{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:38:14Z","timestamp":1774453094289,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,2,15]],"date-time":"2025-02-15T00:00:00Z","timestamp":1739577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,15]],"date-time":"2025-02-15T00:00:00Z","timestamp":1739577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-03717-8","type":"journal-article","created":{"date-parts":[[2025,2,15]],"date-time":"2025-02-15T04:41:51Z","timestamp":1739594511000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Machine Learning-Based Autonomous Optimization of Unattended Wireless Sensor Networks Through Multi-Cause Reinforcement Learning"],"prefix":"10.1007","volume":"6","author":[{"given":"Jitendra Kumar","family":"Chaudhary","sequence":"first","affiliation":[]},{"given":"Deepak","family":"Dudeja","sequence":"additional","affiliation":[]},{"given":"Neeraj Kumar","family":"Verma","sequence":"additional","affiliation":[]},{"given":"Arun Kumar","family":"Saini","sequence":"additional","affiliation":[]},{"given":"Dhiraj","family":"Kapila","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5243-4965","authenticated-orcid":false,"given":"Smaranika","family":"Mohapatra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,15]]},"reference":[{"issue":"4","key":"3717_CR1","doi-asserted-by":"publisher","first-page":"5061","DOI":"10.1007\/s11277-016-3729-3","volume":"96","author":"A Pravin Renold","year":"2017","unstructured":"Pravin Renold A, Chandrakala S. MRL-SCSO: multi-agent reinforcement learning-based self-configuration and self-optimization protocol for unattended wireless sensor networks. Wirel Pers Commun. 2017;96(4):5061\u201379.","journal-title":"Wirel Pers Commun"},{"key":"3717_CR2","doi-asserted-by":"publisher","first-page":"105400","DOI":"10.1016\/j.cor.2021.105400","volume":"134","author":"N Mazyavkina","year":"2021","unstructured":"Mazyavkina N, Sviridov S, Ivanov S, Burnaev E. Reinforcement learning for combinatorial optimization: a survey. Comput Oper Res. 2021;134:105400. https:\/\/doi.org\/10.1016\/j.cor.2021.105400.","journal-title":"Comput Oper Res"},{"key":"3717_CR3","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-030-41188-6_13.","volume-title":"Reinforcement learning algorithms: analysis and applications (reinforcement learning algorithms: analysis and applications)","author":"J Czech","year":"2021","unstructured":"Czech J. Distributed methods for reinforcement learning survey. In: Reinforcement learning algorithms: analysis and applications (reinforcement learning algorithms: analysis and applications). Berlin, Germany: Springer; 2021. p. 151\u201361. https:\/\/doi.org\/10.1007\/978-3-030-41188-6_13."},{"key":"3717_CR4","doi-asserted-by":"crossref","unstructured":"Aziz AA, \u015eekercio\u011flu YA (2012) A distributed topology control method for improving energy efficiency of wireless sensor networks. Proceedings of the fourth IEEE international conference on intelligent and advanced systems, pp. 247\u2013252.","DOI":"10.1109\/ICIAS.2012.6306196"},{"issue":"5","key":"3717_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3453160","volume":"54","author":"S Pateria","year":"2021","unstructured":"Pateria S, Subagdja B, Tan A-H, Quek C. Hierarchical reinforcement learning: a comprehensive survey. ACM Comput Surv. 2021;54(5):1\u201335. https:\/\/doi.org\/10.1145\/3453160.","journal-title":"ACM Comput Surv"},{"key":"3717_CR6","doi-asserted-by":"publisher","first-page":"110618","DOI":"10.1016\/j.rser.2020.110618","volume":"137","author":"ATD Perera","year":"2021","unstructured":"Perera ATD, Kamalaruban P. Applications of reinforcement learning in energy systems. Renew Sustain Energy Rev. 2021;137:110618. https:\/\/doi.org\/10.1016\/j.rser.2020.110618.","journal-title":"Renew Sustain Energy Rev"},{"key":"3717_CR7","unstructured":"Ahmed M, Salleh M, and Channa MI, Routing protocols based on node mobility for underwater wireless sensor network (UWSN): a survey"},{"key":"3717_CR8","doi-asserted-by":"publisher","first-page":"102057","DOI":"10.1016\/j.phycom.2023.102057","volume":"58","author":"AA Khan","year":"2023","unstructured":"Khan AA, Almuzaini KK, Macedo VDJ, Ojo S, Minchula VK, Roy V. MaReSPS for energy efficient spectral precoding technique in large scale MIMO-OFDM. Phys Commun. 