{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:12:39Z","timestamp":1760746359284,"version":"build-2065373602"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T00:00:00Z","timestamp":1755648000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T00:00:00Z","timestamp":1755648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12083-025-02007-7","type":"journal-article","created":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T12:01:44Z","timestamp":1755691304000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bog (BA): an innovative hybrid algorithm for wireless network optimization and clustering issues"],"prefix":"10.1007","volume":"18","author":[{"given":"Farahnaz","family":"Aleahmad","sequence":"first","affiliation":[]},{"given":"Parvaneh","family":"Asghari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,20]]},"reference":[{"key":"2007_CR1","unstructured":"SW Mahfoud (1995) \"A comparison of parallel and sequential niching methods. In: Proceedings of the Sixth International Conference on Genetic Algorithms, ICGA, pp 136\u2013143"},{"key":"2007_CR2","doi-asserted-by":"publisher","unstructured":"Heidari AA, Mirjalili S, Faris H, Aljarah I, Mafarja M, Chen H (2019) Harris hawks optimization: algorithm and applications. Future Gener Comput Syst. https:\/\/doi.org\/10.1016\/j.future.2019.02.028","DOI":"10.1016\/j.future.2019.02.028"},{"key":"2007_CR3","doi-asserted-by":"publisher","first-page":"4795","DOI":"10.3390\/app10144795","volume":"10","author":"MH Kakueinejad","year":"2020","unstructured":"Kakueinejad MH, Heydari A, Askari M, Keynia F (2020) Optimal Planning for the Development of Power System in Respect to Distributed Generations Based on the Binary Dragonfly Algorithm. Appl Sci 10:4795","journal-title":"Appl Sci"},{"key":"2007_CR4","doi-asserted-by":"publisher","unstructured":"Zhang Y, Wang Y (2020) A novel energy-aware bio-inspired clustering scheme for IoT communication. Ambient Intell Human Comput 17\u201330. https:\/\/doi.org\/10.1007\/s12652-020-01704-w","DOI":"10.1007\/s12652-020-01704-w"},{"key":"2007_CR5","doi-asserted-by":"publisher","unstructured":"Sivakumar P (2018) Performance analysis of LEACH-GA over LEACH and LEACH-C in WSN. Procedia Comput Sci 248\u2013256. https:\/\/doi.org\/10.1016\/j.procs.2017.12.034","DOI":"10.1016\/j.procs.2017.12.034"},{"key":"2007_CR6","doi-asserted-by":"publisher","unstructured":"Arafat MY, Moh S (2018) A survey on cluster-based routing protocols for unmanned aerial vehicle networks. IEEE 45\u201351. https:\/\/doi.org\/10.1109\/ACCESS.2018.2885539","DOI":"10.1109\/ACCESS.2018.2885539"},{"key":"2007_CR7","doi-asserted-by":"publisher","unstructured":"Al-Turjman F (2019) Network experience scheduling and routing approach for big data transmission in the Internet of Things. IEEE 60\u201369. https:\/\/doi.org\/10.1109\/ACCESS.2019.2893501","DOI":"10.1109\/ACCESS.2019.2893501"},{"key":"2007_CR8","unstructured":"Ahlam HM, Kamalrulnizam AB, Anazida Z (2017) Optimal control overhead based multi-metric routing for MANET. J Mobile Commun Comput Inform 4715\u20134729"},{"key":"2007_CR9","unstructured":"Yang H, Li Z, Liu Z (2017) A method of routing optimization using CHNN in MANET. EURASIP J Wirel Commun Netw\u00a02017(1):1\u201313"},{"key":"2007_CR10","doi-asserted-by":"crossref","unstructured":"Wang NC, Huang YF, Chen JC (2007) A stable weight-based on-demand routing protocol for mobile ad hoc networks. Inf Sci\u00a0177(24):5522\u20135537","DOI":"10.1016\/j.ins.2007.05.030"},{"key":"2007_CR11","doi-asserted-by":"publisher","unstructured":"Kumar S, Sinha DK, Kumar V (2020) An approach to improve lifetime of MANET via power aware routing protocol and genetic algorithm. J Netw Comput Appl 117\u2013125.