020274","volume":"12","author":"AR Rajeswari","year":"2023","unstructured":"Rajeswari AR, Lai WC, Kavitha C, Balasubramanian PK, Srividhya SR (2023) A trust-based secure neuro fuzzy clustering technique for mobile ad hoc networks. Electronics 12(2):274. https:\/\/doi.org\/10.3390\/electronics12020274","journal-title":"Electronics"},{"issue":"9","key":"1697_CR21","doi-asserted-by":"publisher","first-page":"4198","DOI":"10.3390\/s23094198","volume":"23","author":"R Zhang","year":"2023","unstructured":"Zhang R, Han W, Zhang L, Wang L, Meng X (2023) Provably secure receiver-unrestricted group key management scheme for mobile ad hoc networks. Sensors 23(9):4198. https:\/\/doi.org\/10.3390\/s23094198","journal-title":"Sensors"},{"key":"1697_CR22","first-page":"8385","volume":"7","author":"S Kalime","year":"2021","unstructured":"Kalime S, Sagar K (2021) A review: secure routing protocols for mobile adhoc networks (MANETs). J Crit Rev 7:8385\u20138393","journal-title":"J Crit Rev"},{"key":"1697_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2023.3263241","author":"F Qiao","year":"2023","unstructured":"Qiao F, Li Z, Kong Y (2023) A privacy-aware and incremental defense method against GAN-based poisoning attack. IEEE Trans Comput Soc Syst. https:\/\/doi.org\/10.1109\/TCSS.2023.3263241","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"12","key":"1697_CR24","doi-asserted-by":"publisher","first-page":"1439","DOI":"10.1007\/s11265-023-01896-2","volume":"95","author":"Z Xuemin","year":"2023","unstructured":"Xuemin Z, Ying R, Zenggang X, Haitao D, Fang X, Yuan L (2023) Resource-constrained and socially selfish-based incentive algorithm for socially aware networks. J Sign Process Syst 95(12):1439\u20131453. https:\/\/doi.org\/10.1007\/s11265-023-01896-2","journal-title":"J Sign Process Syst"},{"key":"1697_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TWC.2023.3270179","volume":"99","author":"H Xu","year":"2023","unstructured":"Xu H, Han S, Li X, Han Z (2023) Anomaly traffic detection based on communication-efficient federated learning in space-air-ground integration network. IEEE Trans Wireless Commun 99:1\u20131. https:\/\/doi.org\/10.1109\/TWC.2023.3270179","journal-title":"IEEE Trans Wireless Commun"},{"issue":"21","key":"1697_CR26","doi-asserted-by":"publisher","first-page":"13925","DOI":"10.3390\/su142113925","volume":"14","author":"MN Sudha","year":"2022","unstructured":"Sudha MN, Balamurugan V, Lai WC, Divakarachari PB (2022) Sustainable multipath routing for improving cross-layer performance in MANET using an energy centric tunicate swarm algorithm. Sustainability 14(21):13925. https:\/\/doi.org\/10.3390\/su142113925","journal-title":"Sustainability"},{"issue":"3","key":"1697_CR27","first-page":"6096","volume":"29","author":"SAM Ghaleb","year":"2020","unstructured":"Ghaleb SAM, Vasanthi V (2020) Energy efficient multipath routing using multi-objective grey wolf optimizer based dynamic source routing algorithm for manet. Int J Adv Sci Technol 29(3):6096\u20136117","journal-title":"Int J Adv Sci Technol"},{"key":"1697_CR28","doi-asserted-by":"publisher","unstructured":"Wang WT, Wu YL, Tang CY, Hor MK (2015) Adaptive density-based spatial clustering of applications with noise (DBSCAN) according to data.In 2015 international conference on machine learning and cybernetics (ICMLC), vol 1. IEEE, pp 445\u2013451. https:\/\/doi.org\/10.1109\/ICMLC.2015.7340962","DOI":"10.1109\/ICMLC.2015.7340962"},{"key":"1697_CR29","unstructured":"Rajan MS, Anusuya JADR (2020) Energy efficient cluster head selection in adhoc on demand multipath distance vector routing protocol. Int J Sci Technol Res 9(1). ISSN. 2277\u20138616"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01697-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01697-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01697-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T16:09:22Z","timestamp":1727971762000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01697-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,3]]},"references-count":29,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["1697"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01697-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,3]]},"assertion":[{"value":"24 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":7,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}