{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T21:29:02Z","timestamp":1765229342731,"version":"3.46.0"},"reference-count":34,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Knowledge-Based Systems"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1016\/j.knosys.2025.114720","type":"journal-article","created":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T22:24:20Z","timestamp":1760999060000},"page":"114720","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"PC","title":["Asymmetric lightweight cryptographic-based secure routing technique in IoT-based WSN via optimal path selection using hybrid optimization algorithm"],"prefix":"10.1016","volume":"330","author":[{"given":"J","family":"Anitha Gnanaselvi","sequence":"first","affiliation":[]},{"given":"V.","family":"Kalpana","sequence":"additional","affiliation":[]},{"given":"Jaisharma","family":"K","sequence":"additional","affiliation":[]},{"given":"R.","family":"Sridevi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.knosys.2025.114720_bib0001","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.comcom.2022.02.004","article-title":"Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks","volume":"187","author":"Rajasoundaran","year":"2022","journal-title":"Comput. Commun."},{"issue":"26","key":"10.1016\/j.knosys.2025.114720_bib0002","doi-asserted-by":"crossref","first-page":"19039","DOI":"10.1007\/s00521-023-08753-0","article-title":"Optimal sensor network routing with secure network monitoring using deep learning architectures","volume":"35","author":"Qamar","year":"2023","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.knosys.2025.114720_bib0003","doi-asserted-by":"crossref","unstructured":"Siraj M, Altamimi M, Abbasi Z. Mobile secured IoT sensors-driven network using efficient QoS management. IEEE Access. 2024.","DOI":"10.1109\/ACCESS.2024.3509692"},{"issue":"1","key":"10.1016\/j.knosys.2025.114720_bib0004","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/s11276-021-02850-5","article-title":"Cross layered cryptography based secure routing for IoT-enabled smart healthcare system","volume":"28","author":"Kore","year":"2022","journal-title":"Wirel. Netw."},{"key":"10.1016\/j.knosys.2025.114720_bib0005","article-title":"Reliable cluster based data aggregation scheme for IoT network using hybrid deep learning techniques","volume":"27","author":"Ravi","year":"2023","journal-title":"Meas.: Sens."},{"issue":"1C2","key":"10.1016\/j.knosys.2025.114720_bib0006","first-page":"1122","article-title":"A novel chaotic map encryption methodology for image cryptography and secret communication with steganography","volume":"8","author":"Alzubi","year":"2019","journal-title":"Int. J. Recent Technol. Eng."},{"issue":"11","key":"10.1016\/j.knosys.2025.114720_bib0007","doi-asserted-by":"crossref","first-page":"8566","DOI":"10.1007\/s11227-020-03144-x","article-title":"Cryptosystem design based on Hermitian curves for IoT security","volume":"76","author":"Alzubi","year":"2020","journal-title":"J. Supercomput."},{"issue":"1","key":"10.1016\/j.knosys.2025.114720_bib0008","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s00607-024-01393-9","article-title":"DNA cryptography based security framework for health-cloud data","volume":"107","author":"Qiqieh","year":"2025","journal-title":"Computing"},{"issue":"2","key":"10.1016\/j.knosys.2025.114720_bib0009","first-page":"873","article-title":"A deep learning-based frechet and dirichlet model for intrusion detection in IWSN","volume":"42","author":"Alzubi","year":"2022","journal-title":"J. Intell. Fuzzy Syst."},{"key":"10.1016\/j.knosys.2025.114720_bib0010","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.tcs.2022.07.011","article-title":"A secure energy aware meta-heuristic routing protocol (SEAMHR) for sustainable IoT-wireless sensor network (WSN)","volume":"930","author":"Gurram","year":"2022","journal-title":"Theor. Comput. Sci."},{"issue":"3","key":"10.1016\/j.knosys.2025.114720_bib0011","doi-asserted-by":"crossref","first-page":"e4713","DOI":"10.1002\/ett.4713","article-title":"An improved blockchain based encryption scheme for secure routing in wireless sensor network using machine learning technique","volume":"34","author":"Meena","year":"2023","journal-title":"Trans. onEmerging Telecommun. Technol."