{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:13:46Z","timestamp":1774631626933,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-03193-6","type":"journal-article","created":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T08:02:47Z","timestamp":1725264167000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":109,"title":["Deep Learning-Infused Hybrid Security Model for Energy Optimization and Enhanced Security in Wireless Sensor Networks"],"prefix":"10.1007","volume":"5","author":[{"given":"K.","family":"Ramu","sequence":"first","affiliation":[]},{"given":"S. V. S. Rama Krishnam","family":"Raju","sequence":"additional","affiliation":[]},{"given":"Satyanand","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Venubabu","family":"Rachapudi","sequence":"additional","affiliation":[]},{"given":"M. Anitha","family":"Mary","sequence":"additional","affiliation":[]},{"given":"Vandana","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Shubham","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,2]]},"reference":[{"key":"3193_CR1","doi-asserted-by":"crossref","unstructured":"Jin Wang YU, Gao XY, Feng Li & Hye-Jin Kim 2018, \u201cAn enhanced PEGASIS algorithm with mobile sink support for wireless sensor networks\u201d, Wirel. Commun. mobile Comput., pp. 1\u20139.","DOI":"10.1155\/2018\/9472075"},{"key":"3193_CR2","unstructured":"Kai Arulkumaran, Marc Peter Deisenroth, Miles Brundage & Anil Anthony Bharath 2017 \u201cA brief survey of deep reinforcement learning\u201d. arXiv:1708.05866"},{"key":"3193_CR3","doi-asserted-by":"crossref","unstructured":"Khan F, Memon S & Jokhio SH 2016, \u201cSupport vector machine-based energy-aware routing in wireless sensor networks\u201d, in: 2016 2nd International Conference on Robotics and Artificial Intelligence (ICRAI), 01\u201302 Nov 2016, Rawalpindi, Pakistan, pp. 1\u20134.","DOI":"10.1109\/ICRAI.2016.7791218"},{"key":"3193_CR4","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.compeleceng.2014.06.009","volume":"41","author":"JA Khan","year":"2016","unstructured":"Khan JA, Qureshi HK, Iqbal A. Energy management in wireless sensor networks: A survey. Comput Electr Eng. 2016;41:159\u201376.","journal-title":"Comput Electr Eng"},{"key":"3193_CR5","unstructured":"Krishnan & Nagamuthu SS \u03b2019, \u201cDenial of Service (DoS) Detection in Wireless Sensor Networks Applying Geometrically Varying Clusters\u201d, International Conference on Computer Networks and Communication Technologies, Springer, Singapore, pp.1023\u20131030."},{"issue":"2","key":"3193_CR6","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/s11119-014-9371-8","volume":"16","author":"MH Anisi","year":"2015","unstructured":"Anisi MH, Abdul-Salaam G, Abdullah AH. A survey of wireless sensor network approaches and their energy consumption for monitoring farm fields in precision agriculture. Precision Agric. 2015;16(2):216\u201338.","journal-title":"Precision Agric"},{"key":"3193_CR7","doi-asserted-by":"publisher","first-page":"1744","DOI":"10.3390\/electronics10141744","volume":"10","author":"R Wazirali","year":"2021","unstructured":"Wazirali R, Ahmad R, Al-Amayreh A, Al-Madi M. Khalifeh, A, \u201cSecure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview.\u201d Electronics. 2021;10:1744.","journal-title":"Electronics"},{"key":"3193_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.comcom.2014.10.004","volume":"74","author":"M Bouaziz","year":"2016","unstructured":"Bouaziz M, Rachedi A. A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology. Comput Commun. 