{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T04:36:50Z","timestamp":1776919010651,"version":"3.51.2"},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.jisa.2026.104372","type":"journal-article","created":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T04:06:37Z","timestamp":1769227597000},"page":"104372","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["A secured cryptographic approach with extreme gradient boosting model for data aggregation and routing in WSN"],"prefix":"10.1016","volume":"98","author":[{"given":"Ramkumar","family":"Devendiran","sequence":"first","affiliation":[]},{"given":"Anil V","family":"Turukmane","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"16","key":"10.1016\/j.jisa.2026.104372_bib0001","doi-asserted-by":"crossref","first-page":"e5584","DOI":"10.1002\/dac.5584","article-title":"The security-based optimization algorithm for enhancing the energy efficiency of wireless sensor networks","volume":"36","author":"Anusha Sowbarnika","year":"2023","journal-title":"Int J Commun Syst"},{"key":"10.1016\/j.jisa.2026.104372_bib0002","doi-asserted-by":"crossref","first-page":"e1932","DOI":"10.7717\/peerj-cs.1932","article-title":"Data aggregation algorithm for wireless sensor networks with different initial energy of nodes","volume":"10","author":"Liu","year":"2024","journal-title":"PeerJ Comput Sci"},{"key":"10.1016\/j.jisa.2026.104372_bib0003","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.tcs.2022.06.032","article-title":"An analysis of architecture, framework, security and challenging aspects for data aggregation and routing techniques in IoT WSNs","volume":"929","author":"Chandnani","year":"2022","journal-title":"Theor Comput Sci"},{"issue":"2","key":"10.1016\/j.jisa.2026.104372_bib0004","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1007\/s11036-023-02109-7","article-title":"An energy-efficient clustering algorithm for maximizing lifetime of wireless sensor networks using ML","volume":"28","author":"Debasis","year":"2023","journal-title":"Mob Netw Appl"},{"issue":"6","key":"10.1016\/j.jisa.2026.104372_bib0005","doi-asserted-by":"crossref","first-page":"1993","DOI":"10.3390\/s24061993","article-title":"Security enhancement for deep reinforcement learning-based strategy in energy-efficient wireless sensor networks","volume":"24","author":"Hu","year":"2024","journal-title":"Sensors"},{"issue":"1","key":"10.1016\/j.jisa.2026.104372_bib0006","doi-asserted-by":"crossref","DOI":"10.32604\/iasc.2023.032074","article-title":"Cluster head selection and multipath routing based energy efficient wireless sensor network","volume":"36","author":"Shanmugapriya","year":"2023","journal-title":"Intell Autom Soft Comput"},{"issue":"1","key":"10.1016\/j.jisa.2026.104372_bib0007","article-title":"Novel framework for secure data aggregation in precision agriculture with extensive energy efficiency","volume":"2023","author":"Nagaraja","year":"2023","journal-title":"J Comput Netw Commun"},{"issue":"1","key":"10.1016\/j.jisa.2026.104372_bib0008","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.gltp.2022.03.018","article-title":"An optimal cluster & trusted path for routing formation and classification of intrusion using the ML classification approach in WSN","volume":"3","author":"Srividya","year":"2022","journal-title":"Glob Transit Proc"},{"key":"10.1016\/j.jisa.2026.104372_bib0009","series-title":"Detection of denial-of-service attack in wireless sensor networks: a lightweight ML approach","author":"Elsadig","year":"2023"},{"key":"10.1016\/j.jisa.2026.104372_bib0010","doi-asserted-by":"crossref","first-page":"9340","DOI":"10.1109\/ACCESS.2022.3142082","article-title":"Performance analysis of deep learning-based routing protocol for an efficient data transmission in 5G WSN communication","volume":"10","author":"Arya","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.jisa.2026.104372_bib0011","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2024.103502","article-title":"Efficient and secure signcryption-based data aggregation for internet of drone-based drone-to-ground station communication","volume":"159","author":"Verma","year":"2024","journal-title":"Ad Hoc Networks"},{"issue":"01","key":"10.1016\/j.jisa.2026.104372_bib0012","doi-asserted-by":"crossref","DOI":"10.1142\/S1469026823410043","article-title":"An intelligent data fusion technique for improving the data transmission rate in wireless sensor networks","volume":"22","author":"Lavanya","year":"2023","journal-title":"Int J Comput Intell