{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:59:49Z","timestamp":1776095989590,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T00:00:00Z","timestamp":1776038400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T00:00:00Z","timestamp":1776038400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-026-04952-3","type":"journal-article","created":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:15:00Z","timestamp":1776093300000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cluster-Aware Intrusion Detection Framework for Enhancing Cyber Security in VANETs"],"prefix":"10.1007","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9810-8850","authenticated-orcid":false,"given":"Syed Rashid","family":"Anwar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2062-7400","authenticated-orcid":false,"given":"Anamika","family":"Chaudhary","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0528-3076","authenticated-orcid":false,"given":"M.","family":"Sudharsan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6414-5389","authenticated-orcid":false,"given":"Bichitrananda","family":"Patra","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6383-3788","authenticated-orcid":false,"given":"Anitha D Souza","family":"J","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,13]]},"reference":[{"key":"4952_CR1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10141744","author":"R Wazirali","year":"2021","unstructured":"Wazirali R, Ahmad R, Al-Amayreh A, Al-Madi M, Khalifeh A. Secure watermarking schemes and their approaches in the IoT technology: an overview. Electronics Basel. 2021. https:\/\/doi.org\/10.3390\/electronics10141744.","journal-title":"Electronics Basel"},{"key":"4952_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1743-y","author":"HA Al-Kashoash","year":"2019","unstructured":"Al-Kashoash HA, Kharrufa H, Al-Nidawi Y, Kemp AH. Congestion control in wireless sensor and 6LoWPAN networks: toward the Internet of Things. Wirel Netw. 2019. https:\/\/doi.org\/10.1007\/s11276-018-1743-y.","journal-title":"Wirel Netw"},{"key":"4952_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102448","author":"OA Khashan","year":"2021","unstructured":"Khashan OA, Ahmad R, Khafajah NM. An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Netw. 2021. https:\/\/doi.org\/10.1016\/j.adhoc.2021.102448.","journal-title":"Ad Hoc Netw"},{"key":"4952_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEI52609.2021.9611120","author":"R Ahmad","year":"2021","unstructured":"Ahmad R, Sundararajan EA, Abu-Ain T. Analysis of the effect of clustering and lightweight encryption approaches on WSNs lifetime. Proc Int Conf Electr Eng Inform. 2021. https:\/\/doi.org\/10.1109\/ICEEI52609.2021.9611120.","journal-title":"Proc Int Conf Electr Eng Inform"},{"key":"4952_CR5","doi-asserted-by":"publisher","DOI":"10.3390\/s22134730","author":"R Ahmad","year":"2022","unstructured":"Ahmad R, Wazirali R, Abu-Ain T. Machine learning for wireless sensor networks security: an overview of challenges and issues. Sensors Basel. 2022. https:\/\/doi.org\/10.3390\/s22134730.","journal-title":"Sensors Basel"},{"key":"4952_CR6","doi-asserted-by":"publisher","DOI":"10.1002\/9781119488330","author":"I Priyadarshini","year":"2019","unstructured":"Priyadarshini I. Introduction to cybersecurity. Cyber Secur Parall Distrib Comput. 2019. https:\/\/doi.org\/10.1002\/9781119488330.","journal-title":"Cyber Secur Parall Distrib Comput"},{"key":"4952_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07213-5","author":"DE Boubiche","year":"2021","unstructured":"Boubiche DE, Athmani S, Boubiche S, Toral-Cruz H. Cybersecurity issues in wireless sensor networks: current challenges and solutions. Wirel Pers Commun. 2021. https:\/\/doi.org\/10.1007\/s11277-020-07213-5.","journal-title":"Wirel Pers Commun"},{"key":"4952_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2953364","author":"I Butun","year":"2019","unstructured":"Butun I, \u00d6sterberg P, Song H. Security of the Internet of Things: vulnerabilities, attacks, and countermeasures. IEEE Commun Surv Tutor. 2019. https:\/\/doi.org\/10.1109\/COMST.2019.2953364.","journal-title":"IEEE Commun Surv Tutor"},{"key":"4952_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3131367","author":"S Lata","year":"2021","unstructured":"Lata S, Mehfuz S, Urooj S. Secure and reliable WSN for Internet of Things: challenges and enabling technologies. IEEE Access. 