2023;58:102057. https:\/\/doi.org\/10.1016\/j.phycom.2023.102057. (ISSN 1874-4907).","journal-title":"Phys Commun"},{"key":"3717_CR9","doi-asserted-by":"publisher","unstructured":"Dhiviya S, Sariga A, Sujatha P (2017) Survey on WSN using clustering. In Proc. 2nd Int. Conf. Recent Trends Challenges Comput. Models (ICRTCCM), Tindivanam, India, pp. 121\u2013125, https:\/\/doi.org\/10.1109\/ICRTCCM.2017.87.","DOI":"10.1109\/ICRTCCM.2017.87"},{"issue":"1","key":"3717_CR10","doi-asserted-by":"publisher","first-page":"14","DOI":"10.3390\/asi3010014","volume":"3","author":"D Kandris","year":"2020","unstructured":"Kandris D, Nakas C, Vomvas D, Koulouras G. Applications of wireless sensor networks: an up-to-date survey\u2019. Appl Syst Innov. 2020;3(1):14. https:\/\/doi.org\/10.3390\/asi3010014.","journal-title":"Appl Syst Innov"},{"issue":"3","key":"3717_CR11","doi-asserted-by":"publisher","first-page":"72","DOI":"10.3390\/a13030072","volume":"13","author":"C Nakas","year":"2020","unstructured":"Nakas C, Kandris D, Visvardis G. Energy efficient routing in wireless sensor networks: a comprehensive survey. Algorithms. 2020;13(3):72. https:\/\/doi.org\/10.3390\/a13030072.","journal-title":"Algorithms"},{"key":"3717_CR12","doi-asserted-by":"publisher","unstructured":"Vishnupriya G, Ramachandran R (2020) A survey on tree-based energy-efficient wireless sensor network. In Proc. Int. Conf. Commun. Signal Process. (ICCSP), Chennai, India, pp. 242\u2013245, https:\/\/doi.org\/10.1109\/ICCSP48568.2020.9182161.","DOI":"10.1109\/ICCSP48568.2020.9182161"},{"key":"3717_CR13","doi-asserted-by":"publisher","unstructured":"Mishra PK, Verma SK (2020) A survey on clustering in wireless sensor network. In Proc. 11th Int. Conf. Comput., Commun. Netw. Technol. (ICCCNT), Kharagpur, India, pp. 1\u20135, https:\/\/doi.org\/10.1109\/ICCCNT49239.2020.9225420.","DOI":"10.1109\/ICCCNT49239.2020.9225420"},{"issue":"2","key":"3717_CR14","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1007\/s11277-020-07100-z","volume":"112","author":"KP Mhatre","year":"2020","unstructured":"Mhatre KP, Khot UP. \u2018Energy-efficient opportunistic routing with sleep scheduling in wireless sensor networks.\u2019 Wirel Pers Commun. 2020;112(2):1243\u201363. https:\/\/doi.org\/10.1007\/s11277-020-07100-z.","journal-title":"Wirel Pers Commun"},{"issue":"1","key":"3717_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14569\/IJACSA.2020.0110184","volume":"11","author":"AA Sheikh","year":"2020","unstructured":"Sheikh AA, Felemban E. Optimal topology generation for linear wireless sensor networks based on genetic algorithm. Int J Adv Comput Sci Appl. 2020;11(1):1\u201310. https:\/\/doi.org\/10.14569\/IJACSA.2020.0110184.","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"3","key":"3717_CR16","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1007\/s11036-020-01523-5","volume":"25","author":"M Shafiq","year":"2020","unstructured":"Shafiq M, Ashraf H, Ullah A, Tahira S. Systematic literature review on energy efficient routing schemes in WSN\u2014a survey. Mob Netw Appl. 2020;25(3):882\u201395. https:\/\/doi.org\/10.1007\/s11036-020-01523-5.","journal-title":"Mob Netw Appl"},{"key":"3717_CR17","doi-asserted-by":"publisher","first-page":"5713092","DOI":"10.1155\/2022\/5713092","volume":"2022","author":"P Kumar","year":"2022","unstructured":"Kumar P, Anupam Baliyan K, Ramalingeswara Prasad N, Sreekanth PJ, Roy V, Amoatey ET. Machine learning enabled techniques for protecting wireless sensor networks by estimating attack prevalence and device deployment strategy for 5G networks. Wirel Commun Mob Comput. 