{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:43:26Z","timestamp":1772556206979,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T00:00:00Z","timestamp":1741046400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T00:00:00Z","timestamp":1741046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s12083-025-01942-9","type":"journal-article","created":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T08:46:14Z","timestamp":1741077974000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An AI-based approach for dynamic routing in IoT networks"],"prefix":"10.1007","volume":"18","author":[{"given":"Debasis","family":"Gountia","sequence":"first","affiliation":[]},{"given":"Pranati","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Ranjan Kumar","family":"Dash","sequence":"additional","affiliation":[]},{"given":"Nihar Ranjan","family":"Pradhan","sequence":"additional","affiliation":[]},{"given":"Sachi Nandan","family":"Mohanty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,4]]},"reference":[{"issue":"1","key":"1942_CR1","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1007\/s11277-021-08659-x","volume":"121","author":"A Srivastava","year":"2021","unstructured":"Srivastava A, Mishra PK (2021) A survey on WSN issues with its heuristics and meta-heuristics solutions. Wirel Pers Commun 121(1):745\u2013814","journal-title":"Wirel Pers Commun"},{"key":"1942_CR2","doi-asserted-by":"publisher","first-page":"100396","DOI":"10.1016\/j.cosrev.2021.100396","volume":"40","author":"P Rawat","year":"2021","unstructured":"Rawat P, Chauhan S (2021) Clustering protocols in wireless sensor network: a survey, classification, issues, and future directions. Comput Sci Rev 40:100396","journal-title":"Comput Sci Rev"},{"key":"1942_CR3","doi-asserted-by":"publisher","first-page":"102409","DOI":"10.1016\/j.adhoc.2020.102409","volume":"114","author":"I Daanoune","year":"2021","unstructured":"Daanoune I, Abdennaceur B, Ballouk A (2021) A comprehensive survey on leach-based clustering routing protocols in wireless sensor networks. Ad Hoc Netw 114:102409","journal-title":"Ad Hoc Netw"},{"key":"1942_CR4","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1007\/s11277-020-07929-4","volume":"117","author":"U Patil","year":"2021","unstructured":"Patil U, Kulkarni AV, Menon R, Venkatesan M (2021) A novel AEB-AODV based AADITHYA cross layer design hibernation algorithm for energy optimization in WSN. Wirel Pers Commun 117:1419\u20131439","journal-title":"Wirel Pers Commun"},{"issue":"4","key":"1942_CR5","doi-asserted-by":"publisher","first-page":"503","DOI":"10.15837\/ijccc.2019.4.3572","volume":"14","author":"W Hu","year":"2019","unstructured":"Hu W, Li H, Yao W, Hu Y (2019) Energy optimization for WSN in ubiquitous power internet of things. Int J Comput Commun Control 14(4):503\u2013517","journal-title":"Int J Comput Commun Control"},{"key":"1942_CR6","doi-asserted-by":"publisher","first-page":"11057","DOI":"10.1007\/s10586-017-1297-2","volume":"22","author":"L Wang","year":"2019","unstructured":"Wang L, Qi J, Xie W, Liu Z, Jia Z (2019) An enhanced energy optimization routing protocol using double cluster heads for wireless sensor network. Clust Comput 22:11057\u201311068","journal-title":"Clust Comput"},{"key":"1942_CR7","doi-asserted-by":"publisher","first-page":"135277","DOI":"10.1109\/ACCESS.2019.2942321","volume":"7","author":"C Xu","year":"2019","unstructured":"Xu C, Xiong Z, Zhao G, Yu S (2019) An energy-efficient region source routing protocol for lifetime maximization in WSN. IEEE Access 7:135277\u2013135289","journal-title":"IEEE Access"},{"issue":"3","key":"1942_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.32604\/iasc.2023.029155","volume":"35","author":"H Gunigari","year":"2023","unstructured":"Gunigari H, Chitra S (2023) Energy efficient networks using ant colony optimization with game theory clustering. Intell Autom Soft Comput 35(3):1","journal-title":"Intell Autom Soft Comput"},{"key":"1942_CR9","doi-asserted-by":"crossref","unstructured":"Mishra P, Dash RK, Panda DK, Lal B, Gupta NS et al (2024) Reliability evaluation of a wireless sensor network in terms of network delay and transmission probability for IOT applications. Contemporary Mathematics, 309\u2013325","DOI":"10.37256\/cm.5120242906"},{"key":"1942_CR10","doi-asserted-by":"crossref","unstructured":"Al-Khayyat ATA, Ibrahim A (2020) Energy optimization