{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T21:21:35Z","timestamp":1770067295836,"version":"3.49.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s12083-024-01735-6","type":"journal-article","created":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T13:03:18Z","timestamp":1717419798000},"page":"2758-2780","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A hybrid heuristic-assisted deep learning for secured routing and malicious node detection in wireless sensor networks"],"prefix":"10.1007","volume":"17","author":[{"given":"Dingari","family":"Kalpana","sequence":"first","affiliation":[]},{"given":"P.","family":"Ajitha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,3]]},"reference":[{"issue":"1","key":"1735_CR1","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/TEM.2019.2953889","volume":"68","author":"M Rathee","year":"2021","unstructured":"Rathee M, Kumar S, Gandomi AH, Dilip K, Balusamy B, Patan R (2021) Ant Colony Optimization Based Quality of Service Aware Energy Balancing Secure Routing Algorithm for Wireless Sensor Networks. IEEE Trans Eng Manage 68(1):170\u2013182","journal-title":"IEEE Trans Eng Manage"},{"key":"1735_CR2","doi-asserted-by":"publisher","first-page":"84132","DOI":"10.1109\/ACCESS.2019.2924283","volume":"7","author":"WA Aliady","year":"2019","unstructured":"Aliady WA, Al-Ahmadi SA (2019) Energy Preserving Secure Measure Against Wormhole Attack in Wireless Sensor Networks. IEEE Access 7:84132\u201384141","journal-title":"IEEE Access"},{"issue":"9","key":"1735_CR3","doi-asserted-by":"publisher","first-page":"2013","DOI":"10.1109\/TIFS.2016.2570740","volume":"11","author":"Y Liu","year":"2016","unstructured":"Liu Y, Dong M, Ota K, Liu A (2016) ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks. IEEE Trans Inf Forensics Secur 11(9):2013\u20132027","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"1735_CR4","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1109\/JSEN.2015.2504375","volume":"16","author":"L Harn","year":"2016","unstructured":"Harn L, Hsu C, Ruan O, Zhang M (2016) Novel Design of Secure End-to-End Routing Protocol in Wireless Sensor Networks. IEEE Sens J 16(6):1779\u20131785","journal-title":"IEEE Sens J"},{"key":"1735_CR5","doi-asserted-by":"publisher","first-page":"163962","DOI":"10.1109\/ACCESS.2020.3022285","volume":"8","author":"K Haseeb","year":"2020","unstructured":"Haseeb K, Almustafa KM, Jan Z, Saba T, Tariq U (2020) Secure and Energy-Aware Heuristic Routing Protocol for Wireless Sensor Network. IEEE Access 8:163962\u2013163974","journal-title":"IEEE Access"},{"key":"1735_CR6","doi-asserted-by":"publisher","first-page":"53281","DOI":"10.1109\/ACCESS.2020.2981115","volume":"8","author":"W Feng","year":"2020","unstructured":"Feng W, Wang F, Dan Xu, Yao Y, Xiaorong Xu, Jiang X, Zhao M (2020) Joint Energy-Saving Scheduling and Secure Routing for Critical Event Reporting in Wireless Sensor Networks. IEEE Access 8:53281\u201353292","journal-title":"IEEE Access"},{"key":"1735_CR7","doi-asserted-by":"publisher","first-page":"11538","DOI":"10.1109\/ACCESS.2022.3144015","volume":"10","author":"Y Han","year":"2022","unstructured":"Han Y, Hu H, Guo Y (2022) Energy-Aware and Trust-Based Secure Routing Protocol for Wireless Sensor Networks Using Adaptive Genetic Algorithm. IEEE Access 10:11538\u201311550","journal-title":"IEEE Access"},{"issue":"4","key":"1735_CR8","doi-asserted-by":"publisher","first-page":"1140","DOI":"10.1109\/TPDS.2013.138","volume":"26","author":"MMEA Mahmoud","year":"2015","unstructured":"Mahmoud MMEA, Lin X, Shen X (2015) Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Trans Parallel Distrib Syst 26(4):1140\u20131153","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"4","key":"1735_CR9","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1109\/JCN.2013.000073","volume":"15","author":"S Ganesh","year":"2013","unstructured":"Ganesh S, Amutha R (2013) Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms. J Commun Net 15(4):422\u2013429","journal-title":"J Commun Net"},{"key":"1735_CR10","doi-asserted-by":"publisher","first-page":"71404","DOI":"10.1109\/ACCESS.2018.2879360","volume":"6","author":"L Yang","year":"2018","unstructured":"Yang L, Lu Y, Liu S, Guo T, Liang Z (2018) A Dynamic Behavior Monitoring Game-Based Trust Evaluation Scheme for Clustering in Wireless Sensor Networks. IEEE Access 6:71404\u201371412","journal-title":"IEEE