{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T09:54:04Z","timestamp":1770112444624,"version":"3.49.0"},"reference-count":32,"publisher":"SAGE Publications","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,10,4]]},"abstract":"<jats:p>This article has been retracted. A retraction notice can be found at https:\/\/doi.org\/10.3233\/JIFS-219433.<\/jats:p>","DOI":"10.3233\/jifs-231905","type":"journal-article","created":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T12:03:15Z","timestamp":1688472195000},"page":"6575-6590","source":"Crossref","is-referenced-by-count":8,"title":["RETRACTED: Hybrid trust-based secure routing protocol for detection of routing attacks in environment monitoring over MANETs"],"prefix":"10.1177","volume":"45","author":[{"given":"G.","family":"Arulselvan","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, E.G.S. Pillay Engineering College, Nagapattinam, Tamilnadu, India"}]},{"given":"A.","family":"Rajaram","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, E.G.S. Pillay Engineering College, Nagapattinam, Tamilnadu, India"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-231905_ref1","doi-asserted-by":"crossref","first-page":"693","DOI":"10.1007\/s11277-019-06385-z","article-title":"RETRACTED ARTICLE: Optimal Hop Selection Based Novel Trust Based DDoS Attack Removal Framework for Reliable and Secured Transmission of Data in VANETs","volume":"113","author":"Saravanan","year":"2019","journal-title":"Wireless Personal Communications"},{"key":"10.3233\/JIFS-231905_ref2","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1007\/s11277-019-06182-8","article-title":"Mitigate Black Hole Attack Using Hybrid Bee Optimized Weighted Trust with 2-Opt HSMR in MANET","volume":"106","author":"Keerthika","year":"2019","journal-title":"Wireless Personal Communications"},{"key":"10.3233\/JIFS-231905_ref3","unstructured":"Prevention of Black Hole Attacks in Virtualized Cloud Network using Trust-Aware Energy Efficient HSMR Routing with Firefly Based AI Technique, International Journal of Recent Technology and Engineering (2019)."},{"key":"10.3233\/JIFS-231905_ref4","doi-asserted-by":"crossref","first-page":"3403","DOI":"10.1007\/s11277-021-08884-4","article-title":"HSORS: A Highly Secure and Optimal Route Selection Protocol to Mitigate Against Packet Drop Attack in Wireless Ad-Hoc Sensor Network","volume":"121","author":"L","year":"2021","journal-title":"Wireless Personal Communications"},{"key":"10.3233\/JIFS-231905_ref5","doi-asserted-by":"crossref","unstructured":"Lwin M.T. , Yim J. and Ko Y. , Blockchain-Based Lightweight Trust Management in Mobile Ad-Hoc Networks, Sensors, Basel, (Switzerland) 20 (2020).","DOI":"10.3390\/s20030698"},{"key":"10.3233\/JIFS-231905_ref6","doi-asserted-by":"crossref","first-page":"1581","DOI":"10.1007\/s11277-018-5778-2","article-title":"A Dummy Packet-Based Hybrid Security Framework for Mitigating Routing Misbehavior in Multi-Hop Wireless Networks","volume":"101","author":"Sakthivel","year":"2018","journal-title":"Wireless Personal Communications"},{"key":"10.3233\/JIFS-231905_ref7","doi-asserted-by":"crossref","first-page":"83650","DOI":"10.1109\/ACCESS.2022.3196028","article-title":"NDPsec: Neighbor Discovery Protocol Security Mechanism","volume":"10","author":"Al-Ani","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-231905_ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2008.4812884"},{"key":"10.3233\/JIFS-231905_ref9","doi-asserted-by":"crossref","unstructured":"Bali H. and Hemrajani N. , Attack analysis and designing of quality of service framework for optimized link state routing protocol in MANET, International Journal of Intelligent Engineering and Systems (2018).","DOI":"10.22266\/ijies2018.1031.22"},{"key":"10.3233\/JIFS-231905_ref10","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/s11276-021-02850-5","article-title":"Cross layered cryptography based secure routing for IoT-enabled smart healthcare system","volume":"28","author":"Kore","year":"2022","journal-title":"Wireless Networks"},{"key":"10.3233\/JIFS-231905_ref11","first-page":"1","article-title":"A secure routing protocol with regional partitioned clustering and Beta trust management in smart home","author":"Hong","year":"2018","journal-title":"Wireless Networks"},{"key":"10.3233\/JIFS-231905_ref12","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1109\/ICDCSW.2004.1284112","article-title":"Power aware routing for MANET using on-demand multipath routing protocol","volume":"8","author":"Rajaram","year":"2011","journal-title":"International Journal of Computer Science Issues (IJCSI)"},{"key":"10.3233\/JIFS-231905_ref13","first-page":"18","article-title":"A trust-based secure routing scheme using the traceback approach for energy-harvesting wireless sensor networks","author":"Tang","year":"2018","journal-title":"Sensors"},{"key":"10.3233\/JIFS-231905_ref14","doi-asserted-by":"crossref","first-page":"9142","DOI":"10.1109\/ACCESS.2022.3142811","article-title":"Hybrid Genetic Firefly Algorithm-Based Routing Protocol for VANETs","volume":"10","author":"Singh","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-231905_ref15","doi-asserted-by":"crossref","first-page":"1439","DOI":"10.1007\/s11276-022-02917-x","article-title":"An energy aware secure three-level weighted trust