{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:41:47Z","timestamp":1765622507217,"version":"3.48.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s12083-025-02084-8","type":"journal-article","created":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T02:22:18Z","timestamp":1762482138000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An adaptive intrusion detection framework for mobile ad-hoc networks using feature extraction and NS3 simulation"],"prefix":"10.1007","volume":"18","author":[{"given":"Anand","family":"Verma","sequence":"first","affiliation":[]},{"given":"Sunil","family":"Gautam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,7]]},"reference":[{"key":"2084_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105760","volume":"119","author":"M Prasad","year":"2023","unstructured":"Prasad M, Tripathi S, Dahal K (2023) An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks. Eng Appl Artif Intell 119:105760","journal-title":"Eng Appl Artif Intell"},{"key":"2084_CR2","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/ICCT56141.2022.10072455","volume-title":"2022 IEEE 22nd international conference on communication technology (ICCT)","author":"Z Wang","year":"2022","unstructured":"Wang Z, Zhang J, Zhang Y, Zhao H, Wei J (2022) Comparison of mobile adHoc network routing protocols based on NS3. In: 2022 IEEE 22nd international conference on communication technology (ICCT). IEEE, pp 11\u201316"},{"issue":"103","key":"2084_CR3","first-page":"407","volume":"155","author":"SMS Bukhari","year":"2024","unstructured":"Bukhari SMS, Zafar MH, AbouHouran M, Moosavi SKR, Mansoor M, Muaaz M, Sanfilippo F (2024) Secure and privacy-preserving intrusion detection in wireless sensor networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability. Ad Hoc Netw 155(103):407","journal-title":"Ad Hoc Netw"},{"issue":"4","key":"2084_CR4","doi-asserted-by":"publisher","first-page":"14840","DOI":"10.48084\/etasr.7641","volume":"14","author":"B Mopuru","year":"2024","unstructured":"Mopuru B, Pachipala Y (2024) Advancing IoT security: integrative machine learning models for enhanced intrusion detection in wireless sensor networks. Eng Technol Appl Sci Res 14(4):14840\u201314847","journal-title":"Eng Technol Appl Sci Res"},{"issue":"5","key":"2084_CR5","doi-asserted-by":"publisher","first-page":"5913","DOI":"10.1007\/s10586-024-04270-4","volume":"27","author":"N Biyyapu","year":"2024","unstructured":"Biyyapu N, Veerapaneni EJ, Surapaneni PP, Vellela SS, Vatambeti R (2024) Designing a modified feature aggregation model with hybri d sampling techniques for network intrusion detection. Clust Comput 27(5):5913\u20135931","journal-title":"Clust Comput"},{"key":"2084_CR6","doi-asserted-by":"crossref","unstructured":"As'adi H, Keshavarz-Haddad A, Jamshidi A (2018) A new statistical method for wormhole attack detection in MANETs. In: 2018 15th international ISC (Iranian Society of Cryptology) conference on information security and cryptology (ISCISC). IEEE, pp 1\u20136","DOI":"10.1109\/ISCISC.2018.8546943"},{"key":"2084_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105980","volume":"87","author":"M Prasad","year":"2020","unstructured":"Prasad M, Tripathi S, Dahal K (2020) An efficient feature selection based Bayesian and Rough set approach for intrusion detection. Ap pl Soft Comput 87:105980","journal-title":"Ap pl Soft Comput"},{"issue":"1","key":"2084_CR8","doi-asserted-by":"publisher","first-page":"158","DOI":"10.3390\/network3010008","volume":"3","author":"MM Rashid","year":"2023","unstructured":"Rashid MM, Khan SU, Eusufzai F, Redwan MA, Sabuj SR, Elsharief M (2023) A federated learning-based approach for improving intrusion detection in industrial internet of things networks. Network 3(1):158\u2013179","journal-title":"Network"},{"key":"2084_CR9","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1109\/IndiaCom.2014.6828091","volume-title":"2014 international conference on computing for sustainable global development (INDIACom)","author":"P Rajankumar","year":"2014","unstructured":"Rajankumar P, Nimisha P, Kamboj P (2014) A comparative study and simulation of AODV MANET routing protocol in NS2 & NS3. In: 2014 international conference on computing for sustainable global development (INDIACom). IEEE, pp 889\u2013894"},{"key":"2084_CR10","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/IES50839.2020.9231690","volume-title":"2020 international electronics