Access"},{"key":"1735_CR11","doi-asserted-by":"publisher","first-page":"10585","DOI":"10.1109\/ACCESS.2021.3075959","volume":"10","author":"H Hu","year":"2022","unstructured":"Hu H, Han Y, Yao M, Song X (2022) Trust Based Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks. IEEE Access 10:10585\u201310596","journal-title":"IEEE Access"},{"key":"1735_CR12","doi-asserted-by":"publisher","first-page":"63270","DOI":"10.1109\/ACCESS.2020.2983438","volume":"8","author":"OR Ahutu","year":"2020","unstructured":"Ahutu OR, El-Ocla H (2020) Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks. IEEE Access 8:63270\u201363282","journal-title":"IEEE Access"},{"issue":"4","key":"1735_CR13","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/TPDS.2014.2318296","volume":"26","author":"D Tang","year":"2015","unstructured":"Tang D, Li T, Ren J, Wu J (2015) Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks. IEEE Trans Parallel Distrib Syst 26(4):960\u2013973","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"7","key":"1735_CR14","doi-asserted-by":"publisher","first-page":"3255","DOI":"10.1109\/TVT.2012.2205284","volume":"61","author":"A Liu","year":"2012","unstructured":"Liu A, Zheng Z, Zhang C, Chen Z, Shen X (2012) Secure and Energy-Efficient Disjoint Multipath Routing for WSNs. IEEE Trans Veh Technol 61(7):3255\u20133265","journal-title":"IEEE Trans Veh Technol"},{"key":"1735_CR15","doi-asserted-by":"publisher","first-page":"19303","DOI":"10.1109\/ACCESS.2019.2897339","volume":"7","author":"N Wang","year":"2019","unstructured":"Wang N, Li J (2019) Shortest Path Routing With Risk Control for Compromised Wireless Sensor Networks. IEEE Access 7:19303\u201319311","journal-title":"IEEE Access"},{"issue":"2","key":"1735_CR16","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1109\/JSEN.2016.2628413","volume":"17","author":"P Gope","year":"2017","unstructured":"Gope P, Lee J, Quek TQS (2017) Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks. IEEE Sens J 17(2):498\u2013503","journal-title":"IEEE Sens J"},{"key":"1735_CR17","doi-asserted-by":"publisher","first-page":"53576","DOI":"10.1109\/ACCESS.2018.2865909","volume":"6","author":"TA Alghamdi","year":"2018","unstructured":"Alghamdi TA (2018) Secure and Energy Efficient Path Optimization Technique in Wireless Sensor Networks Using DH Method. IEEE Access 6:53576\u201353582","journal-title":"IEEE Access"},{"key":"1735_CR18","doi-asserted-by":"publisher","first-page":"1564","DOI":"10.1007\/s11036-019-01492-4","volume":"26","author":"H Yang","year":"2021","unstructured":"Yang H, Zhang X, Cheng F (2021) A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks. Mobile Networks and Applications 26:1564\u20131573","journal-title":"Mobile Networks and Applications"},{"key":"1735_CR19","doi-asserted-by":"publisher","first-page":"1775","DOI":"10.1007\/s11277-020-07291-5","volume":"113","author":"S Gomathi","year":"2020","unstructured":"Gomathi S, Gopala Krishnan C (2020) Malicious Node Detection in Wireless Sensor Networks Using an Efficient Secure Data Aggregation Protocol. Wirel Pers Commun 113:1775\u20131790","journal-title":"Wirel Pers Commun"},{"key":"1735_CR20","doi-asserted-by":"crossref","unstructured":"Anitha R, Tapas Bapu BR, Kuppusamy PG, Partheeban N, Sasikumar (2022) AN FEBSRA: Fuzzy Trust Based Energy Aware Balanced Secure Routing Algorithm for Secured Communications in WSNs. Wirel Pers Commun","DOI":"10.1007\/s11277-022-09541-0"},{"key":"1735_CR21","doi-asserted-by":"crossref","unstructured":"Prithi S, Sumathi S (2020) LD2FA-PSO: A novel Learning Dynamic Deterministic Finite Automata with PSO algorithm for secured energy efficient routing in Wireless Sensor Network. Ad Hoc Networks 97\u00a0","DOI":"10.1016\/j.adhoc.2019.102024"},{"key":"1735_CR22","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/s41315-022-00225-3","volume":"6","author":"PS Khot","year":"2022","unstructured":"Khot PS, Naik U (2022) Taylor CMVO: Taylor Competitive Multi-Verse Optimizer for intrusion detection and cellular automata-based secure routing in WSN. Int J Intell Robot Appl 6:306\u2013322","journal-title":"Int J Intell Robot Appl"},{"key":"1735_CR23","doi-asserted-by":"publisher","first-page":"4011","DOI":"10.1007\/s11276-020-02299-y","volume":"26","author":"DK Shende","year":"2020","unstructured":"Shende DK, Sonavane SS (2020) CrowWhale-ETR: CrowWhale optimization algorithm for energy and trust aware