{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T17:50:33Z","timestamp":1766598633822,"version":"3.41.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T00:00:00Z","timestamp":1729900800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T00:00:00Z","timestamp":1729900800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Intell Robot Appl"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s41315-024-00367-6","type":"journal-article","created":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T09:02:32Z","timestamp":1729933352000},"page":"512-530","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Hybrid moth flame-shark smell optimization-based secure wireless communications for IoT applications"],"prefix":"10.1007","volume":"9","author":[{"given":"Mantripragada Yaswanth Bhanu","family":"Murthy","sequence":"first","affiliation":[]},{"given":"Anne","family":"Koteswararao","sequence":"additional","affiliation":[]},{"given":"Melingi Sunil","family":"Babu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,26]]},"reference":[{"issue":"5","key":"367_CR1","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1002\/cplx.21634","volume":"21","author":"O Abedinia","year":"2014","unstructured":"Abedinia, O., Amjady, N., Ghasemi, A.: A new metaheuristic algorithm based on shark smell optimization. Complexity 21(5), 97\u2013116 (2014)","journal-title":"Complexity"},{"issue":"6","key":"367_CR2","doi-asserted-by":"crossref","first-page":"2343","DOI":"10.1016\/j.jksuci.2020.10.015","volume":"34","author":"D Ahamad","year":"2020","unstructured":"Ahamad, D., Hameed, S.A., Akhtar, M.: A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. J. King Saud Univ. Comput. Inf. Sci. 34(6), 2343\u20132358 (2020)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"1","key":"367_CR3","first-page":"268","volume":"63","author":"D Bethanabhotla","year":"2015","unstructured":"Bethanabhotla, D., Caire, G., Neely, M.J.: Adaptive video streaming for wireless networks with multiple users and helpers. IEEE Trans. Wireless Commun. 63(1), 268\u2013285 (2015)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"367_CR4","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.comcom.2019.09.007","volume":"149","author":"R Bhatt","year":"2020","unstructured":"Bhatt, R., Maheshwary, P., Shukla, P., Shukla, P., Shrivastava, M., Changlani, S.: Implementation of Fruit Fly Optimization Algorithm (FFOA) to escalate the attacking efficiency of node capture attack in Wireless Sensor Networks (WSN). Comput. Commun. 149, 134\u2013145 (2020)","journal-title":"Comput. Commun."},{"issue":"4","key":"367_CR5","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1109\/MCOM.2015.7081084","volume":"53","author":"S Bi","year":"2015","unstructured":"Bi, S., Ho, C.K., Zhang, R.: Wireless powered communication: opportunities and challenges. IEEE Commun. Mag. 53(4), 117\u2013125 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"367_CR6","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MWC.2016.7462480","volume":"23","author":"S Bi","year":"2016","unstructured":"Bi, S., Zeng, Y., Zhang, R.: Wireless powered communication networks: an overview. IEEE Trans. Wirel. Commun. 23(2), 10\u201318 (2016)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"3","key":"367_CR7","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/TEVC.2015.2460753","volume":"20","author":"MR Bonyadi","year":"2016","unstructured":"Bonyadi, M.R., Michalewicz, Z.: Analysis of stability, local convergence, and transformation sensitivity of a variant of the particle swarm optimization algorithm. IEEE Trans. Evol. Comput. 20(3), 370\u2013385 (2016)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"12","key":"367_CR8","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MCOM.2015.7355564","volume":"53","author":"X Chen","year":"2015","unstructured":"Chen, X., Zhong, C., Yuen, C., Chen, H.H.: Multi-antenna relay aided wireless physical layer security. IEEE Commun. Mag. 53(12), 40\u201346 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"7","key":"367_CR9","doi-asserted-by":"crossref","first-page":"1700","DOI":"10.1109\/TSP.2015.2396009","volume":"63","author":"H Chen","year":"2015","unstructured":"Chen, H., Li, Y., Rebelatto, J.L., Ucha-Filho, B.F., Vucetic, B.: Harvest-then-cooperate: wireless-powered cooperative communications. IEEE Trans. Signal Process. 63(7), 1700\u20131711 (2015)","journal-title":"IEEE Trans. Signal Process."