{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T10:48:44Z","timestamp":1775040524719,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T00:00:00Z","timestamp":1724889600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T00:00:00Z","timestamp":1724889600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s12083-024-01772-1","type":"journal-article","created":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T13:02:20Z","timestamp":1724936540000},"page":"3688-3702","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["MRNQ: Machine learning-based reliable node quester for reliable communication in underwater acoustic sensor networks"],"prefix":"10.1007","volume":"17","author":[{"given":"Yogita","family":"Singh","sequence":"first","affiliation":[]},{"given":"Navneet Singh","family":"Aulakh","sequence":"additional","affiliation":[]},{"given":"Inderdeep K.","family":"Aulakh","sequence":"additional","affiliation":[]},{"given":"Shyama Barna","family":"Bhattacharjee","sequence":"additional","affiliation":[]},{"given":"Sudesh","family":"Kumari","sequence":"additional","affiliation":[]},{"given":"Sunita","family":"Rani","sequence":"additional","affiliation":[]},{"given":"Gaurav","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Savita","family":"Khurana","sequence":"additional","affiliation":[]},{"given":"Shilpi","family":"Harnal","sequence":"additional","affiliation":[]},{"given":"Nitin","family":"Goyal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,29]]},"reference":[{"issue":"2","key":"1772_CR1","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1007\/s11277-024-10926-6","volume":"134","author":"P Nazareth","year":"2024","unstructured":"Nazareth P, Chandavarkar BR (2024) Cluster-Based Multi-attribute Routing Protocol for Underwater Acoustic Sensor Networks. Wireless Pers Commun 134(2):781\u2013808","journal-title":"Wireless Pers Commun"},{"key":"1772_CR2","doi-asserted-by":"publisher","first-page":"175980","DOI":"10.1109\/ACCESS.2019.2955208","volume":"7","author":"Z Wadud","year":"2019","unstructured":"Wadud Z, Ismail M, Qazi AB, Khan FA, Derhab A, Ahmad I, Ahmad AM (2019) An energy balanced efficient and reliable routing protocol for underwater wireless sensor networks. IEEE Access 7:175980\u2013175999","journal-title":"IEEE Access"},{"key":"1772_CR3","doi-asserted-by":"publisher","first-page":"96879","DOI":"10.1109\/ACCESS.2019.2928876","volume":"7","author":"M Jouhari","year":"2019","unstructured":"Jouhari M, Ibrahimi K, Tembine H, Ben-Othman J (2019) Underwater wireless sensor networks: A survey on enabling technologies, localization protocols, and internet of underwater things. IEEE Access 7:96879\u201396899","journal-title":"IEEE Access"},{"issue":"6","key":"1772_CR4","doi-asserted-by":"publisher","first-page":"982","DOI":"10.3390\/jmse12060982","volume":"12","author":"H Mei","year":"2024","unstructured":"Mei H, Wang H, Shen X, Jiang Z, Yan Y, Sun L, Xie W (2024) Node Load and Location-Based Clustering Protocol for Underwater Acoustic Sensor Networks. Journal of Marine Science and Engineering 12(6):982","journal-title":"Journal of Marine Science and Engineering"},{"issue":"2","key":"1772_CR5","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1109\/JOE.2018.2817268","volume":"44","author":"A Wolek","year":"2018","unstructured":"Wolek A, Dzikowicz BR, McMahon J, Houston BH (2018) At-sea evaluation of an underwater vehicle behavior for passive target tracking. IEEE J Oceanic Eng 44(2):514\u2013523","journal-title":"IEEE J Oceanic Eng"},{"issue":"1","key":"1772_CR6","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s11276-023-03470-x","volume":"30","author":"S Rajasoundaran","year":"2024","unstructured":"Rajasoundaran S, Kumar SS, Selvi M, Thangaramya K, Arputharaj K (2024) Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks. Wireless Netw 30(1):209\u2013231","journal-title":"Wireless Netw"},{"issue":"5","key":"1772_CR7","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.3390\/s18051529","volume":"18","author":"Z Wadud","year":"2018","unstructured":"Wadud Z, Ullah K, Hussain S, Yang X, Qazi AB (2018) Dow-pr DOlphin and whale pods routing protocol for underwater wireless sensor networks (UWSNs). Sensors 18(5):1529","journal-title":"Sensors"},{"key":"1772_CR8","doi-asserted-by":"publisher","first-page":"100346","DOI":"10.1109\/ACCESS.2020.2992759","volume":"8","author":"M