2016;74:3\u201315.","journal-title":"Comput Commun"},{"key":"3193_CR9","doi-asserted-by":"crossref","unstructured":"Asharioun H, Asadollahi H, Wan TC & Gharaei N, 2015,\u201eA survey on analytical modeling and mitigation techniques for the energy hole problem in corona-based wireless sensor network\u201f, Wireless Personal Communications, vol. 81, no. 1, pp. 161\u2013187.","DOI":"10.1007\/s11277-014-2122-3"},{"key":"3193_CR10","doi-asserted-by":"publisher","first-page":"4493","DOI":"10.1007\/s11276-018-1743-y","volume":"25","author":"HAA Al-Kashoash","year":"2019","unstructured":"Al-Kashoash HAA, Kharrufa H, Al-Nidawi Y, Kemp AH. Congestion control in wireless sensor and 6LoWPAN networks: Toward the Internet of Things. Wirel Networks. 2019;25:4493\u2013522.","journal-title":"Wirel Networks"},{"key":"3193_CR11","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.tust.2017.08.018","volume":"71","author":"MA Moridi","year":"2018","unstructured":"Moridi MA, Kawamura Y, Sharifzadeh M, Chanda EK, Wagner M, Okawa H. Performance analysis of ZigBee network topologies for underground space monitoring and communication systems. Tunn Undergr Sp Technol. 2018;71:201\u20139.","journal-title":"Tunn Undergr Sp Technol"},{"key":"3193_CR12","doi-asserted-by":"publisher","first-page":"216","DOI":"10.3390\/fi11100216","volume":"11","author":"MA Ert\u00fcrk","year":"2019","unstructured":"Ert\u00fcrk MA, Ayd\u0131n MA, B\u00fcy\u00fckakka\u015flar MT, Evirgen H. A Survey on LoRaWAN Architecture. Protocol and Technologies Futur Internet. 2019;11:216.","journal-title":"Protocol and Technologies Futur Internet"},{"key":"3193_CR13","doi-asserted-by":"crossref","unstructured":"Liu X 2015,\u201eA typical hierarchical routing protocols for wireless sensor networks: A review, IEEE Sensors Journal, vol. 15, no. 10, pp. 5372\u20135383.","DOI":"10.1109\/JSEN.2015.2445796"},{"key":"3193_CR14","doi-asserted-by":"crossref","unstructured":"Darabkh, K.A.; El-Yabroudi, M.Z.; El-Mousa, A.H. BPA-CRP: A Balanced Power-Aware Clustering and Routing Protocol for Wireless Sensor Networks; Elsevier: Amsterdam, The Netherlands, 2019; Volume 82, ISBN 9626530081.","DOI":"10.1016\/j.adhoc.2018.08.012"},{"key":"3193_CR15","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.cosrev.2017.12.002","volume":"27","author":"DK Sah","year":"2018","unstructured":"Sah DK, Amgoth T. Parametric survey on cross-layer designs for wireless sensor networks. Comput Sci Rev. 2018;27:112\u201334.","journal-title":"Comput Sci Rev"},{"key":"3193_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102448","volume":"115","author":"OA Khashan","year":"2021","unstructured":"Khashan OA, Ahmad R, Khafajah NM. An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Netw. 2021;115: 102448.","journal-title":"Ad Hoc Netw"},{"key":"3193_CR17","doi-asserted-by":"crossref","unstructured":"Mehmood Z, Lv J, Lloret \u03b5\u03b5 & Umar, 2017, \u201eE\u03b4DC: An artificial neural network based energy-efficient and robust routing scheme for pollution monitoring in WSNs\u201f, IEEE Trans. Emerg. Top Comput., no. 99 pp. 1\u20138.","DOI":"10.1109\/TETC.2017.2671847"},{"key":"3193_CR18","doi-asserted-by":"publisher","unstructured":"Parmod Kumar, Anupam Baliyan, K. Ramalingeswara Prasad, N. Sreekanth, Parag Jawarkar, Vandana Roy, Enoch Tetteh Amoatey, \"Machine Learning Enabled Techniques for Protecting Wireless Sensor Networks by Estimating Attack Prevalence and Device Deployment Strategy for 5G Networks\", Wireless Communications and Mobile Computing, vol. 2022, Article ID 5713092, 15 pages, 2022. https:\/\/doi.org\/10.1155\/2022\/5713092","DOI":"10.1155\/2022\/5713092"},{"key":"3193_CR19","unstructured":"V. Roy et al., \u201cNetwork Physical Address Based Encryption Technique Using Digital Logic\u201d, International Journal of Scientific & Technology Research, Vol. 9, No. 4, 2020, Pp no.