{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T01:43:49Z","timestamp":1767836629784,"version":"3.49.0"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:00:00Z","timestamp":1746144000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:00:00Z","timestamp":1746144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-01967-0","type":"journal-article","created":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T09:41:22Z","timestamp":1746178882000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Hybrid key management WSN protocol to enhance network performance using ML techniques for IoT application in cloud environment"],"prefix":"10.1007","volume":"18","author":[{"given":"Raghini","family":"M","sequence":"first","affiliation":[]},{"given":"Selvam","family":"Durairaj","sequence":"additional","affiliation":[]},{"given":"Sasikala","family":"S","sequence":"additional","affiliation":[]},{"given":"Appavu\u00a0alias\u00a0Balamurugan","family":"S","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,2]]},"reference":[{"issue":"12s","key":"1967_CR1","first-page":"445","volume":"12","author":"VV Deshpande","year":"2024","unstructured":"Deshpande VV, Shukla RK (2024) Dcor: Enhancing network lifetime and performance in iot-based wireless sensor networks through distributed clustering and optimized routing. Int J Intell Syst Appl Eng 12(12s):445\u2013457","journal-title":"Int J Intell Syst Appl Eng"},{"key":"1967_CR2","doi-asserted-by":"crossref","unstructured":"Irshad RR, Hussain S, Hussain I, Nasir JA, Zeb A, Alalayah KM, Alattab AA, Yousif A, Alwayle IM (2023) Iot-enabled secure and scalable cloud architecture for multi-user systems: A hybrid post-quantum cryptographic and blockchain based approach towards a trustworthy cloud computing. IEEE Access","DOI":"10.1109\/ACCESS.2023.3318755"},{"key":"1967_CR3","doi-asserted-by":"crossref","unstructured":"Gupta M, Kumar BS (2023) Lightweight secure session key protection, mutual authentication and access control (lssmac) for wban assisted iot network. IEEE Sens J","DOI":"10.1109\/JSEN.2023.3295381"},{"key":"1967_CR4","doi-asserted-by":"crossref","unstructured":"Asha A, Arunachalam R, Poonguzhali I, Urooj S, Alelyani S (2023) Optimized rnn-based performance prediction of iot and wsn-oriented smart city application using improved honey badger algorithm. Meas 210","DOI":"10.1016\/j.measurement.2023.112505"},{"issue":"2","key":"1967_CR5","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1016\/j.jksuci.2023.01.008","volume":"35","author":"BA Begum","year":"2023","unstructured":"Begum BA, Nandury SV (2023) Data aggregation protocols for wsn and iot applications-a comprehensive survey. J King Saud Univ-Comput Inf Sci 35(2):651\u2013681","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"1967_CR6","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.future.2023.10.020","volume":"152","author":"P Chithaluru","year":"2024","unstructured":"Chithaluru P, Al-Turjman F, Dugyala R, Stephan T, Kumar M, Dhatterwal JS (2024) An enhanced consortium blockchain diversity mining technique for iot metadata aggregation. Futur Gener Comput Syst 152:239\u2013253","journal-title":"Futur Gener Comput Syst"},{"key":"1967_CR7","doi-asserted-by":"crossref","unstructured":"Rami Reddy M, Ravi Chandra M, Venkatramana P, Dilli R (2023) Energy-efficient cluster head selection in wireless sensor networks\u00a0using an improved grey wolf optimization algorithm. Comput 12(2):35","DOI":"10.3390\/computers12020035"},{"key":"1967_CR8","doi-asserted-by":"crossref","unstructured":"Misbha D et al (2023) Lightweight key distribution for secured and energy efficient communication in wireless sensor network: An optimization assisted model. High-Confidence Comput 3(2)","DOI":"10.1016\/j.hcc.2023.100126"},{"key":"1967_CR9","doi-asserted-by":"crossref","unstructured":"Ghadi YY, Mazhar T, Shloul T, Shahzad T, Salaria UA, Ahmed A, Hamam H (2024) Machine learning solution for the security of wireless sensor network. IEEE Access","DOI":"10.1109\/ACCESS.2024.3355312"},{"issue":"1","key":"1967_CR10","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1186\/s13677-023-00420-y","volume":"12","author":"D Mohamed","year":"2023","unstructured":"Mohamed D, Ismael O (2023) Enhancement of an iot hybrid intrusion detection system based on fog-to-cloud computing. J Cloud Comput 12(1):41","journal-title":"J