{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T06:08:43Z","timestamp":1774332523827,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02035-3","type":"journal-article","created":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T22:06:37Z","timestamp":1750025197000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Enhanced QoS-aware secure routing protocol for WAHNs using advanced fast double decker new binary archimedes kepler pure convolutional transformer network and cryptographic techniques"],"prefix":"10.1007","volume":"18","author":[{"given":"Vijayalakshmi","family":"Khagga","sequence":"first","affiliation":[]},{"given":"Sangeetha Priya.","family":"N","sequence":"additional","affiliation":[]},{"given":"A. M.","family":"Prasad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,16]]},"reference":[{"key":"2035_CR1","doi-asserted-by":"publisher","unstructured":"Nadarajan J, Kaliyaperumal J (2021) QOS aware and secured routing algorithm using machine intelligence in next generation VANET. Int J Syst Assurance Eng Manag 1\u201312, DOI:https:\/\/doi.org\/10.1007\/s13198-021-01076-0","DOI":"10.1007\/s13198-021-01076-0"},{"issue":"12","key":"2035_CR2","doi-asserted-by":"publisher","first-page":"13165","DOI":"10.1109\/TVT.2022.3196046","volume":"71","author":"TN Tran","year":"2022","unstructured":"Tran TN, Nguyen TV, Shim K, da Costa DB, An B (2022) A deep reinforcement learning-based QoS routing protocol exploiting cross-layer design in cognitive radio MANETs. IEEE Trans Veh Technol 71(12):13165\u201313181","journal-title":"IEEE Trans Veh Technol"},{"issue":"17","key":"2035_CR3","doi-asserted-by":"publisher","first-page":"e6993","DOI":"10.1002\/cpe.6993","volume":"34","author":"S Choudhary","year":"2022","unstructured":"Choudhary S, Dorle S (2022) A quality of service-aware high-security architecture design for software-defined network powered vehicular ad-hoc network s using machine learning-based blockchain routing. Concurrency and Computation: Practice Experience 34(17):e6993","journal-title":"Concurrency and Computation: Practice Experience"},{"key":"2035_CR4","doi-asserted-by":"crossref","unstructured":"Jubair MA, Mostafa SA, Zebari DA, Hariz HM, Abdulsattar NF: Hassan MH, Abbas AH, Abbas FH, Alasiry A, Alouane MTH (2022) A QoS aware cluster head selection and hybrid cryptography routing protocol for enhancing efficiency and security of VANETs. IEEE Access 10:124792-124804","DOI":"10.1109\/ACCESS.2022.3224466"},{"issue":"6","key":"2035_CR5","doi-asserted-by":"publisher","first-page":"4189","DOI":"10.1109\/TII.2021.3124848","volume":"18","author":"X Wang","year":"2021","unstructured":"Wang X, Hu J, Lin H, Garg S, Kaddoum G, Piran MJ, Hossain MS (2021) QoS and privacy-aware routing for 5G-enabled industrial Internet of Things: A federated reinforcement learning approach. IEEE Trans Industr Inf 18(6):4189\u20134197","journal-title":"IEEE Trans Industr Inf"},{"key":"2035_CR6","doi-asserted-by":"crossref","unstructured":"Adil, M., Song, H., Kumar, N., Jan, M.A., Nayak, A., Farouk, A., Jin, Z.(2024) TC-PAA: Deep Learning-Enabled QoS Enhancement Scheme for Cooperative Internet of Vehicles. IEEE Transactions on Vehicular Technology 73(9): 13804 - 13815","DOI":"10.1109\/TVT.2024.3396691"},{"key":"2035_CR7","doi-asserted-by":"publisher","first-page":"121864","DOI":"10.1109\/ACCESS.2022.3223085","volume":"10","author":"N Ahmad","year":"2022","unstructured":"Ahmad N, Awan MD, Khiyal MSH, Babar MI, Abdelmaboud A, Ibrahim HA, Hamed NO (2022) Improved QoS aware routing protocol (IM-QRP) for WBAN based healthcare monitoring system. IEEE Access 10:121864\u2013121885","journal-title":"IEEE Access"},{"key":"2035_CR8","doi-asserted-by":"publisher","first-page":"102386","DOI":"10.1016\/j.adhoc.2020.102386","volume":"113","author":"RN