{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T13:09:52Z","timestamp":1775221792057,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s12083-024-01877-7","type":"journal-article","created":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T03:16:16Z","timestamp":1733282176000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Enhancing intrusion detection in MANETs with blockchain-based trust management and enhanced GRU model"],"prefix":"10.1007","volume":"18","author":[{"given":"ES Phalguna","family":"Krishna","sequence":"first","affiliation":[]},{"given":"Daria","family":"Sandeep","sequence":"additional","affiliation":[]},{"given":"Raviteja","family":"Kocherla","sequence":"additional","affiliation":[]},{"given":"Kranthi Kumar","family":"Lella","sequence":"additional","affiliation":[]},{"given":"Srikanth","family":"Molugu","sequence":"additional","affiliation":[]},{"given":"Shaik Hussain Shaik","family":"Ibrahim","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Vatambeti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,4]]},"reference":[{"key":"1877_CR1","doi-asserted-by":"crossref","unstructured":"Sun P, Liu P, Li Q, Liu C, Lu X, Hao R, Chen J (2020) DL-IDS: Extracting features using CNN-LSTM hybrid network for intrusion detection system.\u00a0Secur Commun Netw\u00a02020:8890306","DOI":"10.1155\/2020\/8890306"},{"key":"1877_CR2","doi-asserted-by":"publisher","first-page":"5579851","DOI":"10.1155\/2021\/5579851","volume":"2021","author":"H Alkahtani","year":"2021","unstructured":"Alkahtani H, Aldhyani THH (2021) Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms. Complexity 2021:5579851","journal-title":"Complexity"},{"key":"1877_CR3","unstructured":"Edeh DI (2021) Network intrusion detection system using deep learning technique. M.S. thesis, Department of Computer Science, University of Turku, Finland"},{"key":"1877_CR4","unstructured":"Wu P (2020) Deep learning for network intrusion detection: attack recognition with computational intelligence. M.S. thesis, School of Computer Science and Engineering, University of New South Wales, Australia"},{"issue":"3","key":"1877_CR5","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1016\/j.jksuci.2019.04.003","volume":"34","author":"KN Dattatraya","year":"2022","unstructured":"Dattatraya KN, Rao KR (2022) Hybrid-based cluster head selection for maximizing network lifetime and energy efficiency in WSN. J King Saud Univ - Comput Inform Sci 34(3):716\u2013726","journal-title":"J King Saud Univ - Comput Inform Sci"},{"issue":"1","key":"1877_CR6","first-page":"38","volume":"10","author":"MS Shaik","year":"2020","unstructured":"Shaik MS, Mira F (2020) A comprehensive mechanism of MANET network layer-based security attack prevention. Int J Wirel Microw Technol 10(1):38\u201347","journal-title":"Int J Wirel Microw Technol"},{"key":"1877_CR7","doi-asserted-by":"publisher","first-page":"103401","DOI":"10.1016\/j.micpro.2021.103401","volume":"80","author":"J Maruthupandi","year":"2021","unstructured":"Maruthupandi J, Prasanna S, Jayalakshmi P, Mareeswari V, Siva Kumar B (2021) Route manipulation aware software-defined networks for effective routing in SDN controlled MANET by Disney routing protocol. Microprocess Microsyst 80:103401. https:\/\/doi.org\/10.1016\/j.micpro.2021.103401","journal-title":"Microprocess Microsyst"},{"key":"1877_CR8","doi-asserted-by":"crossref","unstructured":"Hussain K, Hussain SJ, Jhanjhi NZ, Humayun M (2019) SYN flood attack detection based on Bayes estimator (SFADBE) for MANET. In 2019 International conference on computer and information sciences (ICCIS), 1\u20134","DOI":"10.1109\/ICCISci.2019.8716416"},{"key":"1877_CR9","doi-asserted-by":"crossref","unstructured":"Sivanesan N, Archana KS (2022) Performance analysis of machine learning-based detection of sinkhole network layer attack in MANET. Int J Adv Comput Sci Appl, 13(12)","DOI":"10.14569\/IJACSA.2022.0131262"},{"key":"1877_CR10","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s10916-019-1391-5","volume":"43","author":"T Kavitha","year":"2019","unstructured":"Kavitha T, Geetha K, Muthaiah R (2019) Intruder node detection and isolation action in mobile ad hoc networks using feature optimization and classification approach. J Med Syst 43:249","journal-title":"J Med Syst"},{"key":"1877_CR11","unstructured":"Benmeziane H (2020) Comparison of deep learning frameworks and compilers. M.S. thesis, Department of Computer Science, \u00c9cole Nationale Sup\u00e9rieure d\u2019Informatique, Oued Smar, Algeria"},{"key":"1877_CR12","doi-asserted-by":"crossref","unstructured":"Laqtib S, Yassini KE, Hasnaoui ML (2019) A deep learning method for