{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T14:12:30Z","timestamp":1771251150974,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T00:00:00Z","timestamp":1769126400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T00:00:00Z","timestamp":1771200000000},"content-version":"vor","delay-in-days":24,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Symbiosis International"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00268-5","type":"journal-article","created":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T19:36:03Z","timestamp":1769196963000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhanced detection and mitigation of HELLO flood attacks in IoT networks using modified deep neural networks and optimization algorithms"],"prefix":"10.1007","volume":"6","author":[{"given":"Pawan Kumar","family":"Verma","sequence":"first","affiliation":[]},{"given":"Mohit","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Abhishek","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Ashwini Kumar","family":"Saini","sequence":"additional","affiliation":[]},{"given":"Ajeet Kumar","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Nitin","family":"Rakesh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,23]]},"reference":[{"issue":"5","key":"268_CR1","doi-asserted-by":"publisher","first-page":"8182","DOI":"10.1109\/JIOT.2019.2935189","volume":"6","author":"F Meneghello","year":"2019","unstructured":"Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A. IoT: internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J. 2019;6(5):8182\u2013201.","journal-title":"IEEE Internet Things J"},{"key":"268_CR2","doi-asserted-by":"publisher","first-page":"54478","DOI":"10.1109\/ACCESS.2021.3070555","volume":"9","author":"A Al Sadawi","year":"2021","unstructured":"Al Sadawi A, Hassan MS, Ndiaye M. A survey on the integration of blockchain with IoT to enhance performance and eliminate challenges. IEEE Access. 2021;9:54478\u201397.","journal-title":"IEEE Access"},{"key":"268_CR3","doi-asserted-by":"publisher","first-page":"107335","DOI":"10.1109\/ACCESS.2020.3000476","volume":"8","author":"L Vu","year":"2020","unstructured":"Vu L, Nguyen QU, Nguyen DN, Hoang DT, Dutkiewicz E. Deep transfer learning for IoT attack detection. IEEE Access. 2020;8:107335\u201344.","journal-title":"IEEE Access"},{"issue":"6","key":"268_CR4","doi-asserted-by":"publisher","first-page":"10934","DOI":"10.1109\/JIOT.2019.2932980","volume":"6","author":"MM Rana","year":"2019","unstructured":"Rana MM, Bo R. IoT-based improved human motion estimations method under cyber attacks. IEEE Internet Things J. 2019;6(6):10934\u20135.","journal-title":"IEEE Internet Things J"},{"key":"268_CR5","doi-asserted-by":"publisher","first-page":"88892","DOI":"10.1109\/ACCESS.2020.2993553","volume":"8","author":"K Lounis","year":"2020","unstructured":"Lounis K, Zulkernine M. Attacks and defenses in short-range wireless technologies for IoT. IEEE Access. 2020;8:88892\u2013932.","journal-title":"IEEE Access"},{"issue":"4","key":"268_CR6","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1109\/TDSC.2019.2892370","volume":"17","author":"X Ma","year":"2019","unstructured":"Ma X, An B, Zhao M, Luo X, Xue L, Li Z, Guan X. Randomized security patrolling for link flooding attack detection. IEEE Trans Dependable Secur Comput. 2019;17(4):795\u2013812.","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"23","key":"268_CR7","doi-asserted-by":"publisher","first-page":"9448","DOI":"10.3390\/s22239448","volume":"22","author":"M Kumar","year":"2022","unstructured":"Kumar M, Mukherjee P, Verma S, Kaur M, Singh S, Kobielnik M, et al. BBNSF: blockchain-based novel secure framework using RP2-RSA and ASR-ANN technique for IoT enabled healthcare systems. Sensors. 2022;22(23):9448.","journal-title":"Sensors"},{"issue":"2","key":"268_CR8","doi-asserted-by":"publisher","first-page":"133","DOI":"10.3233\/AIS-210591","volume":"13","author":"T Srinivas","year":"2021","unstructured":"Srinivas T, Manivannan SS. Black hole and selective forwarding attack detection and prevention in IoT in health care sector: hybrid meta-heuristic-based shortest path routing. J Ambient Intell Smart Environ. 