symposium (IES)","author":"A Kurniawan","year":"2020","unstructured":"Kurniawan A, Kristalina P, Hadi MZS (2020) Performance analysis of routing protocols AODV, OLSR and DSDV on MANET using NS3. In: 2020 international electronics symposium (IES). IEEE, pp 199\u2013206"},{"key":"2084_CR11","doi-asserted-by":"crossref","unstructured":"Idan ZS, Al-Fatlawi A, Hussein Alaasam HA, Hasan SH, Al Khazaali AAT (2025) Intrusion detection system in wireless sensor networks using machine learning. J Intell Syst Internet Things 14(2)","DOI":"10.54216\/JISIoT.140203"},{"issue":"3","key":"2084_CR12","doi-asserted-by":"publisher","first-page":"2139","DOI":"10.1007\/s10207-024-00833-z","volume":"23","author":"MA Talukder","year":"2024","unstructured":"Talukder MA, Sharmin S, Uddin MA, Islam MM, Aryal S (2024) MLSTL-WSN: machine learning-based intrusion detection using SM OTETomek in WSNs. Int J Inf Secur 23(3):2139\u20132158","journal-title":"Int J Inf Secur"},{"key":"2084_CR13","first-page":"1","volume-title":"2024 5th international conference on innovative trends in information technology (ICITIIT)","author":"S Mukherjee","year":"2024","unstructured":"Mukherjee S, Mohapatra H (2024) Performance analysis of different MANET routing protocols. In: 2024 5th international conference on innovative trends in information technology (ICITIIT). IEEE, pp 1\u20136"},{"key":"2084_CR14","first-page":"1","volume-title":"2013 international conference on advanced computing and communication systems","author":"KR Abirami","year":"2013","unstructured":"Abirami KR, Sumithra MG, Rajasekaran J (2013) An enhanced intrusion detection system for routing attacks in MANET. In: 2013 international conference on advanced computing and communication systems. IEEE, pp 1\u20136"},{"key":"2084_CR15","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1109\/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00259","volume-title":"2019 IEEE SmartWorld, ubiquitous intelligence & computing, advanced & trusted computing, scalable computing & communications, cloud & big data computing, internet of people and smart city innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI)","author":"Y Fu","year":"2019","unstructured":"Fu Y, Li G, Mohammed A, Yan Z, Cao J, Li H (2019) A study and enhancement to the security of MA NET AODV protocol against black hole attacks. In: 2019 IEEE SmartWorld, ubiquitous intelligence & computing, advanced & trusted computing, scalable computing & communications, cloud & big data computing, internet of people and smart city innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI). IEEE, pp 1431\u20131436"},{"key":"2084_CR16","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1109\/ICEIEC.2017.8076589","volume-title":"2017 7th IEEE international conference on electronics information and emergency communication (ICEIEC)","author":"H Zhang","year":"2017","unstructured":"Zhang H, Guo J (2017) Application of MANET routing protocol in vehicular ad hoc network based on NS3. In: 2017 7th IEEE international conference on electronics information and emergency communication (ICEIEC). IEEE, pp 391\u2013394"},{"key":"2084_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2021.104216","volume":"101","author":"M Di Mauro","year":"2021","unstructured":"Di Mauro M, Galatro G, Fortino G, Liotta A (2021) Supervised feature selection techniques in network intrusion detection: a critical review. Eng Appl Artif Intell 101:104216","journal-title":"Eng Appl Artif Intell"},{"key":"2084_CR18","first-page":"1","volume-title":"2021 innovations in power and advanced computing technologies (i-PACT)","author":"S Vemuri","year":"2021","unstructured":"Vemuri S, Mirkar S (2021) A performance comparison of MANET routing protocols. In: 2021 innovations in power and advanced computing technologies (i-PACT). IEEE, pp 1\u20135"},{"key":"2084_CR19","volume":"51","author":"E Elmahdi","year":"2020","unstructured":"Elmahdi E, Yoo SM, Sharshembiev K (2020) Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks. J Inf Secur Appl 51:102425","journal-title":"J Inf Secur Appl"},{"key":"2084_CR20","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1109\/ICCICCT.2014.6993021","volume-title":"2014 international conference on control, instrumentation, communication and computational technologies (ICCICCT)","author":"S Singla","year":"2014","unstructured":"Singla S, Jain S (2014) Comparison of routing protocols of MANET in real world