},{"key":"10.1016\/j.knosys.2025.114720_bib0012","first-page":"1","article-title":"Image driven multi feature plant management with FDE based smart agriculture with improved security in wireless sensor networks","author":"Santhosh","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.knosys.2025.114720_bib0013","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.comcom.2022.10.001","article-title":"WOGRU-IDS\u2014An intelligent intrusion detection system for IoT assisted wireless sensor networks","volume":"196","author":"Ramana","year":"2022","journal-title":"Comput. Commun."},{"key":"10.1016\/j.knosys.2025.114720_bib0014","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2021.107130","article-title":"Trust aggregation authentication protocol using machine learning for IoT wireless sensor networks","volume":"91","author":"Chinnaswamy","year":"2021","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.knosys.2025.114720_bib0015","doi-asserted-by":"crossref","DOI":"10.1016\/j.micpro.2022.104622","article-title":"HIIDS: hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare","author":"Saif","year":"2022","journal-title":"Microprocess. Microsyst."},{"issue":"3","key":"10.1016\/j.knosys.2025.114720_bib0016","doi-asserted-by":"crossref","first-page":"1527","DOI":"10.1007\/s12065-023-00847-x","article-title":"An optimization method in wireless sensor network routing and IoT with water strider algorithm and ant colony optimization algorithm","volume":"17","author":"Kooshari","year":"2024","journal-title":"Evol. Intell."},{"key":"10.1016\/j.knosys.2025.114720_bib0017","doi-asserted-by":"crossref","DOI":"10.1016\/j.aeue.2023.154723","article-title":"Real-time health monitoring in WBANs using hybrid metaheuristic-driven machine learning routing protocol (MDML-RP)","volume":"168","author":"Aryai","year":"2023","journal-title":"AEU-Int. J. Electron. Commun."},{"key":"10.1016\/j.knosys.2025.114720_bib0018","first-page":"1","article-title":"Multi-level trust-based secure and optimal IoT-WSN routing for environmental monitoring applications","author":"Sharma","year":"2024","journal-title":"J. Supercomput."},{"issue":"1","key":"10.1016\/j.knosys.2025.114720_bib0019","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/s11277-024-11289-8","article-title":"Trustworthy routing for sustainable and secure IoT-WSN networks","volume":"136","author":"Kumar","year":"2024","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.knosys.2025.114720_bib32","series-title":"2025 8th International Conference on Trends in Electronics and Informatics (ICOEI)","first-page":"514","article-title":"Traffic sign detection and recognition systems for autonomous vehicle software development","author":"Jenifer","year":"2025"},{"key":"10.1016\/j.knosys.2025.114720_bib33","series-title":"2025 International Conference on Inventive Computation Technologies (ICICT)","first-page":"429","article-title":"Autonomous vehicle navigation and road safety by using the YOLO algorithm","author":"Jenifer","year":"2025"},{"key":"10.1016\/j.knosys.2025.114720_bib34","series-title":"International Conference on Data Analytics & Management","first-page":"557","article-title":"Cloud-trust: A cloud security assessment model for mitigating advanced persistent threats in cloud computing systems","author":"Aileni","year":"2024"},{"key":"10.1016\/j.knosys.2025.114720_bib0020","doi-asserted-by":"crossref","unstructured":"Ghadi YY, Mazhar T, Al Shloul T, Shahzad T, Salaria UA, Ahmed A, Hamam H. Machine learning solution for the security of wireless sensor network. IEEE Access. 2024.","DOI":"10.1109\/ACCESS.2024.3355312"},{"key":"10.1016\/j.knosys.2025.114720_bib0021","doi-asserted-by":"crossref","first-page":"159187","DOI":"10.1109\/ACCESS.2021.3130005","article-title":"Improved blowfish algorithm-based secure routing technique in IoT-based WSN","volume":"9","author":"Alotaibi","year":"2021","journal-title":"IEEe Access."