Appl"},{"issue":"1","key":"10.1016\/j.jisa.2026.104372_bib0013","doi-asserted-by":"crossref","DOI":"10.1007\/s42979-023-02410-y","article-title":"Transmission-efficient grid-based synchronized model for routing in wireless sensor networks using Bayesian compressive sensing","volume":"5","author":"Devasenapathy","year":"2024","journal-title":"SN Comput Sci"},{"key":"10.1016\/j.jisa.2026.104372_bib0014","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.aej.2023.03.061","article-title":"Cryptographic data security for reliable wireless sensor network","volume":"72","author":"Urooj","year":"2023","journal-title":"Alex Eng J"},{"key":"10.1016\/j.jisa.2026.104372_bib0015","first-page":"1","article-title":"ML based hybrid model for energy efficient secured transmission in wireless sensor networks","author":"Saravana Kumar","year":"2022","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"1","key":"10.1016\/j.jisa.2026.104372_bib0016","doi-asserted-by":"crossref","first-page":"145","DOI":"10.3390\/telecom5010008","article-title":"The modeling and detection of attacks in role-based self-organized decentralized wireless sensor networks","volume":"5","author":"Meleshko","year":"2024","journal-title":"In Telecom"},{"key":"10.1016\/j.jisa.2026.104372_bib0017","article-title":"Environment fusion routing protocol for Wireless sensor networks","author":"Yang","year":"2023","journal-title":"IEEE Sens J"},{"key":"10.1016\/j.jisa.2026.104372_bib0018","first-page":"1","article-title":"GWO-SMSLO: grey wolf optimization based clustering with secured modified Sea Lion optimization routing algorithm in wireless sensor networks","author":"Dinesh","year":"2024","journal-title":"Peer-to-Peer Netw Appl"},{"key":"10.1016\/j.jisa.2026.104372_bib0019","first-page":"1","article-title":"HybridRobustNet: enhancing detection of hybrid attacks in IoT networks through advanced learning approach","author":"Sivasakthi","year":"2024","journal-title":"Clust Comput"},{"key":"10.1016\/j.jisa.2026.104372_bib0020","series-title":"Intelligent Computing and Networking: Proceedings of IC-ICN 2020","first-page":"227","article-title":"Secure data aggregation and data transmission using HMAC protocol in cluster base wireless sensor network","author":"Sall","year":"2021"},{"key":"10.1016\/j.jisa.2026.104372_bib0021","series-title":"Proceedings of the computational methods in systems and software","first-page":"1","article-title":"Hop count-based detection scheme for sinkhole attack","author":"Sejaphala","year":"2024"},{"key":"10.1016\/j.jisa.2026.104372_bib0022","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.123027","article-title":"Dugat-LSTM: deep learning based network intrusion detection system using chaotic optimization strategy","volume":"245","author":"Devendiran","year":"2024","journal-title":"Expert Syst Appl"},{"issue":"02","key":"10.1016\/j.jisa.2026.104372_bib0023","doi-asserted-by":"crossref","DOI":"10.1142\/S0219265922500025","article-title":"Wireless sensor network security analysis for data and aggregation","volume":"23","author":"Manoharan","year":"2023","journal-title":"J Interconnect Netw"},{"key":"10.1016\/j.jisa.2026.104372_bib0024","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.aej.2023.09.064","article-title":"Secure localization techniques in wireless sensor networks against routing attacks based on hybrid ML models","volume":"82","author":"Gebremariam","year":"2023","journal-title":"Alex Eng J"},{"key":"10.1016\/j.jisa.2026.104372_bib0025","doi-asserted-by":"crossref","DOI":"10.1016\/j.asej.2024.102644","article-title":"Enhancing data transmission efficiency in wireless sensor networks through ML-enabled energy optimization: a grouping model approach","author":"Surenther","year":"2024","journal-title":"Ain Shams Eng J"},{"key":"10.1016\/j.jisa.2026.104372_bib0026","doi-asserted-by":"crossref","first-page":"e8067","DOI":"10.1002\/cpe.8067","article-title":"An optimized crypto-based routing protocol for secure routing in wireless sensor networks","author":"Khan","year":"2024","journal-title":"Concurr Comput: Pract Exp"},{"key":"10.1016\/j.jisa.2026.104372_bib0027","first-page":"650","article-title":"An energy-efficient cluster head selection and secure data transmission in WSN using Spider Monkey optimized algorithm and hybrid cryptographic with security","volume":"3","author":"Yuvaraja","year":"2024","journal-title":"Salud Cienc Tecnol-Ser Conf"},{"issue":"19","key":"10.1016\/j.jisa.2026.104372_bib0028","doi-asserted-by":"crossref","first-page":"8224","DOI":"10.3390\/s23198224","article-title":"A deep-learning-based secure routing protocol to avoid blackhole attacks