Raj","year":"2021","unstructured":"Raj RN, Nayak A, Kumar MS (2021) QoS-aware routing protocol for cognitive radio ad hoc networks. Ad Hoc Netw 113:102386","journal-title":"Ad Hoc Netw"},{"key":"2035_CR9","doi-asserted-by":"publisher","first-page":"108051","DOI":"10.1016\/j.comnet.2021.108051","volume":"192","author":"U Ashraf","year":"2021","unstructured":"Ashraf U, Ahmed A, Al-Naeem M, Masood U (2021) Reliable and QoS aware routing metrics for wireless Neighborhood Area Networking in smart grids. Comput Netw 192:108051","journal-title":"Comput Netw"},{"issue":"10","key":"2035_CR10","doi-asserted-by":"publisher","first-page":"4436","DOI":"10.3390\/app11104436","volume":"11","author":"A Zhang","year":"2021","unstructured":"Zhang A, Sun M, Wang J, Li Z, Cheng Y, Wang C (2021) Deep reinforcement learning-based multi-hop state-aware routing strategy for wireless sensor networks. Appl Sci 11(10):4436","journal-title":"Appl Sci"},{"key":"2035_CR11","doi-asserted-by":"crossref","unstructured":"Arif F, Khan NA, Iqbal J, Karim FK, Innab N, Mostafa SM (2024) DQQS: Deep Reinforcement Learning based Technique for Enhancing Security and Performance in SDN-IoT Environments. IEEE Access 12: 60568 - 60587","DOI":"10.1109\/ACCESS.2024.3392279"},{"issue":"17","key":"2035_CR12","doi-asserted-by":"publisher","first-page":"26829","DOI":"10.1007\/s11042-022-14285-x","volume":"82","author":"M Srinivasulu","year":"2023","unstructured":"Srinivasulu M, Shivamurthy G, Venkataramana B (2023) Quality of service aware energy efficient multipath routing protocol for internet of things using hybrid optimization algorithm. Multimedia Tools Appl 82(17):26829\u201326858","journal-title":"Multimedia Tools Appl"},{"issue":"5","key":"2035_CR13","doi-asserted-by":"publisher","first-page":"3495","DOI":"10.1109\/JIOT.2021.3102130","volume":"9","author":"MU Younus","year":"2021","unstructured":"Younus MU, Khan MK, Bhatti AR (2021) Improving the software-defined wireless sensor networks routing performance using reinforcement learning. IEEE Internet Things J 9(5):3495\u20133508","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"2035_CR14","doi-asserted-by":"publisher","first-page":"40","DOI":"10.3390\/s24010040","volume":"24","author":"Y Jiang","year":"2023","unstructured":"Jiang Y, Zhu J, Yang K (2023) Environment-Aware Adaptive Reinforcement Learning-Based Routing for Vehicular Ad Hoc Networks. Sensors 24(1):40","journal-title":"Sensors"},{"issue":"26","key":"2035_CR15","doi-asserted-by":"publisher","first-page":"19039","DOI":"10.1007\/s00521-023-08753-0","volume":"35","author":"S Qamar","year":"2023","unstructured":"Qamar S (2023) Optimal sensor network routing with secure network monitoring using deep learning architectures. Neural Comput Appl 35(26):19039\u201319050","journal-title":"Neural Comput Appl"},{"issue":"6","key":"2035_CR16","doi-asserted-by":"publisher","first-page":"2747","DOI":"10.1007\/s12083-023-01545-2","volume":"16","author":"R Prabha","year":"2023","unstructured":"Prabha R, Senthil GA, Suganthi SU (2023) Cluster head based secure routing using optimized dual-discriminator conditional generative adversarial network in wireless ad-hoc networks. Peer-to-Peer Networking Appl 16(6):2747\u20132760","journal-title":"Peer-to-Peer Networking Appl"},{"issue":"8","key":"2035_CR17","doi-asserted-by":"publisher","first-page":"3541","DOI":"10.1007\/s11276-023-03424-3","volume":"29","author":"S Tamizharasi","year":"2023","unstructured":"Tamizharasi S, Arunadevi B, Deepa SN (2023) Bio-inspired deep residual neural network learning model for QoS routing enhancement in mobile ad-hoc networks. Wireless Netw 29(8):3541\u20133565","journal-title":"Wireless