Cloud Comput"},{"key":"1967_CR11","doi-asserted-by":"crossref","unstructured":"Arumugam M, Parasuraman K (2024) Whale optimized routing path selection and 128 bit secured key management for maritime safety. Int J Naval Archit Ocean Eng 100584","DOI":"10.1016\/j.ijnaoe.2024.100584"},{"issue":"2","key":"1967_CR12","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1007\/s12083-023-01458-0","volume":"16","author":"PPI Vazhuthi","year":"2023","unstructured":"Vazhuthi PPI, Prasanth A, Manikandan S, Sowndarya KD (2023) A hybrid anfis reptile optimization algorithm for energy-efficient inter-cluster routing in internet of things-enabled wireless sensor networks. Peer-to-Peer Networking Appl 16(2):1049\u20131068","journal-title":"Peer-to-Peer Networking Appl"},{"issue":"1","key":"1967_CR13","doi-asserted-by":"publisher","first-page":"47","DOI":"10.12720\/jcm.18.1.47-57","volume":"18","author":"N Mahlake","year":"2023","unstructured":"Mahlake N, Mathonsi TE, Du Plessis D, Muchenje T (2023) A lightweight encryption algorithm to enhance wireless sensor network security on the internet of things. J Commun 18(1):47\u201357","journal-title":"J Commun"},{"key":"1967_CR14","doi-asserted-by":"crossref","unstructured":"Natarajan R, Lokesh GH, Flammini F, Premkumar A, Venkatesan VK, Gupta SK (2023) A novel framework on security and energy enhancement based on internet of medical things for healthcare 5.0. Infrastructures 8(2):22","DOI":"10.3390\/infrastructures8020022"},{"key":"1967_CR15","doi-asserted-by":"crossref","unstructured":"Bettayeb S, Messai M-L, Hemam SM (2023) A robust and efficient vector-based key management scheme for iot networks. Ad Hoc Netw 149","DOI":"10.1016\/j.adhoc.2023.103250"},{"key":"1967_CR16","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.future.2023.10.020","volume":"152","author":"P Chithaluru","year":"2024","unstructured":"Chithaluru P, Al-Turjman F, Dugyala R, Stephan T, Kumar M, Dhatterwal JS (2024) An enhanced consortium blockchain diversity mining technique for iot metadata aggregation. Futur Gener Comput Syst 152:239\u2013253","journal-title":"Futur Gener Comput Syst"},{"issue":"1","key":"1967_CR17","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s11235-022-00968-1","volume":"82","author":"MK Roberts","year":"2023","unstructured":"Roberts MK, Ramasamy P (2023) An improved high performance clustering based routing protocol for wireless sensor networks in iot. Telecommun Syst 82(1):45\u201359","journal-title":"Telecommun Syst"},{"key":"1967_CR18","doi-asserted-by":"publisher","first-page":"25941","DOI":"10.1109\/ACCESS.2023.3254594","volume":"11","author":"SK Chaurasiya","year":"2023","unstructured":"Chaurasiya SK, Mondal S, Biswas A, Nayyar A, Shah MA, Banerjee R (2023) An energy-efficient hybrid clustering technique (eehct) for iot-based multilevel heterogeneous wireless sensor networks. IEEE Access 11:25941\u201325958","journal-title":"IEEE Access"},{"issue":"1","key":"1967_CR19","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1186\/s40537-023-00870-w","volume":"11","author":"MH Behiry","year":"2024","unstructured":"Behiry MH, Aly M (2024) Cyberattack detection in wireless sensor networks using a hybrid feature reduction technique with ai and machine learning methods. J Big Data 11(1):16","journal-title":"J Big Data"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01967-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01967-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01967-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:21:15Z","timestamp":1758986475000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01967-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,2]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["1967"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01967-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,2]]},"assertion":[{"value":"11 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval and Consent to participate"}},{"value":"Not Applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and Animal Ethics"}},{"value":"Not Applicable","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"Not Applicable","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Availability of supporting data"}},{"value":"The authors declare no competing interests.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"163"}}