2021. https:\/\/doi.org\/10.1109\/ACCESS.2021.3131367.","journal-title":"IEEE Access"},{"key":"4952_CR10","doi-asserted-by":"publisher","unstructured":"Kumar R, Pandey S, KS A, Yadav RK, Mishra A, Sharma S. Cyber security protection in roadside unit based on cross-layer adaptive graph neural networks in VANET. J Cybersecur Inf Manag. 2024. https:\/\/doi.org\/10.54216\/JCIM.140112","DOI":"10.54216\/JCIM.140112"},{"key":"4952_CR11","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-96303-0","author":"C Christy","year":"2025","unstructured":"Christy C, Nirmala A, Teena AMO, Amali AI. Machine learning-based multi-stage intrusion detection system and feature selection ensemble security in cloud-assisted vehicular ad hoc networks. Sci Rep. 2025. https:\/\/doi.org\/10.1038\/s41598-025-96303-0.","journal-title":"Sci Rep"},{"key":"4952_CR12","doi-asserted-by":"publisher","DOI":"10.3390\/s21248355","author":"F Khan","year":"2021","unstructured":"Khan F, Ahmad S, G\u00fcr\u00fcler H, Cetin G, Whangbo T, Kim CG. An efficient and reliable algorithm for a wireless sensor network. Sensors. 2021. https:\/\/doi.org\/10.3390\/s21248355.","journal-title":"Sensors"},{"key":"4952_CR13","doi-asserted-by":"publisher","DOI":"10.3390\/s19010203","author":"X Tan","year":"2019","unstructured":"Tan X, Su S, Huang Z, Guo X, Zuo Z, Sun X, et al. Wireless sensor networks intrusion detection based on SMOTE and the random forest algorithm. Sens Basel. 2019. https:\/\/doi.org\/10.3390\/s19010203.","journal-title":"Sens Basel"},{"key":"4952_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2902357","author":"GS Dhunna","year":"2019","unstructured":"Dhunna GS, Al-Anbagi I. A low-power WSNs attack detection and isolation mechanism for critical smart grid applications. IEEE Sens J. 2019. https:\/\/doi.org\/10.1109\/JSEN.2019.2902357.","journal-title":"IEEE Sens J"},{"key":"4952_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.102022","author":"BD Deebak","year":"2020","unstructured":"Deebak BD, Al-Turjman F. A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Netw. 2020. https:\/\/doi.org\/10.1016\/j.adhoc.2019.102022.","journal-title":"Ad Hoc Netw"},{"key":"4952_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2937347","author":"F Ullah","year":"2019","unstructured":"Ullah F, Naeem H, Jabbar S, Khalid S, Latif MA, Al-Turjman F, et al. Cyber security threats detection in the Internet of Things using a deep learning approach. IEEE Access. 2019. https:\/\/doi.org\/10.1109\/ACCESS.2019.2937347.","journal-title":"IEEE Access"},{"key":"4952_CR17","doi-asserted-by":"publisher","DOI":"10.3390\/en13102509","author":"K Shaukat","year":"2020","unstructured":"Shaukat K, Luo S, Varadharajan V, Hameed IA, Chen S, Liu D, et al. Performance comparison and current challenges of using machine learning techniques in cybersecurity. Energies Basel. 2020. https:\/\/doi.org\/10.3390\/en13102509.","journal-title":"Energies Basel"},{"key":"4952_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2964704","author":"A Kavousi-Fard","year":"2020","unstructured":"Kavousi-Fard A, Su W, Jin T. A machine-learning-based cyber attack detection model for wireless sensor networks in microgrids. IEEE Trans Ind Inform. 2020. https:\/\/doi.org\/10.1109\/TII.2020.2964704.","journal-title":"IEEE Trans Ind Inform"},{"key":"4952_CR19","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2961340","author":"B Cao","year":"2019","unstructured":"Cao B, Zhao J, Gu Y, Fan S, Yang P. Security-aware industrial wireless sensor network deployment optimization. IEEE Trans Ind Inform. 2019. https:\/\/doi.org\/10.1109\/TII.2019.2961340.","journal-title":"IEEE Trans Ind Inform"},{"key":"4952_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2019.01.004","author":"A Alarifi","year":"2019","unstructured":"Alarifi A, Tolba A. Optimizing the network energy of cloud-assisted Internet of Things by using the adaptive neural learning approach in wireless sensor networks. Comput Ind. 2019. https:\/\/doi.org\/10.1016\/j.compind.2019.01.004.","journal-title":"Comput Ind"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04952-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-026-04952-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04952-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:15:01Z","timestamp":1776093301000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-026-04952-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,13]]},"references-count":20,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["4952"],"URL":"https:\/\/doi.org\/10.1007\/s42979-026-04952-3","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,13]]},"assertion":[{"value":"11 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}],"article-number":"363"}}