},{"key":"367_CR10","doi-asserted-by":"crossref","unstructured":"Chen, L., Suo, S., Kuang, X., Cao, Y., Tao, W.: Secure ubiquitous wireless communication solution for power distribution internet of things in smart grid. In: 2021 IEEE International Conference on Consumer Electronics and Computer Engineering (ICCECE), pp. 780\u2013784, 2021.","DOI":"10.1109\/ICCECE51280.2021.9342300"},{"key":"367_CR11","doi-asserted-by":"crossref","first-page":"2962","DOI":"10.1109\/TSP.2012.2189388","volume":"60","author":"Y Cheng","year":"2012","unstructured":"Cheng, Y., Pesavento, M.: Joint optimization of source power allocation and distributed relay beamforming in multiuser peer-to-peer relay networks. IEEE Trans. Signal Process. 60, 2962\u20132973 (2012)","journal-title":"IEEE Trans. Signal Process."},{"issue":"1","key":"367_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TGCN.2017.2763826","volume":"2","author":"Z Chu","year":"2018","unstructured":"Chu, Z., Nguyen, H.X., Le, T.A., Karamanoglu, M., Ever, E., Yazici, A.: Secure wireless powered and cooperative jamming D2D communications. IEEE Trans. Green Commun. Netw. 2(1), 1\u201313 (2018)","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"367_CR13","doi-asserted-by":"crossref","first-page":"2180","DOI":"10.1109\/TWC.2008.060848","volume":"7","author":"S Goel","year":"2008","unstructured":"Goel, S., Negi, R.: Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 7, 2180\u20132189 (2008)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"367_CR14","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.comcom.2020.02.027","volume":"154","author":"SA Haider","year":"2020","unstructured":"Haider, S.A., Adil, M.N., Zhao, M.: Optimization of secure wireless communications for IoT networks in the presence of eavesdroppers. Comput. Commun. 154, 119\u2013128 (2020)","journal-title":"Comput. Commun."},{"issue":"5","key":"367_CR15","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/MSP.2013.2256953","volume":"30","author":"YP Hong","year":"2013","unstructured":"Hong, Y.P., Lan, P.C., Kuo, C.J.: Enhancing physical-layer secrecy in multiantenna wireless systems: an overview of signal processing approaches. IEEE Signal Process Mag. 30(5), 29\u201340 (2013)","journal-title":"IEEE Signal Process Mag."},{"issue":"2","key":"367_CR16","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1109\/TWC.2013.122313.130727","volume":"13","author":"K Huang","year":"2014","unstructured":"Huang, K., Lau, V.K.N.: Enabling wireless power transfer in cellular networks: architecture, modeling and deployment. IEEE Trans. Wirel. Commun. 13(2), 902\u2013912 (2014)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"367_CR17","doi-asserted-by":"crossref","first-page":"5427","DOI":"10.1007\/s12652-020-02030-x","volume":"12","author":"B Illuri","year":"2021","unstructured":"Illuri, B., Jose, D.: Design and implementation of hybrid integration of cognitive learning and chaotic countermeasures for side channel attacks. J. Ambient Intell. Human. Comput. 12, 5427\u20135441 (2021)","journal-title":"J. Ambient Intell. Human. Comput."},{"issue":"3","key":"367_CR18","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1016\/j.dcan.2020.09.004","volume":"7","author":"C Jenila","year":"2021","unstructured":"Jenila, C., Jeyachitra, R.K.: Green indoor optical wireless communication systems: pathway towards pervasive deployment. Digital Commun. Netw. 7(3), 410\u2013444 (2021)","journal-title":"Digital Commun. Netw."},{"issue":"1","key":"367_CR19","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1109\/TWC.2013.112513.130760","volume":"13","author":"H Ju","year":"2014","unstructured":"Ju, H., Zhang, R.: Throughput maximization in wireless powered communication networks. IEEE Trans. Wirel. Commun. 13(1), 418\u2013428 (2014)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"367_CR20","doi-asserted-by":"crossref","DOI":"10.1016\/j.phycom.2019.100848","volume":"37","author":"H Kai-zhi","year":"2019","unstructured":"Kai-zhi, H., Bo, Z., Ya-jun, C.: Secrecy energy efficiency optimization in heterogeneous networks with simultaneous wireless information and power transfer. Phys. Commun. 37, 100848 (2019)","journal-title":"Phys. Commun."},{"issue":"24","key":"367_CR21","first-page":"1","volume":"118","author":"BC Kavitha","year":"2018","unstructured":"Kavitha, B.C., Jose, D., Vallikannu, R.: IoT based pollution monitoring system using raspberry-PI. Int. J. Pure Appl. Math. 118(24), 1\u20139 (2018)","journal-title":"Int. J. Pure Appl. Math."