multicast routing in WSN for IoT applications. Wireless Networks 26:4011\u20134029","journal-title":"Wireless Networks"},{"key":"1735_CR24","doi-asserted-by":"publisher","first-page":"16483","DOI":"10.1007\/s00500-020-04955-z","volume":"24","author":"K Thangaramya","year":"2020","unstructured":"Thangaramya K, Kulothungan K, Indira Gandhi S, Selvi M, Santhosh Kumar SVN, Arputharaj K (2020) Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Comput 24:16483\u201316497","journal-title":"Soft Comput"},{"key":"1735_CR25","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.comcom.2019.09.007","volume":"149","author":"R Bhatt","year":"2020","unstructured":"Bhatt R, Maheshwary P, Shukla P, Shukla P, Shrivastava M, Changlani S (2020) Implementation of Fruit Fly Optimization Algorithm (FFOA) to escalate the attacking efficiency of node capture attack in Wireless Sensor Networks (WSN). Comput Commun 149:134\u2013145","journal-title":"Comput Commun"},{"key":"1735_CR26","doi-asserted-by":"publisher","first-page":"15815","DOI":"10.1007\/s11042-022-12302-7","volume":"81","author":"SS Kalburgi","year":"2022","unstructured":"Kalburgi SS, Manimozhi M (2022) Taylor-spotted hyena optimization algorithm for reliable and energy-efficient cluster head selection based secure data routing and failure tolerance in WSN. Multimed Tools Appl 81:15815\u201315839","journal-title":"Multimed Tools Appl"},{"key":"1735_CR27","doi-asserted-by":"publisher","first-page":"2405","DOI":"10.1007\/s11277-021-08335-0","volume":"119","author":"PS Khot","year":"2021","unstructured":"Khot PS, Naik U (2021) Particle-Water Wave Optimization for Secure Routing in Wireless Sensor Network Using Cluster Head Selection. Wirel Pers Commun 119:2405\u20132429","journal-title":"Wirel Pers Commun"},{"key":"1735_CR28","doi-asserted-by":"crossref","unstructured":"Das R, Dwivedi M (2023) Cluster head selection and malicious node detection using large-scale energy-aware trust optimization algorithm for HWSN. J Reliab Intell Environ","DOI":"10.1007\/s40860-022-00200-6"},{"key":"1735_CR29","doi-asserted-by":"publisher","first-page":"2405","DOI":"10.1007\/s11277-021-08335-0","volume":"119","author":"Pradeep Sadashiv Khot & Udaykumar Naik","year":"2021","unstructured":"Pradeep Sadashiv Khot & Udaykumar Naik (2021) Particle-Water Wave Optimization for Secure Routing in Wireless Sensor Network Using Cluster Head Selection. Wireless Pers Commun 119:2405\u20132429","journal-title":"Wireless Pers Commun"},{"key":"1735_CR30","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s11235-020-00654-0","volume":"74","author":"R Sharma","year":"2020","unstructured":"Sharma R, Vashisht V, Singh U (2020) eeTMFO\/GA: a secure and energy efficient cluster head selection in wireless sensor networks. Telecommun Syst 74:253\u2013268","journal-title":"Telecommun Syst"},{"issue":"5","key":"1735_CR31","doi-asserted-by":"publisher","first-page":"3272","DOI":"10.1109\/TNSE.2021.3098011","volume":"9","author":"M Kumar","year":"2022","unstructured":"Kumar M, Mukherjee P, Verma K, Verma S, Rawat DB (2022) Improved Deep Convolutional Neural Network Based Malicious Node Detection and Energy-Efficient Data Transmission in Wireless Sensor Networks. IEEE Transactions on Network Science and Engineering 9(5):3272\u20133281","journal-title":"IEEE Transactions on Network Science and Engineering"},{"issue":"1","key":"1735_CR32","first-page":"12","volume":"12","author":"AM Morsi","year":"2020","unstructured":"Morsi AM, Barakat TM (2020) Ahmed Ali Nashaat, \u201cAn Efficient and Secure Malicious Node Detection Model for Wireless Sensor Networks,.\u201d International Journal of Computer Networks & Communications (IJCNC) 12(1):12","journal-title":"International Journal of Computer Networks & Communications (IJCNC)"},{"key":"1735_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2022.3156179","volume":"71","author":"P Pal","year":"2022","unstructured":"Pal P, Tripathi S, Kumar C (2022) Single Probe Imitation of Multi-Depth Capacitive Soil Moisture Sensor Using Bidirectional Recurrent Neural Network. IEEE Trans Instrum Meas 71:1\u201311","journal-title":"IEEE Trans Instrum Meas"},{"key":"1735_CR34","doi-asserted-by":"publisher","first-page":"2869","DOI":"10.1007\/s13042-022-01568-w","volume":"13","author":"AC Sumathi","year":"2022","unstructured":"Sumathi AC, Javadpour A, Pinto P, Sangaiah AK, Zhang W, Mahmoodi Khaniabadi S (2022) NEWTR: a