scenario using NS3. In: 2014 international conference on control, instrumentation, communication and computational technologies (ICCICCT). IEEE, pp 543\u2013549"},{"key":"2084_CR21","doi-asserted-by":"crossref","unstructured":"Yang Y, Tang X, Liu Z, Cheng J, Fang H, Zhang C (2025) Diff-IDS: a network intrusion detection model based on diffusion model for imbalanced data samples. Comput Mater Contin 82(3)","DOI":"10.32604\/cmc.2025.060357"},{"key":"2084_CR22","first-page":"1","volume-title":"2017 international conference on computing, communication, control and automation (ICCUBEA)","author":"A Junnarkar","year":"2017","unstructured":"Junnarkar A, Bagwan AB (2017) Novel quality of service (QoS) improvement routing protocol for MANET using ant colony optimization. In: 2017 international conference on computing, communication, control and automation (ICCUBEA). IEEE, pp 1\u20136"},{"key":"2084_CR23","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1109\/DeSE58274.2023.10100163","volume-title":"2023 15th international conference on developments in esystems engineering (DeSE)","author":"HA Ahmed","year":"2023","unstructured":"Ahmed HA, Al-Asadi HAA (2023) A tri-classes method for studying the impact of nodes and sinks number on received packets ratio of MANETs routing protocols. In: 2023 15th international conference on developments in esystems engineering (DeSE). IEEE, pp 521\u2013526"},{"issue":"1","key":"2084_CR24","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.adhoc.2012.05.006","volume":"11","author":"A Mitrokotsa","year":"2013","unstructured":"Mitrokotsa A, Dimitrakakis C (2013) Intrusion detection in MANET using classification algorithms: the effects of cost and model selection. Ad Hoc Netw 11(1):226\u2013237","journal-title":"Ad Hoc Netw"},{"key":"2084_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102861","volume":"121","author":"C Zhang","year":"2022","unstructured":"Zhang C, Jia D, Wang L, Wang W, Liu F, Yang A (2022) Comparative research on network intrusion detection methods based on machine learning. Comput Sec 121:102861","journal-title":"Comput Sec"},{"key":"2084_CR26","first-page":"1","volume-title":"2021 international conference on computer communication and informatics (ICCCI)","author":"P Shettar","year":"2021","unstructured":"Shettar P, Kachavimath AV, Mulla MM, Hanchinmani G (2021) Intrusion detection system using MLP and chaotic neural networks. In: 2021 international conference on computer communication and informatics (ICCCI). IEEE, pp 1\u20134"},{"key":"2084_CR27","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/SMART50582.2020.9336794","volume-title":"2020 9th international conference system modeling and advancement in research trends (SMART)","author":"N Sharma","year":"2020","unstructured":"Sharma N, Sharma DP, Sharma M (2020) Wormhole formation and simulation in dynamic source routing protocol using NS3. In: 2020 9th international conference system modeling and advancement in research trends (SMART). IEEE, pp 318\u2013322"},{"key":"2084_CR28","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1109\/CSR54599.2022.9850292","volume-title":"2022 IEEE international conference on cyber security and resilience (CSR)","author":"S Purohit","year":"2022","unstructured":"Purohit S, Govindarasu M (2022) ML-based anomaly detection for intra-vehicular CAN-bus networks. In: 2022 IEEE international conference on cyber security and resilience (CSR). IEEE, pp 233\u2013238"},{"key":"2084_CR29","first-page":"1","volume-title":"2023 9th international conference on optimization and applications (ICOA)","author":"F El Haoussi","year":"2023","unstructured":"El Haoussi F, El Fezazi N, Idrissi S, El Akchioui N, El Fezazi Y (2023) Detecting black hole attacks in MANET usi ng baiting and timer technique with AODV protocol. In: 2023 9th international conference on optimization and applications (ICOA). IEEE, pp 1\u20135"},{"key":"2084_CR30","first-page":"1","volume-title":"2018 6th international conference on wireless networks and mobile communications (WINCOM)","author":"A Nabou","year":"2018","unstructured":"Nabou A, Laanaoui MD, Ouzzif M (2018) Evaluation of MANET routing protocols under black hole attack using AO DV and OLSR in NS3. In: 2018 6th international conference on wireless networks and mobile communications (WINCOM). IEEE, pp 1\u20136"},{"key":"2084_CR31","doi-asserted-by":"crossref","unstructured":"Marhoon HA, Sagban R, Oudah AY, Ahmed SR (2025) A barrier-based machine learning approach for intrusion detection in wireless sensor networks. Comput Mater Contin 82(3)","DOI":"10.32604\/cmc.2025.058822"},{"issue":"12","key":"2084_CR32","doi-asserted-by":"publisher","first-page":"4002","DOI":"10.3390\/s24124002","volume":"24","author":"J Huang","year":"2024","unstructured":"Huang J, Chen Z, Liu SZ, Zhang H, Long HX (2024) Improved intrusion detection based on hybrid deep learning models and federate d learning. Sensors (Basel) 24(12):4002","journal-title":"Sensors (Basel)"},{"issue":"1","key":"2084_CR33","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1186\/s40537-023-00870-w","volume":"11","author":"MH Behiry","year":"2024","unstructured":"Behiry MH, Aly M (2024) Cyberattack detection in wireless sensor networks using a hybrid feature reduction technique with AI and machine learning methods. J Big Data 11(1):16","journal-title":"J Big Data"},{"issue":"19","key":"2084_CR34","doi-asserted-by":"publisher","first-page":"6377","DOI":"10.3390\/s24196377","volume":"24","author":"TS Delwar","year":"2024","unstructured":"Delwar TS, Aras U, Mukhopadhyay S, Kumar A, Kshirsagar U, Lee Y, Singh M, Ryu JY (2024) The intersection of machine learning and wireless sensor network security for cyber-attack detection: a detailed analysis. Sensors (Basel) 24(19):6377","journal-title":"Sensors (Basel)"},{"key":"2084_CR35","first-page":"1","volume-title":"2016 twenty second national conference on communication (NCC)","author":"B Subba","year":"2016","unstructured":"Subba B, Biswas S, Karmakar S (2016) A neural network based system for intrusion detection and attack classification. In: 2016 twenty second national conference on communication (NCC). IEEE, pp 1\u20136"},{"issue":"6","key":"2084_CR36","doi-asserted-by":"publisher","first-page":"1785","DOI":"10.1002\/pc.24177","volume":"39","author":"A Gaurav","year":"2018","unstructured":"Gaurav A, Singh KK (2018) Fatigue behavior of FRP composites and CNT-embedded FRP composites: a review. Polym Compos 39(6):1785\u20131808","journal-title":"Polym Compos"},{"key":"2084_CR37","first-page":"12","volume":"43","author":"A Hammamouche","year":"2018","unstructured":"Hammamouche A, Omar M, Djebari N, Tari A (2018) Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET. J Inf Secur Appl 43:12\u201320","journal-title":"J Inf Secur Appl"},{"key":"2084_CR38","first-page":"111","volume-title":"2017 IEEE conference of Russian young researchers in electrical and electronic engineering (EIConR us)","author":"A Bakhtin","year":"2017","unstructured":"Bakhtin A, Volkov A, Muratchaev S, Galenko V, Konoplev A (2017) Development of MANET network model for s pace environment in NS3. In: 2017 IEEE conference of Russian young researchers in electrical and electronic engineering (EIConR us). IEEE, pp 111\u2013114"},{"key":"2084_CR39","first-page":"1","volume-title":"2021 3rd international cyber resilience conference (CRC)","author":"TW Ching","year":"2021","unstructured":"Ching TW, Aman AHM, Azamuddin WMH, Attarbashi ZS (2021) Performance evaluation of AODV routing proto col in MANET using NS-3 simulator. In: 2021 3rd international cyber resilience conference (CRC). IEEE, pp 1\u20134"},{"key":"2084_CR40","first-page":"1","volume-title":"2023 14th international conference on computing communication and networking technologies (ICCCNT)","author":"YR Salroo","year":"2023","unstructured":"Salroo YR, Sharma N (2023) Impact analysis of various parameters on the performance of AODV routing protocol in MANET using NS-3 simulator. In: 2023 14th international conference on computing communication and networking technologies (ICCCNT). IEEE, pp 1\u20136"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02084-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02084-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02084-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:37:35Z","timestamp":1765622255000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02084-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":40,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2084"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02084-8","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,10]]},"assertion":[{"value":"4 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics, Consent to Participate, and Consent to Publish Declarations"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}],"article-number":"328"}}