Ismail","year":"2020","unstructured":"Ismail M, Islam M, Ahmad I, Khan FA, Qazi AB, Khan ZH, Wadud Z, Al-Rakhami M (2020) Reliable path selection and opportunistic routing protocol for underwater wireless sensor networks. IEEE Access 8:100346\u2013100364","journal-title":"IEEE Access"},{"key":"1772_CR9","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/j.jnca.2016.10.010","volume":"78","author":"CF Chen","year":"2017","unstructured":"Chen CF, Li LH (2017) Data gathering problem with the data importance consideration in underwater wireless sensor networks. J Netw Comput Appl 78:300\u2013312","journal-title":"J Netw Comput Appl"},{"key":"1772_CR10","doi-asserted-by":"publisher","first-page":"140703","DOI":"10.1109\/ACCESS.2019.2939155","volume":"7","author":"ZA Khan","year":"2019","unstructured":"Khan ZA, Awais M, Alghamdi TA, Khalid A, Fatima A, Akbar M, Javaid N (2019) Region aware proactive routing approaches exploiting energy efficient paths for void hole avoidance in underwater WSNs. IEEE Access 7:140703\u2013140722","journal-title":"IEEE Access"},{"issue":"8","key":"1772_CR11","doi-asserted-by":"publisher","first-page":"3374","DOI":"10.3390\/app14083374","volume":"14","author":"B Wang","year":"2024","unstructured":"Wang B, Yue X, Liu Y, Hao K, Li Z, Zhao X (2024) A Dynamic Trust Model for Underwater Sensor Networks Fusing Deep Reinforcement Learning and Random Forest Algorithm. Appl Sci 14(8):3374","journal-title":"Appl Sci"},{"issue":"2","key":"1772_CR12","doi-asserted-by":"publisher","first-page":"229","DOI":"10.3390\/s16020229","volume":"16","author":"G Han","year":"2016","unstructured":"Han G, Liu L, Jiang J, Shu L, Rodrigues JJ (2016) A collaborative secure localization algorithm based on trust model in underwater wireless sensor networks. Sensors 16(2):229","journal-title":"Sensors"},{"key":"1772_CR13","first-page":"33","volume":"24","author":"C Vennila","year":"2016","unstructured":"Vennila C, Madhura M (2016) An energy-efficient attack resistant trust model for underwater wireless sensor networks. Middle-East J Sci Res 24:33\u201339","journal-title":"Middle-East J Sci Res"},{"issue":"9","key":"1772_CR14","doi-asserted-by":"publisher","first-page":"173","DOI":"10.4236\/wsn.2014.69017","volume":"6","author":"V Geetha","year":"2014","unstructured":"Geetha V, Chandrasekaran K (2014) A distributed trust based secure communication framework for wireless sensor network. Wirel Sens Netw 6(9):173","journal-title":"Wirel Sens Netw"},{"key":"1772_CR15","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.comcom.2017.01.011","volume":"100","author":"S Zhang","year":"2017","unstructured":"Zhang S, Lin Y, Liu Q, Jiang J, Yin B, Choo KK (2017) Secure hitch in location based social networks. Comput Commun 100:65\u201367","journal-title":"Comput Commun"},{"issue":"1","key":"1772_CR16","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/TDSC.2014.2316816","volume":"12","author":"M Rezvani","year":"2014","unstructured":"Rezvani M, Ignjatovic A, Bertino E, Jha S (2014) Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Trans Dependable Secure Comput 12(1):98\u2013110","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"1","key":"1772_CR17","first-page":"40","volume":"70","author":"H Jadidoleslamy","year":"2016","unstructured":"Jadidoleslamy H, Aref MR, Bahramgiri H (2016) A fuzzy fully distributed trust management system in wireless sensor networks. AEU-International Journal of Electronics and Communications 70(1):40\u201349","journal-title":"AEU-International Journal of Electronics and Communications"},{"issue":"5","key":"1772_CR18","first-page":"454","volume":"7","author":"R Golgiri","year":"2016","unstructured":"Golgiri R, Javidan R (2016) TMCC: an optimal mechanism for congestion control in wireless sensor networks. Int J Adv Comput Sci Appl 7(5):454\u2013460","journal-title":"Int J Adv Comput Sci Appl"},{"key":"1772_CR19","doi-asserted-by":"crossref","unstructured":"Qiu, M., Liu, J., Li, J., Fei, Z., Ming, Z., Edwin, H.M.: A novel energy-aware fault tolerance mechanism for wireless sensor networks. In: 2011 IEEE\/ACM International Conference on Green Computing and Communication, IEEE, pp. 56\u201361 (2011).","DOI":"10.1109\/GreenCom.2011.18"},{"issue":"17","key":"1772_CR20","doi-asserted-by":"publisher","first-page":"5777","DOI":"10.3390\/s21175777","volume":"21","author":"E Eldesouky","year":"2021","unstructured":"Eldesouky E, Bekhit M, Fathalla A, Salah A, Ali A (2021) A robust UWSN handover prediction system using ensemble learning. Sensors 21(17):5777","journal-title":"Sensors"},{"key":"1772_CR21","doi-asserted-by":"crossref","unstructured":"Goyal, N., Kumar, A., Popli, R., Awasthi, L.K., Sharma, N., Sharma, G.: Priority based data gathering using multiple mobile sinks in cluster based UWSNs for oil pipeline leakage detection. Cluster Computing 1\u201314 (2022).","DOI":"10.1007\/s10586-021-03513-y"},{"issue":"1","key":"1772_CR22","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.jksuci.2011.09.001","volume":"24","author":"M Ayaz","year":"2012","unstructured":"Ayaz M, Jung LT, Abdullah A, Ahmad I (2012) Reliable data deliveries using packet optimization in multi-hop underwater sensor networks. Journal of King Saud University-Computer and Information Sciences 24(1):41\u201348","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"issue":"9","key":"1772_CR23","doi-asserted-by":"publisher","first-page":"1444","DOI":"10.3390\/s16091444","volume":"16","author":"H Wang","year":"2016","unstructured":"Wang H, Wang S, Zhang E, Zou J (2016) A network coding based hybrid ARQ protocol for underwater acoustic sensor networks. Sensors 16(9):1444","journal-title":"Sensors"},{"issue":"7","key":"1772_CR24","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1016\/j.adhoc.2010.02.003","volume":"8","author":"P Xie","year":"2010","unstructured":"Xie P, Zhou Z, Peng Z, Cui JH, Shi Z (2010) SDRT: A reliable data transport protocol for underwater sensor networks. Ad Hoc Netw 8(7):708\u2013722","journal-title":"Ad Hoc Netw"},{"key":"1772_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2010\/358071","volume":"2010","author":"B Liu","year":"2010","unstructured":"Liu B, Chen H, Lei X, Ren F, Sezaki K (2010) Internode distance-based redundancy reliable transport in underwater sensor networks. EURASIP J Wirel Commun Netw 2010:1\u201316","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"1772_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-020-07175-8","volume":"113","author":"N Goyal","year":"2020","unstructured":"Goyal N, Dave M, Verma AK (2020) SAPDA: secure authentication with protected data aggregation scheme for improving QoS in scalable and survivable UWSNs. Wireless Pers Commun 113:1\u201315","journal-title":"Wireless Pers Commun"},{"issue":"6","key":"1772_CR27","first-page":"240","volume":"9","author":"N Goyal","year":"2019","unstructured":"Goyal N, Sandhu JK, Verma L (2019) Machine learning based data agglomeration in underwater wireless sensor networks. International Journal of Management, Technology and Engineering 9(6):240\u2013245","journal-title":"International Journal of Management, Technology and Engineering"},{"issue":"10","key":"1772_CR28","doi-asserted-by":"publisher","first-page":"2048","DOI":"10.1002\/dac.2455","volume":"27","author":"A Wahid","year":"2014","unstructured":"Wahid A, Le S, Kim D (2014) A reliable and energy-efficient routing protocol for underwater wireless sensor networks. Int J Commun Syst 27(10):2048\u20132062","journal-title":"Int J Commun Syst"},{"issue":"6","key":"1772_CR29","doi-asserted-by":"publisher","first-page":"2061","DOI":"10.1007\/s11276-017-1461-x","volume":"24","author":"A Khasawneh","year":"2018","unstructured":"Khasawneh A, Latiff MS, Kaiwartya O, Chizari H (2018) A reliable energy-efficient pressure-based routing protocol for underwater wireless sensor network. Wireless Netw 24(6):2061\u20132075","journal-title":"Wireless Netw"},{"issue":"11","key":"1772_CR30","doi-asserted-by":"publisher","first-page":"21","DOI":"10.5120\/ijca2016907727","volume":"138","author":"S Sharma","year":"2016","unstructured":"Sharma S, Sharma G (2016) A review on secure and energy efficient approaches for green computing. International Journal of Computer Applications 138(11):21\u201328","journal-title":"International Journal of Computer Applications"},{"issue":"1","key":"1772_CR31","doi-asserted-by":"publisher","first-page":"629","DOI":"10.32604\/cmc.2022.021884","volume":"71","author":"S Khurana","year":"2022","unstructured":"Khurana S, Sharma G, Miglani N, Singh