in WSN routing by using the K-means clustering algorithm and ant colony algorithm. In: 2020 4th International symposium on multidisciplinary studies and innovative technologies (ISMSIT). IEEE, pp 1\u20134","DOI":"10.1109\/ISMSIT50672.2020.9254459"},{"key":"1942_CR11","doi-asserted-by":"publisher","first-page":"104749","DOI":"10.1016\/j.micpro.2022.104749","volume":"96","author":"DJ Bahadur","year":"2023","unstructured":"Bahadur DJ, Lakshmanan L (2023) A novel method for optimizing energy consumption in wireless sensor network using genetic algorithm. Microprocess Microsyst 96:104749","journal-title":"Microprocess Microsyst"},{"issue":"5","key":"1942_CR12","doi-asserted-by":"publisher","first-page":"2487","DOI":"10.3390\/en16052487","volume":"16","author":"S Sharmin","year":"2023","unstructured":"Sharmin S, Ahmedy I, Md Noor R (2023) An energy-efficient data aggregation clustering algorithm for wireless sensor Networks using hybrid PSO. Energies 16(5):2487","journal-title":"Energies"},{"key":"1942_CR13","doi-asserted-by":"publisher","first-page":"103737","DOI":"10.1016\/j.dsp.2022.103737","volume":"130","author":"MK Roberts","year":"2022","unstructured":"Roberts MK, Ramasamy P (2022) Optimized hybrid routing protocol for energy-aware cluster head selection in wireless sensor networks. Digit Signal Process 130:103737","journal-title":"Digit Signal Process"},{"issue":"1","key":"1942_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-021-01924-4","volume":"2021","author":"I Bouazzi","year":"2021","unstructured":"Bouazzi I, Zaidi M, Usman M, Shamim MZM (2021) A new medium access control mechanism for energy optimization in wsn: traffic control and data priority scheme. EURASIP J Wirel Commun Netw 2021(1):1\u201323","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"1942_CR15","doi-asserted-by":"publisher","first-page":"1248","DOI":"10.1007\/s10922-020-09535-y","volume":"28","author":"SY Hashemi","year":"2020","unstructured":"Hashemi SY, Shams Aliee F (2020) Fuzzy, dynamic and trust based routing protocol for IoT. J Netw Syst Manag 28:1248\u20131278","journal-title":"J Netw Syst Manag"},{"issue":"9","key":"1942_CR16","doi-asserted-by":"publisher","first-page":"9050","DOI":"10.1109\/JIOT.2020.3002233","volume":"7","author":"Z Ding","year":"2020","unstructured":"Ding Z, Shen L, Chen H, Yan F, Ansari N (2020) Energy-efficient relay-selection-based dynamic routing algorithm for IoT-oriented software-defined WSNs. IEEE Internet Things J 7(9):9050\u20139065","journal-title":"IEEE Internet Things J"},{"key":"1942_CR17","doi-asserted-by":"crossref","unstructured":"Gill R, Dubey TK (2022) Shortest path computation technique in WSN for IOT applications.","DOI":"10.21203\/rs.3.rs-1030832\/v1"},{"issue":"19","key":"1942_CR18","doi-asserted-by":"publisher","first-page":"2320","DOI":"10.3390\/electronics10192320","volume":"10","author":"Z Shah","year":"2021","unstructured":"Shah Z, Levula A, Khurshid K, Ahmed J, Ullah I, Singh S (2021) Routing protocols for mobile Internet of Things (IoT): A survey on challenges and solutions. Electronics 10(19):2320","journal-title":"Electronics"},{"issue":"22","key":"1942_CR19","doi-asserted-by":"publisher","first-page":"3660","DOI":"10.3390\/electronics11223660","volume":"11","author":"L Liu","year":"2022","unstructured":"Liu L, Wang B, Xu H (2022) Research on path-planning algorithm integrating optimization A* algorithm and artificial potential field method. Electronics 11(22):3660","journal-title":"Electronics"},{"key":"1942_CR20","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.procs.2021.01.034","volume":"179","author":"D Foead","year":"2021","unstructured":"Foead D, Ghifari A, Kusuma MB, Hanafiah N, Gunawan E (2021) A systematic literature review of A* pathfinding. Procedia Comput Sci 179:507\u2013514","journal-title":"Procedia Comput Sci"},{"key":"1942_CR21","doi-asserted-by":"crossref","unstructured":"Kharrufa H, Al-Kashoash H, Al-Nidawi Y, Mosquera MQ, Kemp AH (2017) Dynamic RPL for multi-hop routing in IoT applications. In: 2017 13th Annual conference on wireless on-demand network systems and services (WONS). IEEE, pp 100\u2013103","DOI":"10.1109\/WONS.2017.7888753"},{"key":"1942_CR22","doi-asserted-by":"crossref","unstructured":"Moeini H, Yen I-L, Bastani F (2017) Routing in IoT network for dynamic service discovery. In: 2017 IEEE 23rd International conference on parallel and distributed