- 3119\u20133122."},{"key":"3193_CR20","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.future.2021.11.011","volume":"129","author":"M Rana","year":"2022","unstructured":"Rana M, Mamun Q, Islam R. Lightweight cryptography in IoT networks: A survey. Futur Gener Comput Syst. 2022;129:77\u201389.","journal-title":"Futur Gener Comput Syst"},{"key":"3193_CR21","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.3390\/electronics10091012","volume":"10","author":"H Sharma","year":"2021","unstructured":"Sharma H, Haque A, Blaabjerg F. Machine learning in wireless sensor networks for smart cities: A survey. Electronics. 2021;10:1012.","journal-title":"Electronics"},{"issue":"2","key":"3193_CR22","doi-asserted-by":"publisher","first-page":"8","DOI":"10.54216\/JCIM.120201","volume":"12","author":"V Roy","year":"2023","unstructured":"Roy V. An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things. Journal of Cybersecurity and Information Management. 2023;12(2):8\u201317.","journal-title":"Journal of Cybersecurity and Information Management"},{"key":"3193_CR23","doi-asserted-by":"publisher","unstructured":"Parmod Kumar, Anupam Baliyan, K. Ramalingeswara Prasad, N. Sreekanth, Parag Jawarkar, Vandana Roy, Enoch Tetteh Amoatey, \"Machine Learning Enabled Techniques for Protecting Wireless Sensor Networks by Estimating Attack Prevalence and Device Deployment Strategy for 5G Networks\", Wireless Communications and Mobile Computing, vol. 2022, Article ID 5713092, 15 pages, 2022. https:\/\/doi.org\/10.1155\/2022\/5713092.","DOI":"10.1155\/2022\/5713092"},{"key":"3193_CR24","doi-asserted-by":"crossref","unstructured":"Arfat Ahmad Khan, Khalid K. Almuzaini, V\u00edctor Daniel Jim\u00e9nez Macedo, Stephen Ojo, Vinodh Kumar Minchula, Vandana Roy, MaReSPS for energy efficient spectral precoding technique in large scale MIMO-OFDM, Physical Communication, Volume 58, 2023, 102057, ISSN 1874\u20134907,","DOI":"10.1016\/j.phycom.2023.102057"},{"key":"3193_CR25","doi-asserted-by":"publisher","first-page":"1399","DOI":"10.1007\/s13042-018-0834-5","volume":"9","author":"L Cui","year":"2018","unstructured":"Cui L, Yang S, Chen F, Ming Z, Lu N, Qin J. A survey on the application of machine learning for Internet of Things. Int J Mach Learn Cybern. 2018;9:1399\u2013417.","journal-title":"Int J Mach Learn Cybern"},{"key":"3193_CR26","doi-asserted-by":"publisher","unstructured":"Arfat Ahmad Khan, Khalid K. Almuzaini, V\u00edctor Daniel Jim\u00e9nez Macedo, Stephen Ojo, Vinodh Kumar Minchula, Vandana Roy, MaReSPS for energy efficient spectral precoding technique in large scale MIMO-OFDM, Physical Communication, Volume 58, 2023, 102057, ISSN 1874\u20134907, https:\/\/doi.org\/10.1016\/j.phycom.2023.102057.","DOI":"10.1016\/j.phycom.2023.102057"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03193-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-03193-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03193-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T08:38:07Z","timestamp":1725266287000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-03193-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":26,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2024,10]]}},"alternative-id":["3193"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-03193-6","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,2]]},"assertion":[{"value":"24 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"848"}}