A, Alharbi A et al (2022) An intelligent fine-tuned forecasting technique for COVID-19 prediction using neuralprophet model. Computers, Materials & Continua 71(1):629\u2013649","journal-title":"Computers, Materials & Continua"},{"issue":"3","key":"1772_CR32","doi-asserted-by":"publisher","first-page":"107","DOI":"10.3723\/ut.34.107","volume":"34","author":"N Goyal","year":"2017","unstructured":"Goyal N, Dave M, Verma AK (2017) Trust model for cluster head validation in underwater wireless sensor networks. Underw Technol 34(3):107\u2013114","journal-title":"Underw Technol"},{"issue":"2","key":"1772_CR33","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3723\/ut.37.039","volume":"37","author":"G Sharma","year":"2020","unstructured":"Sharma G, Harnal S, Miglani N, Khurana S (2020) Reliability of cluster head node based upon parametric constraints in underwater acoustic sensor networks. Underw Technol 37(2):39\u201352","journal-title":"Underw Technol"},{"key":"1772_CR34","doi-asserted-by":"crossref","unstructured":"Sharma, G., Harnal, S., Miglani, N., Khurana, S.: Reliability in Underwater Wireless Sensor Networks. In: Energy-Efficient Underwater Wireless Communications and Networking, IGI Global, pp. 224\u2013246 (2021).","DOI":"10.4018\/978-1-7998-3640-7.ch015"},{"issue":"2","key":"1772_CR35","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1007\/s11277-016-3302-0","volume":"89","author":"N Goyal","year":"2016","unstructured":"Goyal N, Dave M, Verma AK (2016) Energy efficient architecture for intra and inter cluster communication for underwater wireless sensor networks. Wireless Pers Commun 89(2):687\u2013707","journal-title":"Wireless Pers Commun"},{"issue":"4","key":"1772_CR36","doi-asserted-by":"publisher","first-page":"e3485","DOI":"10.1002\/dac.3485","volume":"31","author":"N Goyal","year":"2018","unstructured":"Goyal N, Dave M, Verma AK (2018) A novel fault detection and recovery technique for cluster-based underwater wireless sensor networks. Int J Commun Syst 31(4):e3485","journal-title":"Int J Commun Syst"},{"issue":"3","key":"1772_CR37","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1109\/TNET.2021.3056772","volume":"29","author":"R Ruby","year":"2021","unstructured":"Ruby R, Zhong S, ElHalawany BM, Luo H, Wu K (2021) SDN-enabled energy-aware routing in underwater multi-modal communication networks. IEEE\/ACM Trans Networking 29(3):965\u2013978","journal-title":"IEEE\/ACM Trans Networking"},{"key":"1772_CR38","doi-asserted-by":"publisher","first-page":"107735","DOI":"10.1016\/j.comnet.2020.107735","volume":"186","author":"A Triantafyllou","year":"2021","unstructured":"Triantafyllou A, Sarigiannidis P, Lagkas T, Moscholios ID, Sarigiannidis A (2021) Leveraging fairness in LoRaWAN: a novel scheduling scheme for collision avoidance. Comput Netw 186:107735","journal-title":"Comput Netw"},{"key":"1772_CR39","doi-asserted-by":"publisher","first-page":"100570","DOI":"10.1016\/j.osn.2020.100570","volume":"37","author":"CT Nguyen","year":"2020","unstructured":"Nguyen CT, Nguyen MT, Mai VV (2020) Underwater optical wireless communication-based IoUT networks: MAC performance analysis and improvement. Opt Switch Netw 37:100570","journal-title":"Opt Switch Netw"},{"issue":"11","key":"1772_CR40","doi-asserted-by":"publisher","first-page":"9688","DOI":"10.1109\/JIOT.2020.2990925","volume":"7","author":"F Xing","year":"2020","unstructured":"Xing F, Yin H, Shen Z, Leung VCM (2020) Joint relay assignment and power allocation for multiuser multirelay networks over underwater wireless optical channels. IEEE Internet Things J 7(11):9688\u20139701","journal-title":"IEEE Internet Things J"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01772-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01772-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01772-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T15:28:01Z","timestamp":1731425281000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01772-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,29]]},"references-count":40,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["1772"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01772-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,29]]},"assertion":[{"value":"24 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}