systems (ICPADS). IEEE, pp 360\u2013367","DOI":"10.1109\/ICPADS.2017.00055"},{"issue":"2","key":"1942_CR23","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/JSEN.2017.2773119","volume":"18","author":"W Wen","year":"2017","unstructured":"Wen W, Zhao S, Shang C, Chang C-Y (2017) Eapc: Energy-aware path construction for data collection using mobile sink in wireless sensor networks. IEEE Sens J 18(2):890\u2013901","journal-title":"IEEE Sens J"},{"key":"1942_CR24","doi-asserted-by":"publisher","first-page":"103223","DOI":"10.1016\/j.jnca.2021.103223","volume":"194","author":"M Krishnan","year":"2021","unstructured":"Krishnan M, Lim Y (2021) Reinforcement learning-based dynamic routing using mobile sink for data collection in WSNs and IoT applications. J Netw Comput Appl 194:103223","journal-title":"J Netw Comput Appl"},{"key":"1942_CR25","unstructured":"Sharma CK (2015) Shortest path searching for road network using A* algorithm."},{"key":"1942_CR26","doi-asserted-by":"crossref","unstructured":"Rachmawati D, Gustin L (2020) Analysis of Dijkstra\u2019s algorithm and A* algorithm in shortest path problem. In: Journal of Physics: Conference Series, vol. 1566. IOP Publishing, p 012061","DOI":"10.1088\/1742-6596\/1566\/1\/012061"},{"issue":"2","key":"1942_CR27","doi-asserted-by":"publisher","first-page":"353","DOI":"10.3390\/s18020353","volume":"18","author":"HDS Araujo","year":"2018","unstructured":"Araujo HDS, Filho RH, Rodrigues JJ, Rabelo RDA, Sousa NDC, Filho JC, Sobral JV (2018) A proposal for IoT dynamic routes selection based on contextual information. Sensors 18(2):353","journal-title":"Sensors"},{"key":"1942_CR28","doi-asserted-by":"crossref","unstructured":"Almazroi AA, Alqarni MA, Al-Shareeda MA, Alkinani MH, Almazroey AA, Gaber T (2024) A bilinear pairing-based anonymous authentication scheme for 5G-assisted vehicular fog computing. Arab J Sci Eng 1\u201322","DOI":"10.1007\/s13369-024-09617-y"},{"key":"1942_CR29","doi-asserted-by":"crossref","unstructured":"Al-Mekhlafi ZG, Lashari SA, Al-Shareeda MA, Mohammed BA, Alayba AM, Saleh AMS, Al-Reshidi HA, Almekhlafi K (2024) CLA-FC5G: A certificateless authentication scheme using fog computing for 5G-assisted vehicular networks. IEEE Access","DOI":"10.21203\/rs.3.rs-3978206\/v1"},{"issue":"9","key":"1942_CR30","doi-asserted-by":"publisher","first-page":"11991","DOI":"10.1007\/s13369-023-08535-9","volume":"49","author":"AA Almazroi","year":"2024","unstructured":"Almazroi AA, Alkinani MH, Al-Shareeda MA, Manickam S (2024) A novel DDoS mitigation strategy in 5G-based vehicular networks using Chebyshev polynomials. Arab J Sci Eng 49(9):11991\u201312004","journal-title":"Arab J Sci Eng"},{"issue":"6","key":"1942_CR31","doi-asserted-by":"publisher","first-page":"3703","DOI":"10.1007\/s12083-024-01778-9","volume":"17","author":"ZG Al-Mekhlafi","year":"2024","unstructured":"Al-Mekhlafi ZG, Al-Janabi HDK, Al-Shareeda MA, Mohammed BA, Alshudukhi JS, Al-Dhlan KA (2024) Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication. Peer Peer Netw Appl 17(6):3703\u20133721","journal-title":"Peer Peer Netw Appl"},{"key":"1942_CR32","unstructured":"Al-Mekhlafi ZG, Lashari SA, Altmemi JM, Al-Shareeda MA, Mohammed BA, Sallam AA, Alayba AM (2024) Oblivious transfer-based authentication and privacy-preserving protocol for 5G-enabled vehicular fog computing. IEEE Access"},{"issue":"3","key":"1942_CR33","doi-asserted-by":"publisher","first-page":"728","DOI":"10.3390\/en13030728","volume":"13","author":"C Del-Valle-Soto","year":"2020","unstructured":"Del-Valle-Soto C, Mex-Perera C, Nolazco-Flores JA, Vel\u00e1zquez R, Rossa-Sierra A (2020) Wireless sensor network energy model and its use in the optimization of routing protocols. Energies 13(3):728","journal-title":"Energies"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01942-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01942-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01942-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:31:34Z","timestamp":1746844294000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01942-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,4]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1942"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01942-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,4]]},"assertion":[{"value":"29 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"112"}}