{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T21:25:03Z","timestamp":1768425903858,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,2,15]],"date-time":"2025-02-15T00:00:00Z","timestamp":1739577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,15]],"date-time":"2025-02-15T00:00:00Z","timestamp":1739577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-03697-9","type":"journal-article","created":{"date-parts":[[2025,2,15]],"date-time":"2025-02-15T09:16:47Z","timestamp":1739611007000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Maximizing Performance in Wireless Mobile Ad-Hoc Networks Through Unconventional Routing Strategies"],"prefix":"10.1007","volume":"6","author":[{"given":"Satyanand","family":"Singh","sequence":"first","affiliation":[]},{"given":"R.","family":"Sreelakshmy","sequence":"additional","affiliation":[]},{"given":"L.","family":"Bhagyalakshmi","sequence":"additional","affiliation":[]},{"given":"Himanshu","family":"Shekhar","sequence":"additional","affiliation":[]},{"given":"Annamaraju","family":"Thanuja","sequence":"additional","affiliation":[]},{"given":"Sanjay Kumar","family":"Suman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,15]]},"reference":[{"key":"3697_CR1","doi-asserted-by":"crossref","unstructured":"Jabbar WA, Ismail M, Nordin R, Ramli RM. EMA-MPR: energy and mobility-aware multi-point relay selection mechanism for multipath OLSRv2, in 2017 IEEE 13th Malaysia International Conference on Communications (MICC), pp. 1\u20136, Johor Bahru, Malaysia, November 2017.","DOI":"10.1109\/MICC.2017.8311721"},{"key":"3697_CR2","doi-asserted-by":"publisher","first-page":"76546","DOI":"10.1109\/ACCESS.2018.2882853","volume":"6","author":"WA Jabbar","year":"2018","unstructured":"Jabbar WA, Saad WK, Ismail M. MEQSA-OLSRv2: a multicriteria-based hybrid multipath protocol for energy-efficient and QoS-aware data routing in MANET-WSN convergence scenarios of IoT. IEEE Access. 2018;6:76546\u201372.","journal-title":"IEEE Access"},{"key":"3697_CR3","doi-asserted-by":"crossref","unstructured":"Jabbar WA. Mobility-based performance comparison of MBQA-OLSRv2 and MBMA-OLSRv2 routing protocols, in 2019 23rd International Computer Science and Engineering Conference (ICSEC), pp. 281\u2013286, Phuket, Thailand, October-November 2019.","DOI":"10.1109\/ICSEC47112.2019.8974771"},{"key":"3697_CR4","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.procs.2016.08.011","volume":"94","author":"A Swidan","year":"2016","unstructured":"Swidan A, Abdelghany HB, Saifan R. Mobility and direction aware ad-hoc on demand distance vector routing protocol. Procedia Comput Sci. 2016;94:49\u201356.","journal-title":"Procedia Comput Sci"},{"key":"3697_CR5","unstructured":"Vu TK, Kwon S. On-demand routing algorithm with mobility prediction in the mobile ad-hoc networks. Tech Rep Sch Electr Eng Univ Ulsan. 2016;1\u201310."},{"issue":"14","key":"3697_CR6","first-page":"1","volume":"24","author":"TD Nguyen","year":"2018","unstructured":"Nguyen TD, Khan JY, Ngo DT. A distributed energy-harvesting-aware routing algorithm for heterogeneous IoT networks. IEEE Trans Green Commun Netw. 2018;24(14):1\u201310.","journal-title":"IEEE Trans Green Commun Netw"},{"key":"3697_CR7","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-030-33103-0_28","volume-title":"Advanced Intelligent systems for Sustainable Development (AI2SD\u20192019). AI2SD 2019","author":"M Khan","year":"2019","unstructured":"Khan M, Majeed MF, Majeed MF, Lloret J. The impact of mobility speed over varying radio propagation models using routing protocol in MANET. In: Ezziyyani M, editor. in Advanced Intelligent systems for Sustainable Development (AI2SD\u20192019). AI2SD 2019. Lecture Notes in Networks and Systems. Volume 92. Cham: Springer; 2019. pp. 277\u201388."