{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T17:10:13Z","timestamp":1778605813554,"version":"3.51.4"},"reference-count":45,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.compeleceng.2026.111146","type":"journal-article","created":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T08:20:45Z","timestamp":1775895645000},"page":"111146","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Optimized trust-aware routing in clustered ad hoc networks"],"prefix":"10.1016","volume":"135","author":[{"given":"Ujwala Nilesh","family":"Ravale","sequence":"first","affiliation":[]},{"given":"Gautam M.","family":"Borkar","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.compeleceng.2026.111146_bib0001","first-page":"17","article-title":"Cooperative routing for improving the lifetime of wireless ad-hoc networks","volume":"8","author":"Unnikrishnan","year":"2022","journal-title":"Int J Adv Signal Image Sci"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0002","doi-asserted-by":"crossref","DOI":"10.1155\/2021\/2051796","article-title":"Channel contention-based routing protocol for wireless ad hoc networks","volume":"2021","author":"Mast","year":"2021","journal-title":"Complexity"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0003","doi-asserted-by":"crossref","DOI":"10.22214\/ijraset.2022.40439","article-title":"A study of developments in the routing protocols in the wireless ad hoc networks (WANET)","author":"Yaqoob","year":"2022","journal-title":"Int J Res Appl Sci Eng Technol (IJRASET)"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111146_bib0004","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.eij.2022.10.004","article-title":"Classification and comparison of ad hoc networks: a review","volume":"24","author":"Agrawal","year":"2023","journal-title":"Egypt Inform J"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0005","series-title":"Intelligent and cloud computing: proceedings of ICICC 2019","first-page":"237","article-title":"Fuzzification-based routing protocol for wireless ad hoc network","volume":"1","author":"Das","year":"2021"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0006","doi-asserted-by":"crossref","first-page":"72155","DOI":"10.1109\/ACCESS.2022.3188801","article-title":"Evolved wireless ad hoc network: design and operating principle for wireless resource management of mobile terminals","volume":"10","author":"Hwang","year":"2022","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111146_bib0007","doi-asserted-by":"crossref","first-page":"101","DOI":"10.3390\/e25010101","article-title":"Survey of reinforcement-learning-based MAC protocols for Wireless ad hoc networks with a MAC reference model","volume":"25","author":"Zheng","year":"2023","journal-title":"Entropy"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0008","series-title":"IOP conference series: materials science and engineering","article-title":"Elliptic curve digital signature technique based abnormal node detection in wireless ad hoc networks","volume":"925","author":"Deepalakshmi","year":"2020"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0009","doi-asserted-by":"crossref","first-page":"24875","DOI":"10.1109\/ACCESS.2023.3244888","article-title":"A cross-layer solution for contention control to enhance TCP performance in wireless ad-hoc networks","volume":"11","author":"Mast","year":"2023","journal-title":"IEEE Access"},{"issue":"11","key":"10.1016\/j.compeleceng.2026.111146_bib0010","article-title":"Evaluating the impact of aggregation and RTS\/CTS schemes on IEEE 802.11 based linear wireless ad-hoc networks","volume":"4","author":"Guo","year":"2022","journal-title":"Eng Rep"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0011","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11427-019-9817-6","article-title":"Prophet model and gaussian process regression based user traffic prediction in wireless networks","volume":"63","author":"Li","year":"2020","journal-title":"Sci China Inf Sci"},{"issue":"13","key":"10.1016\/j.compeleceng.2026.111146_bib0012","doi-asserted-by":"crossref","first-page":"18343","DOI":"10.1007\/s11042-022-12283-7","article-title":"A secure multihop relay node selection scheme based data transmission in wireless ad-hoc network via block chain","volume":"81","author":"Mahapatra","year":"2022","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0013","unstructured":"Rhamdhan A., Hidayat F. A survey of defense mechanisms against sybil attacks on IoT with wireless ad-hoc networks."},{"key":"10.1016\/j.compeleceng.2026.111146_bib0014","unstructured":"Ahmad N., Sethi S., Hasan M.G., Barbhuiya R.K. MCDM approach to improve the quality of broadcasting technique in wireless ad-hoc networks."