2021;13(2):133\u201356.","journal-title":"J Ambient Intell Smart Environ"},{"issue":"1","key":"268_CR9","first-page":"1","volume":"13","author":"M Kumar","year":"2023","unstructured":"Kumar M, Mukherjee P, Verma S, Shafi J, Wozniak M, Ijaz MF. A smart privacy preserving framework for industrial IoT using hybrid meta-heuristic algorithm. Sci Rep. 2023;13(1):1\u201317.","journal-title":"Sci Rep"},{"key":"268_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103792","volume":"140","author":"A Javadpour","year":"2024","unstructured":"Javadpour A, Ja\u2019fari F, Taleb T, Shojafar M, Benza\u00efd C. A comprehensive survey on cyber deception techniques to improve honeypot performance. Computers & Security. 2024;140:103792.","journal-title":"Computers & Security"},{"issue":"2","key":"268_CR11","doi-asserted-by":"publisher","first-page":"334","DOI":"10.3969\/j.issn.1004-4132.2011.02.022","volume":"22","author":"P Yi","year":"2011","unstructured":"Yi P, Zou F, Zou V, Wang Z. Performance analysis of mobile ad hoc networks under flooding attacks. J Syst Eng Electron. 2011;22(2):334\u20139.","journal-title":"J Syst Eng Electron"},{"issue":"12","key":"268_CR12","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1109\/LCOMM.2010.101210.101053","volume":"14","author":"N Kim","year":"2010","unstructured":"Kim N, Lim H, Park H, Kang M. Detection of multicast video flooding attack using the pattern of bandwidth provisioning efficiency. IEEE Commun Lett. 2010;14(12):1170\u20132.","journal-title":"IEEE Commun Lett"},{"issue":"4","key":"268_CR13","doi-asserted-by":"publisher","first-page":"235","DOI":"10.26599\/BDMA.2020.9020011","volume":"3","author":"M Lu","year":"2020","unstructured":"Lu M, Li F. Survey on lie group machine learning. Big Data Min Analytics. 2020;3(4):235\u201358.","journal-title":"Big Data Min Analytics"},{"issue":"9","key":"268_CR14","doi-asserted-by":"publisher","first-page":"2013","DOI":"10.1109\/TIFS.2016.2570740","volume":"11","author":"Y Liu","year":"2016","unstructured":"Liu Y, Dong M, Ota K, Liu A. ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensics Secur. 2016;11(9):2013\u201327.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"268_CR15","doi-asserted-by":"crossref","unstructured":"Kumar M, Mukherjee P, Verma K, Verma S, Rawat DB. Improved deep convolutional neural network based malicious node detection and energy-efficient data transmission in wireless sensor networks. IEEE Transactions on Network Science and Engineering; 2021.","DOI":"10.1109\/TNSE.2021.3098011"},{"issue":"12","key":"268_CR16","doi-asserted-by":"publisher","first-page":"8936","DOI":"10.1109\/TII.2022.3181614","volume":"18","author":"M Kumar","year":"2022","unstructured":"Kumar M, Verma S, Kumar A, Ijaz MF, Rawat DB. ANAF-IoMT: a novel architectural framework for IoMT-enabled smart healthcare system by enhancing security based on RECC-VC. IEEE Trans Industr Inf. 2022;18(12):8936\u201343.","journal-title":"IEEE Trans Industr Inf"},{"key":"268_CR17","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/RBME.2020.2969915","volume":"14","author":"MP Hosseini","year":"2020","unstructured":"Hosseini MP, Hosseini A, Ahi K. A review on machine learning for EEG signal processing in bioengineering. IEEE Rev Biomed Eng. 2020;14:204\u201318.","journal-title":"IEEE Rev Biomed Eng"},{"key":"268_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2025.110265","volume":"123","author":"TA Ahanger","year":"2025","unstructured":"Ahanger TA, Ullah I, Algamdi SA, Tariq U. Machine learning-inspired intrusion detection system for IoT: security issues and future challenges. Comput Electr Eng. 2025;123:110265.","journal-title":"Comput Electr Eng"},{"issue":"9","key":"268_CR19","doi-asserted-by":"publisher","first-page":"8641","DOI":"10.1109\/JIOT.2020.2992811","volume":"7","author":"T Wang","year":"2020","unstructured":"Wang T, Wang X, Ma R, Li X, Hu X, Chan FT, Ruan J. Random forest-bayesian optimization for product quality prediction with large-scale dimensions in process industrial cyber\u2013physical systems. IEEE Internet Things J. 2020;7(9):8641\u201353.","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"268_CR20","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1109\/TETCI.2019.2961157","volume":"4","author":"G Apruzzese","year":"2020","unstructured":"Apruzzese G, Andreolini M, Colajanni M, Marchetti M. Hardening random forest cyber detectors against adversarial attacks. IEEE Trans Emerg Top Comput Intell. 