Netw"},{"key":"2035_CR18","doi-asserted-by":"crossref","unstructured":"Murugan VS, Unhelkar B (2024) Optimizing Mobile Ad Hoc Network cluster based routing: Energy prediction via improved deep learning technique. Int J Commun Syst 37(10): e5777","DOI":"10.1002\/dac.5777"},{"issue":"18","key":"2035_CR19","doi-asserted-by":"publisher","first-page":"7960","DOI":"10.3390\/s23187960","volume":"23","author":"Y Pramitarini","year":"2023","unstructured":"Pramitarini Y, Perdana RHY, Shim K, An B (2023) DLSMR: Deep Learning-Based Secure Multicast Routing Protocol against Wormhole Attack in Flying Ad Hoc Networks with Cell-Free Massive Multiple-Input Multiple-Output. Sensors 23(18):7960","journal-title":"Sensors"},{"issue":"7","key":"2035_CR20","doi-asserted-by":"publisher","first-page":"e7599","DOI":"10.1002\/cpe.7599","volume":"35","author":"S Saravanan","year":"2023","unstructured":"Saravanan S, Prabakar D, Sathya SS (2023) Trust aware ad hoc routing protocol with key management based mechanism and optimal energy-efficient cluster head selection in MANETs. Concurrency and Computation: Practice Experience 35(7):e7599","journal-title":"Concurrency and Computation: Practice Experience"},{"key":"2035_CR21","doi-asserted-by":"publisher","first-page":"14260","DOI":"10.1109\/ACCESS.2022.3144679","volume":"10","author":"U Srilakshmi","year":"2022","unstructured":"Srilakshmi U, Alghamdi SA, Vuyyuru VA, Veeraiah N, Alotaibi Y (2022) A secure optimization routing algorithm for MANETs. IEEE Access 10:14260\u201314269","journal-title":"IEEE Access"},{"issue":"6","key":"2035_CR22","doi-asserted-by":"publisher","first-page":"8830","DOI":"10.1007\/s11227-021-04258-6","volume":"78","author":"M Srinivas","year":"2022","unstructured":"Srinivas M, Patnaik MR (2022) Clustering with a high-performance secure routing protocol for MANETs. J Supercomput 78(6):8830\u20138851","journal-title":"J Supercomput"},{"issue":"12","key":"2035_CR23","doi-asserted-by":"publisher","first-page":"34175","DOI":"10.1007\/s11042-024-18191-2","volume":"83","author":"MB Praba","year":"2024","unstructured":"Praba MB, Ramesh SS (2024) A novel TT-SHO QoS aware and secured Vehicular Adhoc Network (VANET) routing protocol for smart intelligent transportation. Multimed Tools Appl 83(12):34175\u201334198","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"2035_CR24","doi-asserted-by":"publisher","first-page":"15711","DOI":"10.48084\/etasr.7633","volume":"14","author":"M Sirajuddin","year":"2024","unstructured":"Sirajuddin M, Ravela C, Krishna SR, Ahamed SK, Basha SK, Basha NMJ (2024) A Secure Framework based On Hybrid Cryptographic Scheme and Trusted Routing to Enhance the QoS of a WSN. Eng Technol Appl Sci Res 14(4):15711\u201315716","journal-title":"Eng Technol Appl Sci Res"},{"issue":"13","key":"2035_CR25","doi-asserted-by":"publisher","first-page":"e8067","DOI":"10.1002\/cpe.8067","volume":"36","author":"KUR Khan","year":"2024","unstructured":"Khan KUR, Azeem MA (2024) An optimized crypto-based routing protocol for secure routing in wireless sensor networks. Concurrency Comput: Pract Experience 36(13):e8067","journal-title":"Concurrency Comput: Pract Experience"},{"key":"2035_CR26","doi-asserted-by":"crossref","unstructured":"Priya, S. S., Vijayabhasker, R., Rajaram, A.