intrusion detection systems-based machine learning in MANET. In Proceedings of the 4th international conference on smart city applications, 1\u20138","DOI":"10.1145\/3368756.3369021"},{"issue":"6","key":"1877_CR13","first-page":"301","volume":"8","author":"S Venkatasubramanian","year":"2021","unstructured":"Venkatasubramanian S (2021) Multistage Optimized Fuzzy Based Intrusion Detection protocol for NIDS in MANET. Internation al J innovative Res Technol 8(6):301\u2013311","journal-title":"Internation al J Innovative Res Technol"},{"key":"1877_CR14","doi-asserted-by":"publisher","first-page":"103526","DOI":"10.1016\/j.cose.2023.103526","volume":"136","author":"R Reka","year":"2024","unstructured":"Reka R, Karthick R, Ram RS, Singh G (2024) Multi head self-attention gated graph convolutional network based multi attack intrusion detection in MANET. Computers Secur 136:103526","journal-title":"Computers Secur"},{"key":"1877_CR15","doi-asserted-by":"publisher","unstructured":"Ilakkiya N, Rajaram A (2024) Blockchain-enabled lightweight intrusion detection system for secure MANETs. J Electr Eng Technol 1\u201315. https:\/\/doi.org\/10.1007\/s42835-023-01056-3","DOI":"10.1007\/s42835-023-01056-3"},{"key":"1877_CR16","doi-asserted-by":"crossref","unstructured":"Kouanou AT, Fonzin TF, Zanga FM, Mouelas AN, Ndenoka GN, Ekonde MS (2024) Machine learning for intrusion detection in ad-hoc networks: Wormhole and blackhole attacks case. Cloud Comput Data Sci, 62\u201379","DOI":"10.37256\/ccds.5120243516"},{"key":"1877_CR17","doi-asserted-by":"publisher","first-page":"123027","DOI":"10.1016\/j.eswa.2023.123027","volume":"245","author":"R Devendiran","year":"2024","unstructured":"Devendiran R, Turukmane AV (2024) Dugat-LSTM: Deep learning based network intrusion detection system using chaotic optimization strategy. Expert Syst Appl 245:123027. https:\/\/doi.org\/10.1016\/j.eswa.2023.123027","journal-title":"Expert Syst Appl"},{"issue":"1","key":"1877_CR18","doi-asserted-by":"publisher","first-page":"619","DOI":"10.18201\/ijisae.2024111694","volume":"12","author":"S Majumder","year":"2024","unstructured":"Majumder S, Bhattacharyya D, Chakraborty S (2024) Mitigation of wormhole attack in MANET using Cryptic-AODV: A modified routing protocol. Int J Intell Syst Appl Eng 12(1):619\u2013627. https:\/\/doi.org\/10.18201\/ijisae.2024111694","journal-title":"Int J Intell Syst Appl Eng"},{"key":"1877_CR19","doi-asserted-by":"publisher","first-page":"107231","DOI":"10.1016\/j.engappai.2023.107231","volume":"127","author":"M Saied","year":"2024","unstructured":"Saied M, Guirguis S, Madbouly M (2024) Review of artificial intelligence for enhancing intrusion detection in the internet of things. Eng Appl Artif Intell 127:107231. https:\/\/doi.org\/10.1016\/j.engappai.2023.107231","journal-title":"Eng Appl Artif Intell"},{"key":"1877_CR20","doi-asserted-by":"publisher","first-page":"110113","DOI":"10.1016\/j.comnet.2023.110113","volume":"238","author":"SH Islam","year":"2024","unstructured":"Islam SH, Parai K, Gupta DS (2024) PF-IBDA: Provably secure and pairing-free identity-based deniable authentication protocol for MANET environments. Comput Netw 238:110113","journal-title":"Comput Netw"},{"key":"1877_CR21","doi-asserted-by":"publisher","first-page":"105969","DOI":"10.1016\/j.engappai.2023.105969","volume":"123","author":"SB Ninu","year":"2023","unstructured":"Ninu SB (2023) An intrusion detection system using Exponential Henry Gas Solubility Optimization based Deep Neuro Fuzzy Network in MANET. Eng Appl Artif Intell 123:105969","journal-title":"Eng Appl Artif Intell"},{"issue":"2","key":"1877_CR22","doi-asserted-by":"publisher","first-page":"893","DOI":"10.32604\/iasc.2023.028022","volume":"35","author":"C Edwin Singh","year":"2023","unstructured":"Edwin Singh C, Celestin Vigila SM (2023) WOA-DNN for intelligent intrusion detection and classification in MANET services. Intell Autom Soft Comput 35(2):893\u2013908","journal-title":"Intell Autom Soft Comput"},{"issue":"1","key":"1877_CR23","first-page":"481","volume":"37","author":"ZA Abbood","year":"2023","unstructured":"Abbood ZA, Atilla D\u00c7, Aydin \u00c7 (2023) Intrusion detection system through deep learning in routing MANET networks. Intell Autom Soft Comput 37(1):481\u2013493","journal-title":"Intell Autom Soft Comput"},{"key":"1877_CR24","doi-asserted-by":"publisher","first-page":"2309","DOI":"10.1016\/j.procs.2023.01.206","volume":"218","author":"S Shafi","year":"2023","unstructured":"Shafi S, Mounika S, Velliangiri S (2023) Machine learning and trust-based AODV routing protocol to mitigate flooding and blackhole attacks in MANET. Procedia Comput Sci 