},{"key":"367_CR22","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MNET.2015.7113229","volume":"29","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Zhang, Y., Yu, R., Xie, S.: Integrated energy and spectrum harvesting for 5G wireless communications. IEEE Net. 29, 75\u201381 (2015)","journal-title":"IEEE Net."},{"issue":"1","key":"367_CR23","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/COMST.2016.2598968","volume":"19","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Chen, H.H., Wang, L.: Physical layer security for next generation wireless networks: theories, technologies, and challenges. IEEE Commun. Surv. Tutor. 19(1), 347\u2013376 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"367_CR24","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1016\/j.knosys.2015.07.006","volume":"89","author":"S Mirjalili","year":"2015","unstructured":"Mirjalili, S.: Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm. Knowl.-Based Syst. 89, 228\u2013249 (2015)","journal-title":"Knowl.-Based Syst."},{"issue":"8","key":"367_CR25","doi-asserted-by":"crossref","first-page":"4599","DOI":"10.1109\/TWC.2014.2314654","volume":"13","author":"DWK Ng","year":"2014","unstructured":"Ng, D.W.K., Lo, E.S., Schober, R.: Robust Beamforming for secure communication in systems with wireless information and power transfer. IEEE Trans. Wireless Commun. 13(8), 4599\u20134615 (2014)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"5","key":"367_CR26","first-page":"3166","volume":"65","author":"DWK Ng","year":"2015","unstructured":"Ng, D.W.K., Lo, E.S., Schober, R.: Multi-objective resource allocation for secure communication in cognitive radio networks with wireless information and power transfer. IEEE Trans. Veh. Technol. 65(5), 3166\u20133184 (2015)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"9","key":"367_CR27","doi-asserted-by":"crossref","first-page":"4896","DOI":"10.1109\/TWC.2014.2334610","volume":"13","author":"D Nguyen","year":"2014","unstructured":"Nguyen, D., Tran, L.-N., Pirinen, P., Latva-aho, M.: On the spectral efficiency of full-duplex small cell wireless systems. IEEE Trans. Wireless Commun. 13(9), 4896\u20134910 (2014)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"5","key":"367_CR28","doi-asserted-by":"crossref","first-page":"490","DOI":"10.1049\/iet-bmt.2017.0160","volume":"7","author":"NP Nirmala Sreedharan","year":"2018","unstructured":"Nirmala Sreedharan, N.P., Ganesan, B., Raveendran, R., Sarala, P., Dennis, B., Boothalingam, R.: Grey Wolf optimisation-based feature selection and classification for facial emotion recognition. IET Biometrics 7(5), 490\u2013499 (2018)","journal-title":"IET Biometrics"},{"issue":"4","key":"367_CR29","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MWC.2015.7224732","volume":"22","author":"L Song","year":"2015","unstructured":"Song, L., Li, Y., Han, Z.: Resource allocation in full-duplex communications for future wireless networks. IEEE Trans. Wireless Commun. 22(4), 88\u201396 (2015)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"8","key":"367_CR30","doi-asserted-by":"crossref","first-page":"5511","DOI":"10.1109\/TWC.2016.2560815","volume":"15","author":"Y Sun","year":"2016","unstructured":"Sun, Y., Ng, D.W.K., Zhu, J., Schober, R.: Multi-objective optimization for robust power efficient and secure full-duplex wireless communication systems. IEEE Trans. Wirel. Commun. 15(8), 5511\u20135526 (2016)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"367_CR31","doi-asserted-by":"crossref","first-page":"51931","DOI":"10.1109\/ACCESS.2018.2869217","volume":"6","author":"Z Sun","year":"2018","unstructured":"Sun, Z., Bi, Y., Zhao, X., Sun, Z., Ying, C., Tan, S.: Type-2 fuzzy sliding mode anti-swing controller design and optimization for overhead crane. IEEE Access 6, 51931\u201351938 (2018)","journal-title":"IEEE Access"},{"key":"367_CR33","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.1007\/s40815-020-00883-0","volume":"22","author":"Z Sun","year":"2020","unstructured":"Sun, Z., Ling, Y., Qu, H., Xiang, F., Sun, Z.: An adaptive DE algorithm based fuzzy logic anti-swing controller for overhead crane systems. Int. J. Fuzzy Syst. 22, 1905\u20131921 (2020)","journal-title":"Int. J. Fuzzy Syst."