\u00a0https:\/\/doi.org\/10.1109\/ICIMIA48430.2020.9074912","DOI":"10.1109\/ICIMIA48430.2020.9074912"},{"key":"2007_CR12","doi-asserted-by":"publisher","unstructured":"Nivetha SK, Asokan R (2019) Metaheuristics in mobile AdHoc network route optimization. Appl Math Model 1493\u20131512.\u00a0https:\/\/doi.org\/10.1109\/IMICPW.2019.8933284","DOI":"10.1109\/IMICPW.2019.8933284"},{"key":"2007_CR13","doi-asserted-by":"crossref","unstructured":"Panda N, Pattanayak BK (2020) ACO-based secure routing protocols in MANETs. New Paradigm Decis Sci 2\u201314","DOI":"10.1007\/978-981-13-9330-3_18"},{"key":"2007_CR14","doi-asserted-by":"publisher","unstructured":"Le T, Hu W, Corke P, Jha S (2009) ERTP: energy-efficient and reliable transport protocol for data streaming in wireless sensor networks. Comput Commun.\u00a032(7\u201310):1154\u20131171.\u00a0https:\/\/doi.org\/10.1016\/j.comcom.2008.12.045","DOI":"10.1016\/j.comcom.2008.12.045"},{"key":"2007_CR15","doi-asserted-by":"crossref","unstructured":"Rajesh G, Raajini XM (2020) A multi-objective routing optimization using swarm intelligence in IoT networks. Wire Commun 813\u2013818","DOI":"10.1007\/978-981-15-3284-9_65"},{"key":"2007_CR16","doi-asserted-by":"publisher","unstructured":"Khapre SP, Chopra S, Khan A (2020) Optimized routing method for wireless sensor networks based on improved ant colony algorithm. Int J Future Gener Commun Netw\u00a013(2):75\u201386.\u00a0https:\/\/doi.org\/10.1109\/Confluence47617.2020.9058312","DOI":"10.1109\/Confluence47617.2020.9058312"},{"key":"2007_CR17","doi-asserted-by":"publisher","unstructured":"Ghassan H, Shahzad A, Fahim Sh (2017) Performance evaluation of CLPSO and MOPSO routing algorithms for optimized clustering in Vehicular Ad hoc Networks, 14th International Bhurban Conference on Applied Sciences and Technology (IBCAST). 1154\u20131171.\u00a0https:\/\/doi.org\/10.1109\/IBCAST.2017.7868141","DOI":"10.1109\/IBCAST.2017.7868141"},{"key":"2007_CR18","unstructured":"Khushneet KB (2016) Swarm intelligence for routing in mobile Ad Hoc networks. Int J Adv Inf Sci Technol (IJAIST) 73\u201379"},{"key":"2007_CR19","doi-asserted-by":"crossref","unstructured":"Rathi PS, Rao CHM (2020) Survey paper on routing in MANETs for optimal route selection based on routing protocol with particle swarm optimization and different ant colony optimization. Smart Intell Comput Appl 11\u201325","DOI":"10.1007\/978-981-13-9282-5_51"},{"key":"2007_CR20","unstructured":"Subhrapratim N, Samriddha B, Amab S, Subir KS (2016) Optimizing MANET routing in AODV: an hybridization approach of ACO and firefly algorithm. In: Second International Conference on Research in Computational Intelligence and Communication\u00a0Networks\u00a0(ICRCICN), pp 5522\u20135537"},{"key":"2007_CR21","doi-asserted-by":"crossref","unstructured":"Vidyarthi DP (2018) A green routing algorithm for IoT-enabled software defined wireless sensor network. IEEE Sens J\u00a018(5):112\u2013193","DOI":"10.1109\/JSEN.2018.2869629"},{"key":"2007_CR22","unstructured":"Pasricha SS, Ayoub R (2020) A survey on energy management for mobile and IoT devices. Int J Adv Res Comput Commun Eng\u00a09(3):57\u201360"},{"key":"2007_CR23","doi-asserted-by":"crossref","unstructured":"Vishal KA, Vishal S, Monika S (2016) A survey on LEACH and others\u2019 routing protocols in wireless sensor network. Optik 127(16):6590\u20136600","DOI":"10.1016\/j.ijleo.2016.04.041"},{"key":"2007_CR24","doi-asserted-by":"publisher","unstructured":"Yousaf A, Ahmad F, Hamid S, Khan F (2019) Performance com-parison of various LEACH protocols in Wireless Sensor Netw. In: 2019 IEEE 15thInternational Colloquium on Signal Processing & Its Applications, CSPA, IEEE, pp. 108\u2013113.