},{"issue":"6","key":"3697_CR8","first-page":"3885","volume":"11","author":"D Bhatia","year":"2016","unstructured":"Bhatia D, Sharma DP. A comparative analysis of proactive, reactive and hybrid routing protocols over open source network simulator in mobile ad hoc network. Int J Appl Eng Res. 2016;11(6):3885\u201396.","journal-title":"Int J Appl Eng Res"},{"issue":"7","key":"3697_CR9","first-page":"189","volume":"4","author":"A Adlakha","year":"2015","unstructured":"Adlakha A, Arora V. Performance evaluation of AODV and DSR routing protocols under constrained situation. Int J Adv Res Comput Communication Eng. 2015;4(7):189\u201391.","journal-title":"Int J Adv Res Comput Communication Eng"},{"key":"3697_CR10","doi-asserted-by":"crossref","unstructured":"Rashid U, Waqar O, Kiani AK. Mobility and energy aware routing algorithm for mobile ad-hoc networks, in 2017 International Conference on Electrical Engineering (ICEE), pp. 1\u20135, Lahore, Pakistan, March 2017.","DOI":"10.1109\/ICEE.2017.7893434"},{"key":"3697_CR11","doi-asserted-by":"publisher","DOI":"10.53730\/ijhs.v6nS3.9117","author":"K Hemapriya","year":"2022","unstructured":"Hemapriya K, Kalaiselvi C. SDA-seech: secure data aggregation using seech algorithm in wireless sensor networks. Int J Health Sci. 2022; https:\/\/doi.org\/10.53730\/ijhs.v6nS3.9117.","journal-title":"Int J health Sci"},{"issue":"1","key":"3697_CR12","first-page":"10","volume":"8","author":"MB Dsouza","year":"2020","unstructured":"Dsouza MB. Congestion aware reverse AODV routing protocol for MANET. Int J Sci Res Netw Secur Commun Feb. 2020;8(1):10\u20133.","journal-title":"Int J Sci Res Netw Secur Commun Feb"},{"key":"3697_CR13","doi-asserted-by":"publisher","unstructured":"Dsouza MB. and M. D.H., Energy Aware Simple Ant Routing Algorithm for MANET, 2020 5th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, IEEE Xplore 2020, pp. 381\u2013385. https:\/\/doi.org\/10.1109\/ICCES48766.2020.9137947","DOI":"10.1109\/ICCES48766.2020.9137947"},{"issue":"2","key":"3697_CR14","doi-asserted-by":"publisher","first-page":"827","DOI":"10.11591\/eei.v9i2.2075","volume":"9","author":"SAA Mustapha","year":"2020","unstructured":"Mustapha SAA, Shamala P, Khalaf OIBA. Social networking mobile apps framework for organizing and facilitating charitable and voluntary activities in Malaysia. Bull Electr Eng Inf. 2020;9(2):827\u201333. https:\/\/doi.org\/10.11591\/eei.v9i2.2075.","journal-title":"Bull Electr Eng Inf"},{"key":"3697_CR15","doi-asserted-by":"publisher","unstructured":"Mostafa SA, Tang AY, Hassan MH, Jubair MA, Khaleefah SH. S. H. A multi-agent ad hoc on-demand distance vector for improving the quality of service in MANETs International Symposium on Agent, Multi-Agent Systems and Robotics (ISAMSR) (pp. 1\u20137), 2018. IEEE. https:\/\/doi.org\/10.1109\/ISAMSR.2018.8540554","DOI":"10.1109\/ISAMSR.2018.8540554"},{"key":"3697_CR16","doi-asserted-by":"crossref","unstructured":"Bhupathi HP, Bobba BP, Niharika U, Akshitha S, Sardina K, Lingam B. Investigation of WBG based Power Converters used in E-Transportation, E3S Web of Conferences, vol. 552, page 01145, 2024.","DOI":"10.1051\/e3sconf\/202455201145"},{"issue":"3","key":"3697_CR17","doi-asserted-by":"publisher","first-page":"299","DOI":"10.5121\/ijwmn.2012.4220","volume":"4","author":"VK Sharma","year":"2012","unstructured":"Sharma VK, Bhad SS. Mobile Agent based congestion control using aodv routing protocol technique for Mobile Ad-Hoc Network. Int J Wirel Mob Networks (IJWMN). 2012;4(3):299\u2013314.","journal-title":"Int J Wirel Mob Networks (IJWMN)"},{"key":"3697_CR18","first-page":"25","volume":"25","author":"T Senthilkumaran","year":"2013","unstructured":"Senthilkumaran T, Sankaranarayan V. Dynamic congestion detection and control routing in ad hoc networks. J King Saud Univ \u2013Computer Inform Sci. 2013;25:25\u201334.","journal-title":"J King Saud Univ \u2013Computer Inform Sci"},{"key":"3697_CR19","doi-asserted-by":"publisher","unstructured":"Kushwaha U, Dixit M, Singh A. AOMDV intelligent decision (AOMDV-ID) to minimize routing delay for diverse VANETs. In: 2022 international conference for advancement in technology (ICONAT). 2022. p. 1\u20136. https:\/\/doi.org\/10.1109\/ICONAT53423.2022.9726097.","DOI":"10.1109\/ICONAT53423.2022.9726097"},{"issue":"6","key":"3697_CR20","first-page":"984","volume":"4","author":"S Singh","year":"2015","unstructured":"Singh S. Modified AODV for congestion control in MANET. Int J Comput Sci Mob Comput. 2015;4(6):984\u20131001.","journal-title":"Int J Comput Sci Mob Comput"},{"key":"3697_CR21","doi-asserted-by":"crossref","unstructured":"Bobba PB, Anwar MH, Bhupathi HP, Shirisha P, Hamza L. Simultaneous wireless power and data transfer in different applications, E3S Web of conferences vol. 552, page 01147, 2024.","DOI":"10.1051\/e3sconf\/202455201147"},{"key":"3697_CR22","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5713092","author":"P Kumar","year":"2022","unstructured":"Kumar P, Baliyan A, Prasad KR, Sreekanth N, Jawarkar P, Roy V, Amoatey ET. Machine learning enabled techniques for protecting wireless sensor networks by estimating attack prevalence and device deployment strategy for 5G networks. Wirel Commun Mob Comput. 