(2025) Advanced Security and Efficiency Framework for Mobile Ad-Hoc Networks Using Adaptive Clustering and Optimization Techniques. J Electrical Eng Technol 20: 1815\u20131826","DOI":"10.1007\/s42835-024-02119-9"},{"issue":"1","key":"2035_CR27","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s11276-024-03745-x","volume":"31","author":"S Iqbal","year":"2025","unstructured":"Iqbal S, Sujatha BR (2025) Secure authentication and key management based on hierarchical enhanced identity based digital signature in heterogeneous wireless sensor network. Wireless Netw 31(1):127\u2013147","journal-title":"Wireless Netw"},{"key":"2035_CR28","doi-asserted-by":"crossref","unstructured":"Wang Y, Wang M (2024) Robust scRNA-seq Cell Types Identification by Self-Guided Deep Clustering Network. IEEE Access 12: 2169-3536","DOI":"10.1109\/ACCESS.2024.3394038"},{"key":"2035_CR29","doi-asserted-by":"publisher","first-page":"114616","DOI":"10.1016\/j.cma.2022.114616","volume":"392","author":"H Zamani","year":"2022","unstructured":"Zamani H, Nadimi-Shahraki MH, Gandomi AH (2022) Starling murmuration optimizer: A novel bio-inspired algorithm for global and engineering optimization. Comput Methods Appl Mech Eng 392:114616","journal-title":"Comput Methods Appl Mech Eng"},{"key":"2035_CR30","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.aej.2024.04.021","volume":"97","author":"H Abdelfattah","year":"2024","unstructured":"Abdelfattah H, Aseeri AO, Abd Elaziz M (2024) Optimized FOPID controller for nuclear research reactor using enhanced planet optimization algorithm. Alex Eng J 97:267\u2013282","journal-title":"Alex Eng J"},{"key":"2035_CR31","doi-asserted-by":"publisher","first-page":"35004","DOI":"10.1109\/ACCESS.2021.3062403","volume":"9","author":"W El-Shafai","year":"2021","unstructured":"El-Shafai W, Almomani IM, Alkhayer A (2021) Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication. IEEE Access 9:35004\u201335026","journal-title":"IEEE Access"},{"key":"2035_CR32","doi-asserted-by":"publisher","unstructured":"Tojo L, Maik V, Devi M (2022) Image denoising using multi scaling aided double decker convolutional neural network. Optik 170350. https:\/\/doi.org\/10.1016\/j.ijleo.2022.170350","DOI":"10.1016\/j.ijleo.2022.170350"},{"key":"2035_CR33","doi-asserted-by":"crossref","unstructured":"Zhang J, Jin J, Tang J, Qu Z (2023) FPTN: Fast Pure Transformer Network for Traffic Flow Forecasting. In International Conference on Artificial Neural Networks (pp. 382\u2013393). Cham: Springer Nature Switzerland","DOI":"10.1007\/978-3-031-44223-0_31"},{"issue":"1","key":"2035_CR34","doi-asserted-by":"publisher","first-page":"3453","DOI":"10.1038\/s41598-024-52416-6","volume":"14","author":"R Mohamed","year":"2024","unstructured":"Mohamed R, Abdel-Basset M, Sallam KM, Hezam IM, Alshamrani AM, Hameed IA (2024) Novel hybrid kepler optimization algorithm for parameter estimation of photovoltaic modules. Sci Rep 14(1):3453","journal-title":"Sci Rep"},{"key":"2035_CR35","doi-asserted-by":"publisher","first-page":"120639","DOI":"10.1016\/j.eswa.2023.120639","volume":"230","author":"L Fang","year":"2023","unstructured":"Fang L, Yao Y, Liang X (2023) New binary archimedes optimization algorithm and its application. Expert Syst Appl 230:120639","journal-title":"Expert Syst Appl"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02035-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02035-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02035-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:21:58Z","timestamp":1758986518000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02035-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,16]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2035"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02035-3","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,16]]},"assertion":[{"value":"8 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All the authors involved have agreed to participate in this submitted article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All the authors involved in this manuscript give full consent for publication of this submitted article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"216"}}