2020;4(4):427\u201339.","journal-title":"IEEE Trans Emerg Top Comput Intell"},{"issue":"2","key":"268_CR21","doi-asserted-by":"publisher","first-page":"78","DOI":"10.12720\/jcm.19.2.78-89","volume":"19","author":"M Raeisi-Varzaneh","year":"2024","unstructured":"Raeisi-Varzaneh M, Dakkak O, Alaidaros H, Avci \u0130. Internet of things: security, issues, threats, and assessment of different cryptographic technologies. J Commun. 2024;19(2):78.","journal-title":"J Commun"},{"issue":"6","key":"268_CR22","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7959","volume":"36","author":"S Doostani","year":"2024","unstructured":"Doostani S, Barati H, Barati A. A lightweight hierarchical method for improving security in the internet of things using fuzzy logic. Concurrency Comput Pract Exp. 2024;36(6):e7959.","journal-title":"Concurrency Comput Pract Exp"},{"issue":"22","key":"268_CR23","doi-asserted-by":"publisher","first-page":"4022","DOI":"10.1049\/iet-com.2020.0473","volume":"14","author":"E Bozorgzadeh","year":"2020","unstructured":"Bozorgzadeh E, Barati H, Barati A. 3DEOR: an opportunity routing protocol using evidence theory appropriate for 3D urban environments in VANETs. IET Commun. 2020;14(22):4022\u20138.","journal-title":"IET Commun"},{"key":"268_CR24","doi-asserted-by":"crossref","unstructured":"Barati A, Dehghan M, Barati H, Mazreah AA. Key management mechanisms in wireless sensor networks. In: 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008) (pp. 81\u201386). IEEE.","DOI":"10.1109\/SENSORCOMM.2008.85"},{"key":"268_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109997","volume":"236","author":"SA Khah","year":"2023","unstructured":"Khah SA, Barati A, Barati H. A dynamic and multi-level key management method in wireless sensor networks (WSNs). Comput Netw. 2023;236:109997.","journal-title":"Comput Netw"},{"issue":"12","key":"268_CR26","doi-asserted-by":"publisher","first-page":"11137","DOI":"10.1007\/s11042-024-19379-2","volume":"84","author":"L Khajehzadeh","year":"2025","unstructured":"Khajehzadeh L, Barati H, Barati A. A lightweight authentication and authorization method in IoT-based medical care. Multimedia Tools Appl. 2025;84(12):11137\u201376.","journal-title":"Multimedia Tools Appl"},{"issue":"9","key":"268_CR27","doi-asserted-by":"publisher","first-page":"13239","DOI":"10.1007\/s10586-024-04565-6","volume":"27","author":"GR Zargar","year":"2024","unstructured":"Zargar GR, Barati H, Barati A. An authentication mechanism based on blockchain for IoT environment. Cluster Comput. 2024;27(9):13239\u201355.","journal-title":"Cluster Comput"},{"issue":"19","key":"268_CR28","doi-asserted-by":"publisher","first-page":"4142","DOI":"10.3390\/electronics12194142","volume":"12","author":"\u0130 Avc\u0131","year":"2023","unstructured":"Avc\u0131 \u0130, Koca M. Predicting DDoS attacks using machine learning algorithms in building management systems. Electronics. 2023;12(19):4142.","journal-title":"Electronics"},{"key":"268_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3466391","author":"M Koca","year":"2024","unstructured":"Koca M, Avci I. A novel hybrid model detection of security vulnerabilities in industrial control systems and IoT using GCN\u2009+\u2009LSTM. IEEE Access. 2024. https:\/\/doi.org\/10.1109\/ACCESS.2024.3466391.","journal-title":"IEEE Access"},{"key":"268_CR30","doi-asserted-by":"publisher","first-page":"75729","DOI":"10.1109\/ACCESS.2021.3082147","volume":"9","author":"C Liu","year":"2021","unstructured":"Liu C, Gu Z, Wang J. A hybrid intrusion detection system based on scalable K-means\u2009+\u2009random forest and deep learning. IEEE Access. 2021;9:75729\u201340.","journal-title":"IEEE Access"},{"key":"268_CR31","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.comcom.2020.03.031","volume":"163","author":"TAS Srinivas","year":"2020","unstructured":"Srinivas TAS, Manivannan SS. Prevention of hello flood attack in IoT using combination of deep learning with improved rider optimization algorithm. Comput Commun. 