{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T07:23:19Z","timestamp":1777706599837,"version":"3.51.4"},"reference-count":26,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2024,5,4]],"date-time":"2024-05-04T00:00:00Z","timestamp":1714780800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems: Applications in Engineering and Technology"],"published-print":{"date-parts":[[2025,7]]},"abstract":"<jats:p>Wireless sensor network (WSN) collect and detect data in real time, but their battery life limits their lifetime. The CH selection process increases network overhead and reduces lifetime, but it considers node processing and energy limitations. To solve that problem this research methodology proposed Multi Objective Energy trust - Aware Optimal Clustering and Secure Routing (MOETAOCSR) protocol. At first, the trust factors such as direct and indirect factors are calculated. Thus, the calculated values are given as input to the SDLSTM to detect the malicious node and normal node. Here, the network deployment process is initially carried out and then the cluster is formed by HWF-FCM. From the clustered sensor nodes, the cluster head is selected using Golden Jackal Siberian Tiger Optimization (GJSTO) approach. Then, the selection of CH the paths are learned by using the Beta Distribution and Scaled Activation Function based Deep Elman Neural Network (BDSAF-DENN) and from the detected paths the optimal paths are selected using the White Shark Optimization (WSO). From the derived path sensed data securely transferred to the BS for further monitoring process using FPCCRSA. The proposed technique is implemented in a MATLAB platform, where its efficiency is assessed using key performance metrics including network lifetime, packet delivery ratio, and delay. Compared to existing models such as EAOCSR, RSA, and Homographic methods, the proposed technique achieves superior results. Specifically, it demonstrates a 0.95 improvement in throughput, 0.8 enhancement in encryption time, and a network lifetime of 7.4.<\/jats:p>","DOI":"10.3233\/jifs-236739","type":"journal-article","created":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T11:16:01Z","timestamp":1715080561000},"page":"163-177","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient malicious node detection by multi-objective energy trust aware hybrid optimization based maximizing lifetime of wireless sensor networks"],"prefix":"10.1177","volume":"49","author":[{"given":"P.","family":"Parthiban","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication Engineering, Nehru Institute of Engineering and Technology, Coimbatore, Tamil Nadu"}]},{"given":"V.S.","family":"Vaisakhi","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Nehru Institute of Engineering and Technology, Coimbatore, Tamil Nadu"}]}],"member":"179","published-online":{"date-parts":[[2024,5,4]]},"reference":[{"key":"e_1_3_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.103037"},{"key":"e_1_3_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-021-10525-7"},{"key":"e_1_3_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2021.101504"},{"key":"e_1_3_1_5_1","doi-asserted-by":"crossref","unstructured":"DineshK.SanthoshS.V.N. Santhosh Kumar Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network International Journal of Information Security (2023) 1\u201325.","DOI":"10.1007\/s10207-023-00737-4"},{"key":"e_1_3_1_6_1","doi-asserted-by":"crossref","unstructured":"KaushikR.SinghV.KumariR. A Secure and Intelligent Approach for Next-Hop Selection Algorithm for Successful Data Transmission in Wireless Network Proceedings of Third International Conference on Sustainable Computing: SUSCOM 2021. Springer Singapore 2022.","DOI":"10.1007\/978-981-16-4538-9_43"},{"key":"e_1_3_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08335-0"},{"key":"e_1_3_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-023-01458-0"},{"key":"e_1_3_1_9_1","unstructured":"RajoriyaM.K.GuptaC.P. Sailfish optimization-based controller selection (SFO-CS) for energy-aware multihop routing in software defined wireless sensor network (SDWSN) International Journal of Informati"},{"key":"e_1_3_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.01.034"},{"key":"e_1_3_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-022-02963-5"},{"key":"e_1_3_1_12_1","doi-asserted-by":"crossref","unstructured":"RajeshB.M.ThanamaniA.S.ChithraB.FinnyBelwinA.LindaSherinA. Adaptive weight butterfly optimization algorithm (AWBOA) based cluster head selection (CHS) and optimized energy efficient cluster based scheduling (OEECS) approach in wireless sensor networks (WSNS) International Journal of System Assurance Engineering and Management (2022) 1\u201314.","DOI":"10.1007\/s13198-022-01726-x"},{"key":"e_1_3_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2022.100610"},{"key":"e_1_3_1_14_1","doi-asserted-by":"crossref","unstructured":"PrathaS.J.AsanambigaiV.MugunthanS.R. A modified whale-dragonfly algorithm and self-adaptive cuckoo search-based clustering strategy for augmenting network lifetime in wireless sensor networks International Journal of Communication Systems (2023) e5482","DOI":"10.1002\/dac.5482"},{"key":"e_1_3_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.5664"},{"key":"e_1_3_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2023.05.018"},{"key":"e_1_3_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7398"},{"key":"e_1_3_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3229964"},{"key":"e_1_3_1_19_1","first-page":"122780","article-title":"An improved levy chaotic particle swarm optimization algorithm for energy-efficient cluster routing scheme in industrial wireless sensor networks","author":"Luo T.","year":"2023","unstructured":"LuoT., et al. An improved levy chaotic particle swarm optimization algorithm for energy-efficient cluster routing scheme in industrial wireless sensor networks, Expert Systems with Applications (2023), 122780.","journal-title":"Expert Systems with Applications"},{"key":"e_1_3_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4708"},{"key":"e_1_3_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108457"},{"key":"e_1_3_1_22_1","first-page":"1","article-title":"Secured wireless sensor networks using hybrid Rivest Shamir Adleman with ant lion optimization algorithm","author":"Khalid Almuzaini K.","year":"2023","unstructured":"Khalid AlmuzainiK., et al.Secured wireless sensor networks using hybrid Rivest Shamir Adleman with ant lion optimization algorithm, Wireless Networks (2023), 1\u201319.","journal-title":"Wireless Networks"},{"key":"e_1_3_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-022-00968-1"},{"key":"e_1_3_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2953889"},{"key":"e_1_3_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2018.2841369"},{"key":"e_1_3_1_26_1","doi-asserted-by":"crossref","unstructured":"SertS.A. et al.An efficient fuzzy path selection approach to mitigate selective forwarding attacks in wireless sensor networks 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE). IEEE 2017","DOI":"10.1109\/FUZZ-IEEE.2017.8015552"},{"key":"e_1_3_1_27_1","doi-asserted-by":"crossref","unstructured":"MazumdarN.OmH. Adistributed fault-tolerant multiobjective clustering algorithm for wireless sensor networks Proceedings of the International Conference on Nanoelectronics Circuits & Communication Systems. Springer Singapore 2017","DOI":"10.1007\/978-981-10-2999-8_10"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems: Applications in Engineering and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-236739","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-236739","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-236739","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:47:17Z","timestamp":1777456037000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-236739"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,4]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["10.3233\/JIFS-236739"],"URL":"https:\/\/doi.org\/10.3233\/jifs-236739","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,4]]}}}