},{"key":"10.1016\/j.compeleceng.2026.111146_bib0015","series-title":"Proceedings of the 2021 7th International conference on computer and communications (ICCC)","first-page":"2195","article-title":"Link scheduling for multiple-directional antennas in ad hoc network: a quasi-order theoretic viewpoint","author":"Cheng","year":"2021"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0016","series-title":"Advanced information networking and applications: proceedings of the 34th international conference on advanced information networking and applications (AINA-2020)","first-page":"657","article-title":"On the impact of delays on control packets of routing algorithms and mitigation strategies for wireless ad-hoc networks","author":"Sinha","year":"2020"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0017","series-title":"Proceedings of the 2020 IEEE 2nd international conference on civil aviation safety and information technology (ICCASIT","first-page":"533","article-title":"Fast layered-synchronization algorithm for adhoc networks","author":"Guo","year":"2020"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111146_bib0018","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1109\/MNET.001.1900513","article-title":"Intelligent and application-aware network traffic prediction in smart access gateways","volume":"34","author":"Zhang","year":"2020","journal-title":"IEEE Netw"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0019","series-title":"Advanced computing and intelligent engineering: proceedings of ICACIE 2018","first-page":"391","article-title":"Health monitoring planning for on-board ships through flying ad hoc network","volume":"2","author":"Kumar","year":"2020"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111146_bib0020","doi-asserted-by":"crossref","first-page":"1869","DOI":"10.1109\/TASE.2021.3077537","article-title":"A hybrid prediction method for realistic network traffic with temporal convolutional network and LSTM","volume":"19","author":"Bi","year":"2021","journal-title":"IEEE Trans Autom Sci Eng"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111146_bib0021","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1007\/s11277-020-07596-5","article-title":"Prediction of node and link failures in mobile ad hoc network using hello based path recovery routing protocol","volume":"115","author":"Kumar","year":"2020","journal-title":"Wirel Pers Commun"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0022","unstructured":"Ranjitha M., Gowsic K. A novel approach for energy efficient reliable routing using TABU in wireless ad hoc networks."},{"key":"10.1016\/j.compeleceng.2026.111146_bib0023","article-title":"A secure routing scheme to mitigate attack in wireless adhoc sensor network","volume":"103","author":"Isaac","year":"2021","journal-title":"Comput Secur"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0024","unstructured":"Murugeshwari B., Jothi D., Hemalatha B., Neelavathy Pari S. Trust Aware privacy preserving routing protocol for wireless adhoc network. arXiv preprint arXiv:2304.14653. 2023."},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111146_bib0025","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/s11036-023-02259-8","article-title":"Trust Aware secured data transmission based routing strategy using optimal ch selection in mobile ad-hoc network","volume":"29","author":"Sankaran","year":"2024","journal-title":"Mob Netw Appl"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111146_bib0026","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1504\/IJWMC.2025.149192","article-title":"Routing and trust management in MANET using hybrid crayfish white shark optimisation","volume":"29","author":"Mukhedkar","year":"2025","journal-title":"Int J Wirel Mob Comput"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111146_bib0027","doi-asserted-by":"crossref","DOI":"10.1002\/dac.70011","article-title":"Trust-aware routing protocol using hierarchical Manta Ray foraging optimization algorithm with selfish node detection in MANET","volume":"38","author":"Jeganathan","year":"2025","journal-title":"Int J Commun Syst"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0028","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2020\/2740654","article-title":"A secure data dissemination in a DHT-based routing paradigm for wireless ad hoc network","volume":"2020","author":"Kousar","year":"2020","journal-title":"Wirel Commun Mob Comput"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0029","unstructured":"Thenmozhi M., Devaraju S., Somasundaram A., Jawahar S. Interference minimized delay reduction based routing protocol (IMDRRP) for wireless ad hoc networks."