2020;163:162\u201375.","journal-title":"Comput Commun"},{"key":"268_CR32","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1016\/j.procs.2016.03.086","volume":"79","author":"M Mahajan","year":"2016","unstructured":"Mahajan M, Reddy KTV, Rajput M. Design and simulation of a blacklisting technique for detection of hello flood attack on LEACH protocol. Procedia Comput Sci. 2016;79:675\u201382.","journal-title":"Procedia Comput Sci"},{"issue":"5","key":"268_CR33","doi-asserted-by":"publisher","first-page":"1116","DOI":"10.1109\/TMC.2015.2456895","volume":"15","author":"TND Pham","year":"2015","unstructured":"Pham TND, Yeo CK. Detecting colluding blackhole and greyhole attacks in delay tolerant networks. IEEE Trans Mob Comput. 2015;15(5):1116\u201329.","journal-title":"IEEE Trans Mob Comput"},{"key":"268_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108413","volume":"198","author":"K Prathapchandran","year":"2021","unstructured":"Prathapchandran K, Janani T. A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest\u2013RFTRUST. Comput Netw. 2021;198:108413.","journal-title":"Comput Netw"},{"key":"268_CR35","first-page":"6036","volume":"5","author":"A Sahi","year":"2017","unstructured":"Sahi A, Lai D, Li Y, Diykh M. An efficient DDoS TCP flood attack detection and prevention system in a cloud environment. IEEE Access. 2017;5:6036\u201348.","journal-title":"IEEE Access"},{"key":"268_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103814","volume":"82","author":"P Bedi","year":"2021","unstructured":"Bedi P, Mewada S, Vatti RA, Singh C, Dhindsa KS, Ponnusamy M, et al. Detection of attacks in IoT sensors networks using machine learning algorithm. Microprocess Microsyst. 2021;82:103814.","journal-title":"Microprocess Microsyst"},{"issue":"1","key":"268_CR37","first-page":"59","volume":"15","author":"I Sreeram","year":"2019","unstructured":"Sreeram I, Vuppala VPK. HTTP flood attack detection in application layer using machine learning metrics and bio inspired Bat algorithm. Appl Comput Inf. 2019;15(1):59\u201366.","journal-title":"Appl Comput Inf"},{"key":"268_CR38","doi-asserted-by":"publisher","DOI":"10.6633\/IJNS.20180720(4).06","author":"Y Hamid","year":"2018","unstructured":"Hamid Y, Balasaraswathi R, Journaux L, Sugumaran M. Benchmark datasets for network intrusion detection: a review. Int J Netw Secur. 2018. https:\/\/doi.org\/10.6633\/IJNS.20180720(4).06.","journal-title":"Int J Netw Secur"},{"key":"268_CR39","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-981-15-2449-3_18","volume-title":"Computational Intelligence in Pattern Recognition","author":"RM Sahoo","year":"2020","unstructured":"Sahoo RM, Padhy SK. Elephant herding optimization for multiprocessor task scheduling in heterogeneous environment. In: Computational Intelligence in Pattern Recognition. Singapore: Springer; 2020. p. 217\u201329."},{"key":"268_CR40","doi-asserted-by":"publisher","first-page":"1106","DOI":"10.1016\/j.egyr.2020.04.032","volume":"6","author":"Z Yuan","year":"2020","unstructured":"Yuan Z, Wang W, Wang H, Yildizbasi A. Developed Coyote optimization algorithm and its application to optimal parameters estimation of PEMFC model. Energy Rep. 2020;6:1106\u201317.","journal-title":"Energy Rep"},{"issue":"6","key":"268_CR41","doi-asserted-by":"publisher","first-page":"2013","DOI":"10.1016\/j.compeleceng.2014.05.012","volume":"40","author":"S Jamali","year":"2014","unstructured":"Jamali S, Shaker V. Defense against SYN flooding attacks: a particle swarm optimization approach. Comput Electr Eng. 2014;40(6):2013\u201325.","journal-title":"Comput Electr Eng"},{"issue":"6","key":"268_CR42","first-page":"3639","volume":"15","author":"MM Jawhar","year":"2020","unstructured":"Jawhar MM, Alellah MA. The detect Dos attack from network traffic using Gray Wolf optimization algorithm. J Eng Sci Technol. 2020;15(6):3639\u201348.","journal-title":"J Eng Sci Technol"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00268-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00268-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00268-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T13:25:07Z","timestamp":1771248307000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00268-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,23]]},"references-count":42,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["268"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00268-5","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,23]]},"assertion":[{"value":"2 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"18"}}