\u00a0https:\/\/doi.org\/10.1109\/CSPA.2019.8695973","DOI":"10.1109\/CSPA.2019.8695973"},{"key":"2007_CR25","doi-asserted-by":"crossref","unstructured":"Mahmuddin M, Alabadleh WA, Kamarudin LM (2019) A comparative study on hoping mechanism of LEACH protocol in Wireless Sensor Netw.: a survey. IOPConf Ser Mater Sci Eng 551:012056","DOI":"10.1088\/1757-899X\/551\/1\/012056"},{"key":"2007_CR26","doi-asserted-by":"crossref","unstructured":"Rishikesh AD, Parma NA (2017) A relative survey of various LEACHbased routing protocols in wireless sensor networks. In: 2017 InternationalConference on Computing, Communication and Automation, ICCCA, IEEE, pp 630\u2013636","DOI":"10.1109\/CCAA.2017.8229878"},{"key":"2007_CR27","doi-asserted-by":"crossref","unstructured":"Al-Shalabi M, Anbar M, Wan T-C, Khasawneh A (2018) Variants of the low-energy adaptive clustering hierarchy protocol: survey, issues and challenges. Electronics 7(8):136","DOI":"10.3390\/electronics7080136"},{"key":"2007_CR28","doi-asserted-by":"crossref","unstructured":"Tong M, Tang M (2010) LEACH-B: An improved LEACH protocol for wirelesssensor network. In: 2010 International Conference on Computational Intelligenceand Software Engineering, IEEE, pp 1\u20134","DOI":"10.1109\/WICOM.2010.5601113"},{"key":"2007_CR29","doi-asserted-by":"publisher","unstructured":"Wu X, Wang S (2010) Performance comparison of LEACH and LEACH-c protocols by NS2. In: 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science\u00a0(DCABES). IEEE, pp 254\u2013258.\u00a0https:\/\/doi.org\/10.1109\/DCABES.2010.58","DOI":"10.1109\/DCABES.2010.58"},{"key":"2007_CR30","doi-asserted-by":"publisher","unstructured":"Siva D. Muruganathan, Daniel CF Ma, Rolly I. Bhasin, Abraham O. Fapojuwo, A centralized energy-efficient routing protocol for wireless sensor networks. IEEE Commun 43(3). https:\/\/doi.org\/10.1109\/MCOM.2005.1404592","DOI":"10.1109\/MCOM.2005.1404592"},{"key":"2007_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.05.008","volume":"52","author":"R Silva","year":"2014","unstructured":"Silva R, Silva Jorge Sa, Boavida Fernando (2014) Mobility in wireless sensorsnetworks - Survey and proposal. Comput Commun 52:1\u201320","journal-title":"Comput Commun"},{"key":"2007_CR32","unstructured":"Do-Seong K, Yeong-Jee C (2006) Self-organization routing protocol supportingmobile nodes for wireless sensor network. In: First International Multi- Symposiums on Computer and Computational Sciences, IMSCCS\u201906, IEEE, pp 622\u2013626"},{"issue":"3","key":"2007_CR33","doi-asserted-by":"publisher","first-page":"192","DOI":"10.12720\/jcm.8.3.192-206","volume":"8","author":"M Raed","year":"2013","unstructured":"Raed M, Bani H, Ijjeh A (2013) A survey on LEACH-based energyaware protocols for Wireless Sensor Netw. J Commun 8(3):192\u2013206","journal-title":"J Commun"},{"key":"2007_CR34","doi-asserted-by":"crossref","unstructured":"Kaur A, Grover A (2015) LEACH and extended LEACH protocols in wireless sensor network: a survey. Int J Comput Appl 116(10):1\u20135","DOI":"10.5120\/20369-2576"},{"key":"2007_CR35","doi-asserted-by":"publisher","unstructured":"Yang XS (2012) Flower pollination algorithm for global optimization. In Unconventional computation and natural computation. Springer, Berlin, Heidelberg, pp. 240\u2013249.