{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T07:12:01Z","timestamp":1777705921886,"version":"3.51.4"},"reference-count":25,"publisher":"SAGE Publications","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2022,4,28]]},"abstract":"<jats:p>Wireless visual sensor networks (WVSNs) have emerged as a strategic inter disciplinary category of WSN with its visual sensor based intelligence that has garnered considerable attention. The growing demand for energy efficient and maximized life time networks in highly critical applications like surveillance, military and medicine has opened up more prospects as well as challenges in the deployment of WVSNs. Multi-hop communication in WVSN results in overloading of intermediate sensor nodes due to its dual function in the network which results in hotspot effect. This can be mitigated with the help of mobile sinks and rendezvous points based route design. But mobile sinks has to visit every cluster head to gather data which results in longer traversal path and higher latency and power consumption related issues if not addressed properly will impact the performance of the network. Our objective is to analyze and determine the optimal trajectory for mobile sink node traversal with the help of a high quality transmission architecture integrated with reinforcement learning and isolation forest based anomaly detection to propose an energy efficient meta-heuristic approach to enhance the performance of network by reducing the latency and securing the network against possible attacks.<\/jats:p>","DOI":"10.3233\/jifs-212557","type":"journal-article","created":{"date-parts":[[2021,12,31]],"date-time":"2021-12-31T08:42:04Z","timestamp":1640940124000},"page":"6145-6157","source":"Crossref","is-referenced-by-count":1,"title":["Security enhanced optimal trajectory selection for mobile sink using reinforcement learning"],"prefix":"10.1177","volume":"42","author":[{"given":"Usama","family":"Abdur Rahman","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Jerusalem College of Engineering, Chennai, Tamil Nadu, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"C.","family":"Jayakumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Sri Venkateswara College of Engineering, Chennai, Tamil Nadu, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"179","reference":[{"issue":"2","key":"10.3233\/JIFS-212557_ref1","doi-asserted-by":"publisher","first-page":"3506","DOI":"10.3390\/s140203506","article-title":"A survey on sensor coverage and visual data capturing processing transmission in wireless visual sensor networks","volume":"14","author":"Yap","year":"2014","journal-title":"Sensors"},{"issue":"04","key":"10.3233\/JIFS-212557_ref2","doi-asserted-by":"publisher","first-page":"91","DOI":"10.4236\/wsn.2012.44013","article-title":"Deployment optimization strategy for a two-tier wireless visual sensor network","volume":"4","author":"Li","year":"2012","journal-title":"Wireless Sensor Network"},{"key":"10.3233\/JIFS-212557_ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.12.009"},{"issue":"10","key":"10.3233\/JIFS-212557_ref4","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MCOM.2011.6035821","article-title":"Networking and application interface technology for wireless sensor network surveillance and monitoring","volume":"49","author":"Ghataoura","year":"2011","journal-title":"IEEE Communications Magazine"},{"key":"10.3233\/JIFS-212557_ref5","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s11276-004-4753-x","article-title":"TTDD: Two-tier data dissemination in large-scale Wireless sensor networks","volume":"11","author":"Luo","year":"2005","journal-title":"Wireless Networks"},{"key":"10.3233\/JIFS-212557_ref6","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.jpdc.2015.05.005","article-title":"Dellat: Delivery Latency Minimization in Wireless Sensor Networks with Mobile Sink","volume":"83","author":"Tang","year":"2015","journal-title":"Journal of Parallel and Distributed Computing"},{"issue":"5","key":"10.3233\/JIFS-212557_ref7","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1016\/j.pmcj.2009.01.001","article-title":"Improved sensor network lifetime with multiple mobile sinks","volume":"5","author":"Marta","year":"2009","journal-title":"Pervasive and Mobile Computing"},{"key":"10.3233\/JIFS-212557_ref8","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.aeue.2016.12.005","article-title":"Energy efficient path selection for mobile sink and data gathering in wireless sensor networks","volume":"73","author":"Kaswan","year":"2017","journal-title":"Int. J. Electronics Communication. (AEU)"},{"issue":"7","key":"10.3233\/JIFS-212557_ref9","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1109\/MCOM.2014.6852097","article-title":"Routing protocols for wireless sensor networks with mobile sinks: a survey","volume":"52","author":"Yu","year":"2014","journal-title":"IEEE