2022;2022:5713092. https:\/\/doi.org\/10.1155\/2022\/5713092.","journal-title":"Wirel Commun Mob Comput"},{"key":"3717_CR18","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.arcontrol.2020.03.001","volume":"49","author":"T Yang","year":"2020","unstructured":"Yang T, Zhao L, Li W, Zomaya AY. \u2018Reinforcement learning in sustainable energy and electric systems: a survey.\u2019 Annu Rev Control. 2020;49:145\u201363. https:\/\/doi.org\/10.1016\/j.arcontrol.2020.03.001.","journal-title":"Annu Rev Control"},{"key":"3717_CR19","unstructured":"Ravichandran S (2018) Hands-on reinforcement learning with Python, vol. 3. Birmingham, U.K.: Packt, 2018, ch. 3, sec. 1 , pp. 41\u201356."},{"issue":"4","key":"3717_CR20","first-page":"3119","volume":"9","author":"V Roy","year":"2020","unstructured":"Roy V, et al. Network physical address based encryption technique using digital logic. Int J Sci Technol Res. 2020;9(4):3119\u201322.","journal-title":"Int J Sci Technol Res"},{"key":"3717_CR21","doi-asserted-by":"publisher","unstructured":"Althamary I, Huang C-W, Lin P (2019) A survey on multi-agent reinforcement learning methods for vehicular networks. In Proc. 15th Int. Wireless Commun. Mobile Comput. Conf. (IWCMC), Tangier, Morocco, pp. 1154\u20131159, https:\/\/doi.org\/10.1109\/IWCMC.2019.8766739","DOI":"10.1109\/IWCMC.2019.8766739"},{"issue":"4","key":"3717_CR22","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"WB Heinzelman","year":"2002","unstructured":"Heinzelman WB, Chandrakasan AP, Balakrishnan H. \u201eAn application-specific protocol architecture for wireless microsensor networks\u201f. IEEE Trans Wirel Commun. 2002;1(4):660\u201370.","journal-title":"IEEE Trans Wirel Commun"},{"key":"3717_CR23","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-981-15-2125-6","volume-title":"Nature inspired computing for wireless sensor networks (nature inspired computing for wireless sensor networks)","author":"N Sabor","year":"2020","unstructured":"Sabor N, Abo-Zahhad M. A comprehensive survey of intelligent-based hierarchical routing protocols for wireless sensor networks. In: Nature inspired computing for wireless sensor networks (nature inspired computing for wireless sensor networks). Kolkata, India: Springer; 2020. p. 197\u2013257. https:\/\/doi.org\/10.1007\/978-981-15-2125-6."},{"issue":"2","key":"3717_CR24","doi-asserted-by":"publisher","first-page":"8","DOI":"10.54216\/JCIM.120201","volume":"12","author":"V Roy","year":"2023","unstructured":"Roy V. An effective FOG computing based distributed forecasting of cyber-attacks in internet of things. J Cybersecurity Inf Manag. 2023;12(2):8\u201317.","journal-title":"J Cybersecurity Inf Manag"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03717-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-03717-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03717-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T05:42:42Z","timestamp":1757137362000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-03717-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,15]]},"references-count":24,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,2]]}},"alternative-id":["3717"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-03717-8","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,15]]},"assertion":[{"value":"2 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This article does not contain any studies with animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"179"}}