},{"issue":"119056","key":"367_CR35","first-page":"1","volume":"216","author":"Z Sun","year":"2021","unstructured":"Sun, Z., Cao, D., Ling, Y., Xiang, F., Sun, Z., Wuc, F.: Proton exchange membrane fuel cell model parameter identification based on dynamic differential evolution with collective guidance factor algorithm. Energy 216(119056), 1 (2021a)","journal-title":"Energy"},{"key":"367_CR37","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/s41315-020-00157-w","volume":"5","author":"Z Sun","year":"2021","unstructured":"Sun, Z., Ling, Y., Tan, X., Zhou, Y., Sun, Z.: Designing and application of type-2 fuzzy PID control for overhead crane systems. Int. J. Intell. Robot. Appl. 5, 10\u201322 (2021b)","journal-title":"Int. J. Intell. Robot. Appl."},{"key":"367_CR38","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1016\/j.asoc.2019.01.034","volume":"77","author":"Z Sun","year":"2019","unstructured":"Sun, Z., Wei, M., Zhang, Z., Gang, Qu.: Secure routing protocol based on multi-objective ant-colony-optimization for wireless sensor networks. Appl. Soft Comput. 77, 366\u2013375 (2019)","journal-title":"Appl. Soft Comput."},{"issue":"2","key":"367_CR39","doi-asserted-by":"crossref","first-page":"913","DOI":"10.1109\/TWC.2013.122313.130608","volume":"13","author":"HA Suraweera","year":"2014","unstructured":"Suraweera, H.A., Krikidis, I., Zheng, G., Yuen, C., Smith, P.J.: Complexity end-to-end performance optimization in MIMO full- duplex relay systems. IEEE Trans. Wireless Commun. 13(2), 913\u2013927 (2014)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"367_CR40","doi-asserted-by":"crossref","first-page":"5695","DOI":"10.1109\/ACCESS.2018.2794739","volume":"6","author":"F Tian","year":"2018","unstructured":"Tian, F., Chen, X., Liu, S., Yuan, X., Li, D., Zhang, X., Yang, Z.: Secrecy rate optimization in wireless multi-hop full duplex networks. IEEE Access 6, 5695\u20135704 (2018)","journal-title":"IEEE Access"},{"issue":"11","key":"367_CR41","doi-asserted-by":"crossref","first-page":"5473","DOI":"10.1109\/TSP.2011.2164401","volume":"59","author":"P Ubaidulla","year":"2011","unstructured":"Ubaidulla, P., Chockalingam, A.: Relay precoder optimization in MIMO-relay networks with imperfect CSI. IEEE Trans. Signal Process. 59(11), 5473\u20135484 (2011)","journal-title":"IEEE Trans. Signal Process."},{"issue":"7","key":"367_CR42","doi-asserted-by":"crossref","first-page":"4868","DOI":"10.1109\/TII.2021.3107556","volume":"18","author":"S Velliangiri","year":"2022","unstructured":"Velliangiri, S., Manoharan, R., Ramachandran, S., Rajasekar, V.: Blockchain based privacy preserving framework for emerging 6G wireless communications. IEEE Trans. Ind. Informatics 18(7), 4868\u20134874 (2022)","journal-title":"IEEE Trans. Ind. Informatics"},{"key":"367_CR43","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.comcom.2020.03.022","volume":"155","author":"W Wang","year":"2020","unstructured":"Wang, W.: Deployment and optimization of wireless network node deployment and optimization in smart cities. Comput. Commun. 155, 117\u2013124 (2020)","journal-title":"Comput. Commun."},{"issue":"12","key":"367_CR44","doi-asserted-by":"crossref","first-page":"2430","DOI":"10.1109\/LCOMM.2016.2598327","volume":"20","author":"Y Wu","year":"2016","unstructured":"Wu, Y., Chen, X., Yuen, C., Zhong, C.: Robust resource allocation for secrecy wireless powered communication networks. IEEE Commun. Lett. 20(12), 2430\u20132433 (2016)","journal-title":"IEEE Commun. Lett."},{"issue":"9","key":"367_CR45","doi-asserted-by":"crossref","first-page":"4766","DOI":"10.1109\/TWC.2014.2337308","volume":"13","author":"J Zhu","year":"2014","unstructured":"Zhu, J., Schober, R., Bhargava, V.K.: Secure transmission in multicell massive MIMO systems. IEEE Trans. Wirel. Commun. 13(9), 4766\u20134781 (2014)","journal-title":"IEEE Trans. Wirel. Commun."}],"container-title":["International Journal of Intelligent Robotics and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41315-024-00367-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41315-024-00367-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41315-024-00367-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T08:37:35Z","timestamp":1750322255000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41315-024-00367-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,26]]},"references-count":42,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["367"],"URL":"https:\/\/doi.org\/10.1007\/s41315-024-00367-6","relation":{},"ISSN":["2366-5971","2366-598X"],"issn-type":[{"type":"print","value":"2366-5971"},{"type":"electronic","value":"2366-598X"}],"subject":[],"published":{"date-parts":[[2024,10,26]]},"assertion":[{"value":"7 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}