},{"key":"10.1016\/j.compeleceng.2026.111146_bib0030","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2020.110561","article-title":"QMM-VANET: an efficient clustering algorithm based on QoS and monitoring of malicious vehicles in vehicular ad hoc networks","volume":"165","author":"Fatemidokht","year":"2020","journal-title":"J Syst Softw"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111146_bib0031","article-title":"Enhanced energy efficient with a trust aware in MANET for real-time applications","volume":"75","author":"Subba Reddy","year":"2023","journal-title":"Comput Mater Contin"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0032","doi-asserted-by":"crossref","first-page":"120996","DOI":"10.1109\/ACCESS.2021.3108807","article-title":"Trust aware secure energy efficient hybrid protocol for manet","volume":"9","author":"Veeraiah","year":"2021","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111146_bib0033","first-page":"2157","article-title":"Efficient routing for MANET using optimized hierarchical routing algorithm (Ee-Ohra)","volume":"9","author":"Kumar","year":"2020","journal-title":"Int J Sci Technol Res"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0034","doi-asserted-by":"crossref","first-page":"163043","DOI":"10.1109\/ACCESS.2021.3133882","article-title":"An improved hybrid secure multipath routing protocol for MANET","volume":"9","author":"Srilakshmi","year":"2021","journal-title":"IEEE Access"},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111146_bib0035","doi-asserted-by":"crossref","first-page":"789","DOI":"10.3390\/jmse10060789","article-title":"An efficient opportunistic routing based on prediction for nautical wireless ad hoc networks","volume":"10","author":"Ge","year":"2022","journal-title":"J Mar Sci Eng"},{"issue":"10","key":"10.1016\/j.compeleceng.2026.111146_bib0036","doi-asserted-by":"crossref","DOI":"10.1002\/dac.70118","article-title":"A distributed fuzzy trust-aware multipath routing protocol in wireless sensor networks","volume":"38","author":"Jadidoleslamy","year":"2025","journal-title":"Int J Commun Syst"},{"issue":"7","key":"10.1016\/j.compeleceng.2026.111146_bib0037","doi-asserted-by":"crossref","first-page":"911","DOI":"10.3390\/e24070911","article-title":"An efficient routing protocol for quantum key distribution networks","volume":"24","author":"Yao","year":"2022","journal-title":"Entropy"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111146_bib0038","article-title":"Efficient performance analysis of energy aware on demand routing protocol in mobile ad-hoc network","volume":"2","author":"Prasad","year":"2020","journal-title":"Eng Rep"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0039","series-title":"Data intelligence and cognitive informatics: proceedings of ICDICI 2021","first-page":"139","article-title":"A novel hybrid clustering analysis based on combination of k-means and pso algorithm","author":"Krishna","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0040","series-title":"International conference on machine learning","first-page":"3964","article-title":"The heavy-tail phenomenon in SGD","author":"Gurbuzbalaban","year":"2021"},{"issue":"23","key":"10.1016\/j.compeleceng.2026.111146_bib0041","doi-asserted-by":"crossref","first-page":"e7209","DOI":"10.1002\/cpe.7209","article-title":"Clustering-based routing protocol using gray wolf optimization and technique for order of preference by similarity to ideal solution algorithms in the vehicular ad hoc networks","volume":"34","author":"Kheradmand","year":"2022","journal-title":"Concurr Comput: Pract Exp"},{"issue":"9","key":"10.1016\/j.compeleceng.2026.111146_bib0042","doi-asserted-by":"crossref","first-page":"174","DOI":"10.3390\/computation11090174","article-title":"AFB-GPSR: adaptive beaconing strategy based on fuzzy logic scheme for geographical routing in a mobile ad hoc network (MANET)","volume":"11","author":"Al-Essa","year":"2023","journal-title":"Computation"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0043","doi-asserted-by":"crossref","first-page":"11538","DOI":"10.1109\/ACCESS.2022.3144015","article-title":"Energy-aware and trust-based secure routing protocol for wireless sensor networks using adaptive genetic algorithm","volume":"10","author":"Han","year":"2022","journal-title":"IEEE Access"},{"issue":"Suppl 2","key":"10.1016\/j.compeleceng.2026.111146_bib0044","doi-asserted-by":"crossref","first-page":"1685","DOI":"10.1007\/s10462-023-10560-x","article-title":"Secure trust aware multi-objective routing protocol based on battle competitive swarm optimization in IoT","volume":"56","author":"Rajeesh Kumar","year":"2023","journal-title":"Artif Intell Rev"},{"key":"10.1016\/j.compeleceng.2026.111146_bib0045","series-title":"Proceedings of the 2024 international conference on iot based control networks and intelligent systems (ICICNIS)","first-page":"532","article-title":"Optimization-driven hybrid trust aware algorithm for energy efficient cluster head selection and routing in IoT enabled WSN","author":"Srivastava","year":"2024"}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626002181?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626002181?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:28:10Z","timestamp":1778603290000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790626002181"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":45,"alternative-id":["S0045790626002181"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111146","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Optimized trust-aware routing in clustered ad hoc networks","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111146","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"111146"}}