in VANETs","volume":"23","author":"Amalia","year":"2023","journal-title":"Sensors"},{"key":"10.1016\/j.jisa.2026.104372_bib0029","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.comcom.2023.05.018","article-title":"Intelligent routing algorithm for wireless sensor networks dynamically guided by distributed neural networks","volume":"207","author":"Liu","year":"2023","journal-title":"Comput Commun"},{"issue":"1","key":"10.1016\/j.jisa.2026.104372_bib0030","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-025-08677-w","article-title":"AI-based routing algorithms improve energy efficiency, latency, and data reliability in wireless sensor networks","volume":"15","author":"Priyadarshi","year":"2025","journal-title":"Sci Rep"},{"issue":"13","key":"10.1016\/j.jisa.2026.104372_bib0031","doi-asserted-by":"crossref","first-page":"4730","DOI":"10.3390\/s22134730","article-title":"ML for wireless sensor networks security: an overview of challenges and issues","volume":"22","author":"Ahmad","year":"2022","journal-title":"Sensors"},{"issue":"8","key":"10.1016\/j.jisa.2026.104372_bib0032","doi-asserted-by":"crossref","first-page":"1830","DOI":"10.1109\/LCOMM.2024.3408297","article-title":"Fuzz C-means clustering algorithm for hybrid TOA and AOA localization in NLOS environments","volume":"28","author":"Zou","year":"2024","journal-title":"IEEE Commun Lett"},{"issue":"1","key":"10.1016\/j.jisa.2026.104372_bib0033","article-title":"Intrusion detection model for wireless sensor networks based on FedAvg and XGBoost algorithm","volume":"2024","author":"Wu","year":"2024","journal-title":"Int J Distrib Sens Netw"},{"key":"10.1016\/j.jisa.2026.104372_bib0034","doi-asserted-by":"crossref","first-page":"349","DOI":"10.13052\/jcsm2245-1439.1331","article-title":"Enhancement of tiny encryption algorithm for resource-constrained WSNs using four connected additive fibonacci generators","author":"Zyara","year":"2024","journal-title":"J Cyber Secur Mobil"},{"key":"10.1016\/j.jisa.2026.104372_bib0041","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.matcom.2021.08.013","article-title":"Honey Badger Algorithm: new metaheuristic algorithm for solving optimization problems","volume":"192","author":"Hashim","year":"2022","journal-title":"Math Comput Simul"},{"issue":"3","key":"10.1016\/j.jisa.2026.104372_bib0035","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/s10462-023-10658-2","article-title":"Improved honey badger algorithm based on elementary function density factors and mathematical spirals in polar coordinate systema","volume":"57","author":"Zhang","year":"2024","journal-title":"Artif Intell Rev"},{"issue":"9","key":"10.1016\/j.jisa.2026.104372_bib0040","doi-asserted-by":"crossref","first-page":"581","DOI":"10.3390\/biomimetics10090581","article-title":"Multi-strategy Honey badger algorithm for Global optimization","volume":"10","author":"Guo","year":"2025","journal-title":"Biomimetics"},{"issue":"10","key":"10.1016\/j.jisa.2026.104372_bib0036","article-title":"An energy efficient routing protocol with fuzzy neural networks in wireless sensor network","volume":"15","author":"Gopalan","year":"2024","journal-title":"Ain Shams Eng J"},{"issue":"4","key":"10.1016\/j.jisa.2026.104372_bib0037","doi-asserted-by":"crossref","first-page":"2589","DOI":"10.1007\/s11277-023-10393-5","article-title":"A reliable protocol for data aggregation and optimized routing in IoT WSNs based on ML","volume":"130","author":"Chandnani","year":"2023","journal-title":"Wirel Pers Commun"},{"issue":"7","key":"10.1016\/j.jisa.2026.104372_bib0038","doi-asserted-by":"crossref","first-page":"9220","DOI":"10.1007\/s11227-023-05800-4","article-title":"Node utilization index-based data routing and aggregation protocol for energy-efficient wireless sensor networks","volume":"80","author":"Bomnale","year":"2024","journal-title":"J Supercomput"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000025?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000025?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T03:47:28Z","timestamp":1776916048000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212626000025"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":40,"alternative-id":["S2214212626000025"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104372","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A secured cryptographic approach with extreme gradient boosting model for data aggregation and routing in WSN","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104372","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104372"}}