2022. https:\/\/doi.org\/10.1155\/2022\/5713092.","journal-title":"Wirel Commun Mob Comput"},{"key":"3697_CR23","doi-asserted-by":"publisher","first-page":"4884","DOI":"10.35444\/IJANA.2021.13202","volume":"13","author":"H El-Sayed, Hamdy","year":"2021","unstructured":"El-Sayed, Hamdy H, Zanaty EA, Bakheet S, Abd-Elgaber M. Performance evaluation of LEACH protocols in wireless sensor networks. Int J Adv Netw Appl. 2021;13:4884\u201390. https:\/\/doi.org\/10.35444\/IJANA.2021.13202.","journal-title":"Int J Adv Netw Appl"},{"key":"3697_CR24","doi-asserted-by":"publisher","first-page":"190","DOI":"10.37917\/ijeee.17.2.21","volume":"17","author":"A Al-Hussain","year":"2021","unstructured":"Al-Hussain A, Al-Suhail G. E-FLEACH: an improved fuzzy based clustering protocol for wireless sensor network. Iraqi J Electr Electron Eng. 2021;17:190\u20137. https:\/\/doi.org\/10.37917\/ijeee.17.2.21.","journal-title":"Iraqi J Electr Electron Eng"},{"issue":"2","key":"3697_CR25","first-page":"1","volume":"6","author":"D Rao","year":"2023","unstructured":"Rao D, Sharma S. Secure and ethical innovations: patenting Ai models for precision medicine, personalized treatment, and drug discovery in healthcare. IJBMV. 2023;6(2):1\u20138.","journal-title":"IJBMV"},{"key":"3697_CR26","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.aeue.2018.07.020","volume":"94","author":"KA Darabkh","year":"2018","unstructured":"Darabkh KA, Judeh MSA, Bany H, Althunibat S. Mobility aware and dual phase AODV protocol with adaptive hello messages over vehicular ad hoc networks. AEU - Int J Electron Commun. 2018;94:277\u201392.","journal-title":"AEU - Int J Electron Commun"},{"key":"3697_CR27","doi-asserted-by":"publisher","first-page":"2731","DOI":"10.1007\/s11277-022-09839-z","volume":"126","author":"A Giri","year":"2022","unstructured":"Giri A, Dutta S, Neogy S. An optimized fuzzy clustering algorithm for wireless sensor networks. Wirel Pers Commun. 2022;126:2731\u201351. https:\/\/doi.org\/10.1007\/s11277-022-09839-z.","journal-title":"Wirel Pers Commun"},{"issue":"2","key":"3697_CR28","first-page":"195","volume":"12","author":"DD Rao","year":"2024","unstructured":"Rao DD, et al. Strategizing IoT network layer security through advanced intrusion detection systems and AI-driven threat analysis. Full Length Article. 2024;12(2):195\u201395.","journal-title":"Full Length Article"},{"issue":"2","key":"3697_CR29","first-page":"223","volume":"13","author":"SK Chebrolu","year":"2024","unstructured":"Chebrolu SK, Manikandan R, Thomas AK, Anusha PV, Bhupathi HP. Optimizing Sensor localization and cluster performance in wireless sensor networks through internet of thing (IoT) and boosted weight centroid algorithm. J Intell Syst Internet Things. 2024;13(2):223\u201330.","journal-title":"J Intell Syst Internet Things"},{"key":"3697_CR30","doi-asserted-by":"publisher","unstructured":"Suman SK, Porselvi S, Bhagyalakshmi L, Kumar D. Game Theoretical Approach for Improving Throughput Capacity in Wireless Ad Hoc Networks,in proceedings of International Conference on Recent Trends in Information Technology (ICRTIT 2014, MIT Chennai), 10\u201312 April 2014. https:\/\/doi.org\/10.1109\/ICRTIT.2014.6996152","DOI":"10.1109\/ICRTIT.2014.6996152"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03697-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-03697-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03697-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,15]],"date-time":"2025-02-15T09:16:55Z","timestamp":1739611015000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-03697-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,15]]},"references-count":30,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,2]]}},"alternative-id":["3697"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-03697-9","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,15]]},"assertion":[{"value":"17 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"177"}}