Communications Magazine"},{"issue":"13","key":"10.3233\/JIFS-212557_ref10","doi-asserted-by":"publisher","first-page":"1168","DOI":"10.1007\/s11227-016-1801-0","article-title":"Rendezvous based routing protocol for wireless sensor networks with mobile sink","volume":"73","author":"Sharma","year":"2017","journal-title":"J Supercomputer"},{"issue":"2","key":"10.3233\/JIFS-212557_ref11","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1049\/el.2015.2996","article-title":"Rendezvous points and routing path-selection strategies for wireless sensor networks with mobile sink","volume":"52","author":"Suh","year":"2015","journal-title":"Electron Lett"},{"key":"10.3233\/JIFS-212557_ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-6015-8"},{"key":"10.3233\/JIFS-212557_ref14","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/s10916-018-1045-z","article-title":"Maintaining Security and Privacy in Health Care System Using Learning Based Deep-Q-Networks","volume":"42","author":"Mohamed Shakeel","year":"2018","journal-title":"J Med Syst"},{"key":"10.3233\/JIFS-212557_ref15","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1613\/jair.301","article-title":"Reinforcement Learning: A Survey","volume":"04","author":"Kaelbling","year":"1996","journal-title":"Journal of Artificial Intelligence Research"},{"key":"10.3233\/JIFS-212557_ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPA.2010.5605518"},{"issue":"6","key":"10.3233\/JIFS-212557_ref17","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/TMC.2010.28","article-title":"QELAR: a machine-learning-based adaptive routing protocol for energy-efficient and lifetime-extended underwater sensor networks","volume":"9","author":"Hu","year":"2010","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"5","key":"10.3233\/JIFS-212557_ref18","doi-asserted-by":"publisher","first-page":"2407","DOI":"10.1109\/TVT.2013.2291811","article-title":"An energy-efficient mobile-sink path selection strategy for wireless sensor networks","volume":"63","author":"Salarian","year":"2014","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"6","key":"10.3233\/JIFS-212557_ref19","doi-asserted-by":"publisher","first-page":"868","DOI":"10.3390\/s16060868","article-title":"A comparativestudy of anomaly detection techniques for smart city wireless sensornetworks","volume":"16","author":"Garcia-Font","year":"2016","journal-title":"Sensors"},{"key":"10.3233\/JIFS-212557_ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.08.004"},{"key":"10.3233\/JIFS-212557_ref21","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1016\/j.compeleceng.2017.06.003","article-title":"An efficient trajectory based routing scheme for delay-sensitive data in wireless sensor network","volume":"64","author":"Nimisha","year":"2017","journal-title":"Computers & Electrical Engineering"},{"key":"10.3233\/JIFS-212557_ref22","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1155\/2017\/4281597","article-title":"Balanced Transmissions Based Trajectories of Mobile Sink in Homogeneous Wireless Sensor Networks","volume":"2017","author":"Akbar","year":"2017","journal-title":"Journal of Sensors"},{"issue":"9","key":"10.3233\/JIFS-212557_ref23","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1016\/S1364-6613(99)01331-5","article-title":"Reinforcement Learning: An Introduction, by R.S. Sutton, and A.G. Barto","volume":"3","author":"Montague","year":"1999","journal-title":"Trends in Cognitive Sciences"},{"issue":"2","key":"10.3233\/JIFS-212557_ref24","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.eij.2013.06.001","article-title":"Outliers detection and classification in wireless sensor networks","volume":"14","author":"Fawzy","year":"2013","journal-title":"Egyptian Informatics Journal"},{"issue":"2","key":"10.3233\/JIFS-212557_ref25","doi-asserted-by":"publisher","first-page":"211","DOI":"10.6180\/JASE.2013.16.2.13","article-title":"Efficient Density Based Techniques for Anomalous Data Detection in Wireless Sensor Networks","volume":"16","author":"Chitradevi","year":"2013","journal-title":"Journal of Applied Science and Engineering"},{"issue":"2","key":"10.3233\/JIFS-212557_ref26","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/SURV.2010.021510.00088","article-title":"Outlier detection techniques for wireless sensor networks: A survey","volume":"12","author":"Zhang","year":"2010","journal-title":"Communications Surveys & Tutorials, IEEE"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-212557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:45:36Z","timestamp":1777455936000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-212557"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,28]]},"references-count":25,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.3233\/jifs-212557","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,28]]}}}