evaluation and grey wolf optimization-based routing in wireless ad hoc sensor network","volume":"28","author":"Sajan","year":"2022","journal-title":"Wireless Networks"},{"issue":"10","key":"10.3233\/JIFS-231905_ref16","doi-asserted-by":"crossref","first-page":"1528","DOI":"10.1093\/comjnl\/bxz061","article-title":"Trust-based secure routing in mobile ad hoc network using hybrid optimization algorithm","volume":"62","author":"Mukhedkar","year":"2019","journal-title":"The Computer Journal"},{"key":"10.3233\/JIFS-231905_ref17","doi-asserted-by":"crossref","first-page":"102961","DOI":"10.1016\/j.adhoc.2022.102961","article-title":"Hybrid optimization enabled trust-based secure routing with deep learning-based attack detection in VANET","volume":"136","author":"Kaur","year":"2022","journal-title":"Ad Hoc Networks"},{"key":"10.3233\/JIFS-231905_ref18","doi-asserted-by":"crossref","first-page":"4995","DOI":"10.1007\/s12652-020-01797-3","article-title":"Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks","volume":"11","author":"Gomathy","year":"2020","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"10.3233\/JIFS-231905_ref19","first-page":"35","article-title":"Biological inspired self-organized secure autonomous routing protocol and secured data assured routing in WSN: Hybrid EHO and MBO approach","author":"Niranjana","year":"2021","journal-title":"International Journal of Communication Systems"},{"key":"10.3233\/JIFS-231905_ref20","doi-asserted-by":"crossref","unstructured":"Rajaram A. and Baskar A. , Hybrid Optimization-Based Multi-Path Routing for Dynamic Cluster-Based MANET, Cybernetics and Systems 2023. https:\/\/doi.org\/10.1080\/01969722.2023.2166249.","DOI":"10.1080\/01969722.2023.2166249"},{"key":"10.3233\/JIFS-231905_ref21","first-page":"33","article-title":"Trust-based secure routing and the prevention of vampire attack in wireless ad hoc sensor network","author":"Sajan","year":"2020","journal-title":"International Journal of Communication Systems"},{"key":"10.3233\/JIFS-231905_ref22","first-page":"33","article-title":"E-TDGO: An encrypted trust-based dolphin glowworm optimization for secure routing in mobile ad hoc network","author":"Mukhedkar","year":"2020","journal-title":"International Journal of Communication Systems"},{"key":"10.3233\/JIFS-231905_ref23","unstructured":"Veerabadrappa K. and Lingareddy S.C. , Secure Routing using Multi-Objective Trust Aware Hybrid Optimization for Wireless Sensor Networks, International Journal of Intelligent Engineering and Systems (2022)."},{"key":"10.3233\/JIFS-231905_ref24","unstructured":"Kumar K.V. and Rajaram A. , Energy efficient and node mobility based data replication algorithm for MANET, International Journal of Computer Science, 2019."},{"key":"10.3233\/JIFS-231905_ref25","first-page":"20","article-title":"Information-Aware Secure Routing in Wireless Sensor Networks","author":"Shi","year":"2019","journal-title":"Sensors"},{"key":"10.3233\/JIFS-231905_ref26","unstructured":"Venkatarao S. and Ananth V. , A Hybrid Optimization Algorithm and Shamir Secret Sharing Based Secure Data Transmission for IoT based WSN, International Journal of Intelligent Engineering and Systems (2021)."},{"key":"10.3233\/JIFS-231905_ref27","unstructured":"Sridevi A.P. and Rajaram A. , Efficient energy based multipathcluster routing protocol for wireless sensor networks, Journalof Theoretical & Applied Information Technology, 68 (2014)."},{"key":"10.3233\/JIFS-231905_ref28","doi-asserted-by":"crossref","unstructured":"Neelakantappa M. and Shaik A. , Secured Routing Protocol for Mobile Ad hoc Networks to Defend Collaborative Black-hole and Gray-hole Attacks by Malicious Nodes, International Journal of Intelligent Engineering and Systems (2018).","DOI":"10.22266\/ijies2018.1031.17"},{"key":"10.3233\/JIFS-231905_ref29","unstructured":"Identifying and Improving the Malicious Behavior of Rushing and Blackhole Attacks using Proposed IDSHSMR Protocol, International Journal of Recent Technology and Engineering (2019)."},{"key":"10.3233\/JIFS-231905_ref30","first-page":"124","article-title":"An Efficient Security Framework for Trusted and Secure Routing in MANET: A Comprehensive Solution","author":"Lakshmi","year":"2022","journal-title":"Wireless Personal Communications"},{"key":"10.3233\/JIFS-231905_ref31","first-page":"1","article-title":"An Improved Hybrid Secure Multipath Routing Protocol for MANET","author":"Srilakshmi","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-231905_ref32","doi-asserted-by":"crossref","unstructured":"Maganti S. and Patnaik M.R. , Metaheuristic Quantum Glowworm Swarm Optimization based Clustering With Secure Routing Protocol for Mobile Adhoc Networks, (2021).","DOI":"10.21203\/rs.3.rs-266082\/v1"}],"updated-by":[{"DOI":"10.3233\/jifs-219433","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T00:00:00Z","timestamp":1724371200000},"record-id":"63514"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-231905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T07:54:33Z","timestamp":1769673273000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-231905"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,4]]},"references-count":32,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.3233\/jifs-231905","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,4]]}}}