},{"issue":"6","key":"10.1016\/j.knosys.2025.114720_bib0022","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/cpe.7535","article-title":"Coverage hole aware optimal cluster based routing for wireless sensor network assisted IoT using hybrid deep recurrent neural network","volume":"35","author":"Srivastava","year":"2023","journal-title":"Concurr. Comput.: Pract. Exp."},{"issue":"17","key":"10.1016\/j.knosys.2025.114720_bib0023","doi-asserted-by":"crossref","first-page":"e4965","DOI":"10.1002\/dac.4965","article-title":"EETSP: energy-efficient two-stage routing protocol for wireless sensor network-assisted internet of Things","volume":"34","author":"Dwivedi","year":"2021","journal-title":"Int. J. Commun. Syst."},{"key":"10.1016\/j.knosys.2025.114720_bib0024","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.aej.2023.09.064","article-title":"Secure localization techniques in wireless sensor networks against routing attacks based on hybrid machine learning models","volume":"82","author":"Gebremariam","year":"2023","journal-title":"Alex. Eng. J."},{"issue":"3","key":"10.1016\/j.knosys.2025.114720_bib0025","doi-asserted-by":"crossref","first-page":"e7458","DOI":"10.1002\/cpe.7458","article-title":"IOT-HML: A hybrid machine learning technique for IoT enabled industrial monitoring and control system","volume":"35","author":"Kota","year":"2023","journal-title":"Concurr. Comput.: Pract. Exp."},{"key":"10.1016\/j.knosys.2025.114720_bib0026","doi-asserted-by":"crossref","first-page":"9340","DOI":"10.1109\/ACCESS.2022.3142082","article-title":"Performance analysis of deep learning-based routing protocol for an efficient data transmission in 5G WSN communication","volume":"10","author":"Arya","year":"2022","journal-title":"IEEe Access"},{"key":"10.1016\/j.knosys.2025.114720_bib0027","doi-asserted-by":"crossref","first-page":"145421","DOI":"10.1109\/ACCESS.2023.3345218","article-title":"Secure-energy efficient bio-inspired clustering and deep learning based routing using blockchain for edge assisted WSN environment","volume":"11","author":"Prasad","year":"2023","journal-title":"IEEe Access"},{"key":"10.1016\/j.knosys.2025.114720_bib0031","doi-asserted-by":"crossref","first-page":"10585","DOI":"10.1109\/ACCESS.2021.3075959","article-title":"Trust based secure and energy efficient routing protocol for wireless sensor networks","volume":"10","author":"Hu","year":"2021","journal-title":"IEEe Access"},{"issue":"5","key":"10.1016\/j.knosys.2025.114720_bib0028","doi-asserted-by":"crossref","first-page":"7029","DOI":"10.1007\/s13369-023-08654-3","article-title":"Dandelion optimizer and gold rush optimizer algorithm-based optimization of multilevel inverters","volume":"49","author":"Saglam","year":"2024","journal-title":"Arab. J. Sci. Eng."},{"issue":"1","key":"10.1016\/j.knosys.2025.114720_bib0029","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/s10586-022-03953-0","article-title":"Banyan tree growth optimization and application","volume":"27","author":"Wu","year":"2024","journal-title":"Clust. Comput."},{"key":"10.1016\/j.knosys.2025.114720_bib0030","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.comcom.2021.01.019","article-title":"AMOUN: asymmetric lightweight cryptographic scheme for wireless group communication","volume":"169","author":"Mansour","year":"2021","journal-title":"Comput. Commun."}],"container-title":["Knowledge-Based Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705125017599?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705125017599?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T19:42:08Z","timestamp":1765222928000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950705125017599"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":34,"alternative-id":["S0950705125017599"],"URL":"https:\/\/doi.org\/10.1016\/j.knosys.2025.114720","relation":{},"ISSN":["0950-7051"],"issn-type":[{"type":"print","value":"0950-7051"}],"subject":[],"published":{"date-parts":[[2025,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Asymmetric lightweight cryptographic-based secure routing technique in IoT-based WSN via optimal path selection using hybrid optimization algorithm","name":"articletitle","label":"Article Title"},{"value":"Knowledge-Based Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.knosys.2025.114720","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"114720"}}