218:2309\u20132318","journal-title":"Procedia Comput Sci"},{"issue":"2","key":"1877_CR25","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1007\/s11277-023-10325-3","volume":"130","author":"V Mankotia","year":"2023","unstructured":"Mankotia V, Sunkaria RK, Gurung S (2023) AFA: Anti-flooding attack scheme against flooding attack in MANET. Wireless Pers Commun 130(2):1161\u20131190","journal-title":"Wireless Pers Commun"},{"key":"1877_CR26","first-page":"8836375","volume":"2023","author":"I Rathod","year":"2023","unstructured":"Rathod I, Saxena A (2023) Remapping attack detection and prevention for reliable data service in MANET. J Comput Networks Commun 2023:8836375","journal-title":"J Comput Networks Commun"},{"key":"1877_CR27","first-page":"1673","volume":"29","author":"K Rajkumar","year":"2023","unstructured":"Rajkumar K, Shalinie M, S (2023) Boomerang packet testing to mitigate wormhole attack in MANET. Wireless Netw 29:1673\u20131689","journal-title":"Wireless Netw"},{"key":"1877_CR28","doi-asserted-by":"publisher","first-page":"3428","DOI":"10.1038\/s41598-024-53938-9","volume":"14","author":"DS Bhatti","year":"2024","unstructured":"Bhatti DS, Saleem S, Imran A et al (2024) Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions. Sci Rep 14:3428","journal-title":"Sci Rep"},{"key":"1877_CR29","doi-asserted-by":"crossref","unstructured":"Vijayan P, Anbalagan P, Selvakumar S (2023) An ensembled optimization algorithm for secured and energy-efficient low-latency MANET with intrusion detection.\u00a0J Ambient Intell Humaniz Comput","DOI":"10.58346\/JISIS.2022.I4.011"},{"issue":"2","key":"1877_CR30","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MC.2018.2888764","volume":"52","author":"K Siddique","year":"2019","unstructured":"Siddique K, Akhtar Z, Khan FA, Kim Y (2019) KDD cup 99 data sets: A perspective on the role of data sets in network intrusion detection research. Computer 52(2):41\u201351","journal-title":"Computer"},{"issue":"5","key":"1877_CR31","first-page":"3365","volume":"25","author":"AAP Raj","year":"2021","unstructured":"Raj AAP, Mozhi JK (2021) Dynamic statistical data-based intrusion detection scheme in MANET using fuzzy rules. Annals Romanian Soc Cell Biology 25(5):3365\u20133375","journal-title":"Annals Romanian Soc Cell Biology"},{"key":"1877_CR32","first-page":"47557","volume":"11","author":"G Moustafa","year":"2023","unstructured":"Moustafa G, Alnami H, Hakmi SH, Shaheen AM, Ginidi A, Elshahed M, Mansour HS (2023) A novel mantis search algorithm for economic dispatch in combined heat and power systems. IEEE Access 11:47557\u201347571","journal-title":"IEEE Access"},{"issue":"3","key":"1877_CR33","doi-asserted-by":"publisher","first-page":"698","DOI":"10.3390\/s20030698","volume":"20","author":"MT Lwin","year":"2020","unstructured":"Lwin MT, Yim J, Ko YB (2020) Blockchain-based lightweight trust management in mobile ad-hoc networks. Sensors 20(3):698","journal-title":"Sensors"},{"key":"1877_CR34","doi-asserted-by":"crossref","first-page":"43753","DOI":"10.1109\/ACCESS.2023.3336424","volume":"11","author":"DS Bhatti","year":"2023","unstructured":"Bhatti DS, Saleem S, Imran A, Kim H, Kim KI (2023) DAIWN: Detection and isolation of wormhole nodes in wireless ad hoc networks. IEEE Access 11:43753\u201343767","journal-title":"IEEE Access"},{"key":"1877_CR35","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/s40998-024-00700-6","volume":"48","author":"MG Karthik","year":"2024","unstructured":"Karthik MG, Sivaji U, Manohar M& others. (2024) An intrusion detection model based on hybridization of S-ROA in deep learning model for MANET. Iran J Sci Technol Trans Electr Eng 48:719\u2013730","journal-title":"Iran J Sci Technol Trans Electr Eng"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01877-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01877-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01877-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:33:09Z","timestamp":1747474389000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01877-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,4]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1877"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01877-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,4]]},"assertion":[{"value":"2 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The submitted work is original and has not been published elsewhere in any form or language","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"NA","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human participants and\/or animals"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"27"}}