multipath routing for next hop destination in internet of things with artificial recurrent neural network (RNN). Int J Mach Learn Cybern 13:2869\u20132889","journal-title":"Int J Mach Learn Cybern"},{"key":"1735_CR35","doi-asserted-by":"crossref","unstructured":"Li Y, Yu N, Zhang W, Zhao W, You X, Daneshmand M (2011) Enhancing the performance of LEACH protocol in wireless sensor networks. IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 223\u2013228","DOI":"10.1109\/INFCOMW.2011.5928813"},{"key":"1735_CR36","doi-asserted-by":"crossref","unstructured":"Trojovsk\u00fd P, Dehghani M (2022) Pelican Optimization Algorithm: A Novel Nature-Inspired Algorithm for Engineering Applications. Sensors 22(855)","DOI":"10.3390\/s22030855"},{"key":"1735_CR37","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.ins.2012.08.023","volume":"222","author":"A Hatamlou","year":"2013","unstructured":"Hatamlou A (2013) Black hole: A new heuristic optimization approach for data clustering. Inf Sci 222:175\u2013184","journal-title":"Inf Sci"},{"issue":"1","key":"1735_CR38","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1109\/JSEN.2019.2940186","volume":"20","author":"HM Jawad","year":"2020","unstructured":"Jawad HM et al (2020) Accurate Empirical Path-Loss Model Based on Particle Swarm Optimization for Wireless Sensor Networks in Smart Agriculture. IEEE Sens J 20(1):552\u2013561","journal-title":"IEEE Sens J"},{"key":"1735_CR39","doi-asserted-by":"publisher","first-page":"170019","DOI":"10.1109\/ACCESS.2019.2955993","volume":"7","author":"SMMH Daneshvar","year":"2019","unstructured":"Daneshvar SMMH, Mohajer PAA, Mazinani SM (2019) Energy-Efficient Routing in WSN: A Centralized Cluster-Based Approach via Grey Wolf Optimizer. IEEE Access 7:170019\u2013170031","journal-title":"IEEE Access"},{"key":"1735_CR40","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/s11277-020-07726-z","volume":"116","author":"P Sarode","year":"2021","unstructured":"Sarode P, Reshmi TR, Pattabiraman V (2021) Combination of Fitness-Mated Lion Algorithm with Neural Network for Optimal Query Ordering Data Aggregation Model in WSN. Wirel Pers Commun 116:513\u2013538","journal-title":"Wirel Pers Commun"},{"key":"1735_CR41","doi-asserted-by":"crossref","unstructured":"Ramesh S, Yaashuwanth C, Prathibanandhi K, Basha AR, Jayasankar\u00a0T (2021) An optimized deep neural network based DoS attack detection in wireless video sensor network. J Ambient Intell Humaniz Comput","DOI":"10.1007\/s12652-020-02763-9"},{"key":"1735_CR42","doi-asserted-by":"crossref","unstructured":"Wang C, Fu Y (2020) Ship Trajectory Prediction Based on Attention in Bidirectional Recurrent Neural Networks. 2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT) 529\u2013533","DOI":"10.1109\/ISCTT51595.2020.00100"},{"key":"1735_CR43","doi-asserted-by":"crossref","unstructured":"Srinivasan V, Raj VH, Thirumalraj A, Nagarathinam K (2024) Detection of Data imbalance in MANET network based on ADSY-AEAMBi-LSTM with DBO Feature selection. Frontier\u00a0","DOI":"10.32629\/jai.v7i4.1094"},{"key":"1735_CR44","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s11276-023-03470-x","volume":"30","author":"S Rajasoundaran","year":"2024","unstructured":"Rajasoundaran S, Santhosh Kumar SVN, Selvi M, Thangaramya K, Arputharaj K (2024) Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks. Wireless Networks 30:209\u2013231","journal-title":"Wireless Networks"},{"key":"1735_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111531","volume":"289","author":"Z Wang","year":"2024","unstructured":"Wang Z, Zeng K, Wang J, Li D (2024) FAGnet: Family-aware-based android malware analysis using graph neural network. Knowl-Based Syst 289:111531","journal-title":"Knowl-Based Syst"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01735-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01735-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01735-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T16:09:48Z","timestamp":1727971788000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01735-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,3]]},"references-count":45,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["1735"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01735-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,3]]},"assertion":[{"value":"12 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}]}}