\u00a0https:\/\/doi.org\/10.1007\/978-3-642-32894-7_27","DOI":"10.1007\/978-3-642-32894-7_27"},{"key":"2007_CR36","doi-asserted-by":"publisher","first-page":"107224","DOI":"10.1016\/j.cie.2021.107224","volume":"156","author":"H Karami","year":"2021","unstructured":"Karami H, Anaraki MV, Farzin S, Mirjalili S (2021) Flow Direction Algorithm (FDA): a novel optimization approach for solving optimization problems. Comput Ind Eng 156:107224","journal-title":"Comput Ind Eng"},{"key":"2007_CR37","doi-asserted-by":"crossref","unstructured":"Zheng YJ (2015) Water wave optimization: a new nature-inspired metaheuristic. Comput Oper Res 55:1\u201311","DOI":"10.1016\/j.cor.2014.10.008"},{"key":"2007_CR38","unstructured":"Mirjalili S (2017) Grasshopper optimization algorithm: theory and application. Adv Softw Eng 4(14):813\u2013818"},{"key":"2007_CR39","doi-asserted-by":"crossref","unstructured":"Meraihi Y, Ramdane-Cherif A, Acheli D, Mahseur M (2020) Dragonfly algorithm: a comprehensive review and applications. Neur Comput Appl\u00a032:42\u201354","DOI":"10.1007\/s00521-020-04866-y"},{"key":"2007_CR40","doi-asserted-by":"crossref","unstructured":"Suriyan K, Nagarajan R (2024) Particle swarm optimization in biomedical technologies: innovations, challenges, and opportunities. Emerg Technol Health Lit Med Pract 15\u201332","DOI":"10.4018\/979-8-3693-1214-8.ch011"},{"key":"2007_CR41","doi-asserted-by":"crossref","unstructured":"Jia H, Rao H, Wen C, Mirjalili S (2023) Crayfish optimization algorithm. Artif Intell Rev 1919\u20131979","DOI":"10.1007\/s10462-023-10567-4"},{"key":"2007_CR42","doi-asserted-by":"publisher","unstructured":"Faramarzi A, Heidarinejad M, Stephens B, Mirjalili S (2019) Equilibrium optimizer: a novel optimization algorithm. Knowl-Based Syst.\u00a0https:\/\/doi.org\/10.1016\/j.knosys.2019.105190","DOI":"10.1016\/j.knosys.2019.105190"},{"key":"2007_CR43","doi-asserted-by":"publisher","first-page":"113609","DOI":"10.1016\/j.cma.2020.113609","volume":"376","author":"L Abualigah","year":"2021","unstructured":"Abualigah L, Diabat A, Mirjalili S, Abd Elaziz M, Gandomi AH (2021) The Arithmetic Optimization Algorithm. Comput Methods Appl Mech Eng 376:113609","journal-title":"Comput Methods Appl Mech Eng"},{"key":"2007_CR44","unstructured":"Dada EG, Joseph SB, Babagana S, Oyewola DO (2023) Improved LEACH protocol based on moth flame optimization algorithm for wireless sensor Networks. Coven J Inform Commun 214\u2013225"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02007-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02007-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02007-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T06:39:48Z","timestamp":1760683188000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02007-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,20]]},"references-count":44,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2007"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02007-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,8,20]]},"assertion":[{"value":"2 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"269"}}