{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:11:22Z","timestamp":1763341882618,"version":"3.45.0"},"reference-count":33,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.061486","type":"journal-article","created":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T03:43:27Z","timestamp":1741059807000},"page":"2449-2479","source":"Crossref","is-referenced-by-count":0,"title":["A Tolerant and Energy Optimization Approach for Internet of Things to Enhance the QoS Using Adaptive Blended Marine Predators Algorithm"],"prefix":"10.32604","volume":"83","author":[{"given":"Vijaya Krishna","family":"Akula","sequence":"first","affiliation":[]},{"given":"Tan Kuan","family":"Tak","sequence":"additional","affiliation":[]},{"given":"Pravin Ramdas","family":"Kshirsagar","sequence":"additional","affiliation":[]},{"given":"Shrikant Vijayrao","family":"Sonekar","sequence":"additional","affiliation":[]},{"given":"Gopichand","family":"Ginnela","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/TNSE.2021.3057881","article-title":"ITCN: an intelligent trust collaboration network system in IoT","volume":"9","author":"Guo","year":"2022","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/978-981-10-6747-1_15","author":"Ahlawat","year":"2018","journal-title":"Nature inspired computing"},{"key":"ref3","series-title":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics (SACI)","first-page":"121","article-title":"Sybil attack type detection in wireless sensor networks based on received signal strength indicator detection scheme","author":"Marian","year":"2015 May 21\u201323"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MCE.2017.2776459","article-title":"The blockchain as a decentralized security framework [future directions]","volume":"7","author":"Puthal","year":"2018","journal-title":"IEEE Consum Electron Mag"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"2877","DOI":"10.1109\/TII.2021.3110734","article-title":"An intelligent and trust UAV-assisted code dissemination 5G system for industrial Internet-of-things","volume":"18","author":"Liang","year":"2022","journal-title":"IEEE Trans Ind Inform"},{"key":"ref6","first-page":"1","article-title":"Improved energy efficiency using meta-heuristic approach for energy harvesting enabled IoT network","volume":"50","author":"Rekha","year":"2023","journal-title":"Kuwait J Sci"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"76546","DOI":"10.1109\/ACCESS.2018.2882853","article-title":"MEQSA-OLSRv2: a multicriteria-based hybrid multipath protocol for energy-efficient and QoS-aware data routing in MANET-WSN convergence scenarios of IoT","volume":"6","author":"Jabbar","year":"2018","journal-title":"IEEE Access"},{"key":"ref8","series-title":"2019 3rd International Conference on Electronics, Communication and Aerospace Technology (ICECA)","first-page":"857","article-title":"An optimal QoS-aware multipath routing protocol for IoT based wireless sensor networks","author":"Jaiswal","year":"2019 Jun 12\u201314"},{"key":"ref9","series-title":"Proceedings of the International MultiConference of Engineers and Computer Scientists 2016","article-title":"Routing issues in Internet of Things: a survey","volume":"Vol. I, IMECS2016","author":"Dhumane","year":"16\u201318 Mar. 2016"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"155014772096435","DOI":"10.1177\/1550147720964358","article-title":"Trust-based energy-efficient routing protocol for Internet of Things-based sensor networks","volume":"16","author":"Ilyas","year":"2020","journal-title":"Int J Distrib Sens Netw"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/JIOT.2017.2779180","article-title":"SDN-based data transfer security for Internet of Things","volume":"5","author":"Liu","year":"2018","journal-title":"IEEE Internet Things J"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1201\/9780849379253-20","author":"Walters","year":"2007","journal-title":"Security in distributed, grid, mobile, and pervasive computing"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2016\/2081902","article-title":"Wireless sensor networks formation: approaches and techniques","volume":"2016","author":"Carlos-Mancilla","year":"2016","journal-title":"J Sens"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1109\/JIOT.2017.2725238","article-title":"LASeR: lightweight authentication and secured routing for NDN IoT in smart cities","volume":"5","author":"Mick","year":"2018","journal-title":"IEEE Internet Things J"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1990","DOI":"10.1109\/JIOT.2022.3142026","article-title":"Energy-efficiency optimization for D2D communications underlaying UAV-assisted industrial IoT networks with SWIPT","volume":"10","author":"Su","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref16","first-page":"1849","article-title":"A novel duty cycle based cross layer model for energy efficient routing in IWSN based IoT application","volume":"16","author":"Singh","year":"2022","journal-title":"KSII Trans Internet Inf Syst"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","article-title":"Internet of Things: vision, applications and research challenges","volume":"10","author":"Miorandi","year":"2012","journal-title":"Ad Hoc Netw"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/JOEUC.2020070101","article-title":"A novel trust model for secure group communication in distributed computing","volume":"32","author":"Ramu","year":"2020","journal-title":"J Organ End User Comput"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"7901587","DOI":"10.1155\/2022\/7901587","article-title":"Modern energy optimization approach for efficient data communication in IoT-based wireless sensor networks","volume":"2022","author":"Sathish Kumar","year":"2022","journal-title":"Wirel Commun Mob Comput"},{"key":"ref20","first-page":"346","article-title":"MACR: a novel meta-heuristic approach to optimize clustering and routing in IoT-based WSN","volume":"12","author":"Pedditi","year":"2023","journal-title":"Int J Intell Syst Appl Eng"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"233","DOI":"10.32604\/iasc.2021.016405","article-title":"Energy aware clustering with multihop routing algorithm for wireless sensor networks","volume":"29","author":"Daniel","year":"2021","journal-title":"Intell Autom Soft Comput"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"2840","DOI":"10.1049\/iet-com.2019.1005","article-title":"Grid clustering and fuzzy reinforcement-learning based energy-efficient data aggregation scheme for distributed WSN","volume":"14","author":"Sanjay Gandhi","year":"2020","journal-title":"IET Commun"},{"key":"ref23","first-page":"3033","article-title":"Energy efficiency and network lifetime optimization with adaptive power control for IoT networks","volume":"20","author":"Ramesh","year":"2024","journal-title":"J Electr Syst"},{"key":"ref24","series-title":"2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","first-page":"1","article-title":"A mean-field framework for energy-efficient power control in massive IoT environments","author":"Nadif","year":"2019 Sep 8\u201311"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"199829","DOI":"10.1109\/ACCESS.2020.3035181","article-title":"Dynamic energy efficient resource allocation strategy for load balancing in fog environment","volume":"8","author":"Rehman","year":"2020","journal-title":"IEEE Access"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"2094","DOI":"10.1109\/JIOT.2018.2823000","article-title":"DEBTS: delay energy balanced task scheduling in homogeneous fog networks","volume":"5","author":"Yang","year":"2018","journal-title":"IEEE Internet Things J"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1104","DOI":"10.3390\/electronics12051104","article-title":"An optimized, dynamic, and efficient load-balancing framework for resource management in the Internet of Things (IoT) environment","volume":"12","author":"Shuaib","year":"2023","journal-title":"Electronics"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"5349","DOI":"10.3390\/s23115349","article-title":"Load balancing using artificial intelligence for cloud-enabled Internet of everything in healthcare domain","volume":"23","author":"Aqeel","year":"2023","journal-title":"Sensors"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1109\/JSAC.2023.3345403","article-title":"SGPL: an intelligent game-based secure collaborative communication scheme for metaverse over 5G and beyond networks","volume":"42","author":"Chen","year":"2024","journal-title":"IEEE J Select Areas Commun"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"2357","DOI":"10.1109\/TCCN.2024.3400820","article-title":"Adaptive compression offloading and resource allocation for edge vision computing","volume":"10","author":"Xiao","year":"2024","journal-title":"IEEE Trans Cogn Commun Netw"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.comcom.2021.12.015","article-title":"Graph-based deep learning for communication networks: a survey","volume":"185","author":"Jiang","year":"2022","journal-title":"Comput Commun"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"9239","DOI":"10.3390\/su16219239","article-title":"Graph neural networks for routing optimization: challenges and opportunities","volume":"16","author":"Jiang","year":"2024","journal-title":"Sustainability"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"113377","DOI":"10.1016\/j.eswa.2020.113377","article-title":"Marine predators algorithm: a nature-inspired metaheuristic","volume":"152","author":"Faramarzi","year":"2020","journal-title":"Expert Syst Appl"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-2\/TSP_CMC_61486\/TSP_CMC_61486.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:06:51Z","timestamp":1763341611000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n2\/60556"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":33,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.061486","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}