{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T20:34:27Z","timestamp":1726346067856},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2018,3,14]],"date-time":"2018-03-14T00:00:00Z","timestamp":1520985600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s10586-017-1622-9","type":"journal-article","created":{"date-parts":[[2018,3,14]],"date-time":"2018-03-14T08:04:41Z","timestamp":1521014681000},"page":"1313-1328","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":61,"title":["Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust"],"prefix":"10.1007","volume":"22","author":[{"given":"Deepak C.","family":"Mehetre","sequence":"first","affiliation":[]},{"given":"S. Emalda","family":"Roslin","sequence":"additional","affiliation":[]},{"given":"Sanjeev J.","family":"Wagh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,14]]},"reference":[{"key":"1622_CR1","first-page":"17","volume":"1","author":"A Kellner","year":"2012","unstructured":"Kellner, A., Alfandi, O., Alfandi, O., Hogrefe, D.: A survey on measures for secure routing in wireless sensor networks. Proc. Int. J. Sens. Netw. Data Commun. 1, 17 (2012)","journal-title":"Proc. Int. J. Sens. Netw. Data Commun."},{"key":"1622_CR2","unstructured":"Dewal, P., Narula, G.S., Jain, V.: Detection and prevention of black hole attacks in cluster based wireless sensor networks. In: Proceedings in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, pp. 3399\u20133403 (2016)"},{"key":"1622_CR3","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings in the First IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA, pp. 113\u2013127 (2003)"},{"key":"1622_CR4","doi-asserted-by":"crossref","unstructured":"Alajmi, N.M., Elleithy, K.: A new approach for detecting and monitoring of selective forwarding attack in wireless sensor networks. In: Proceedings in 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), Farmingdale, NY, USA, pp. 1\u20136 (2016)","DOI":"10.1109\/LISAT.2016.7494104"},{"issue":"5","key":"1622_CR5","first-page":"260","volume":"8","author":"Y Pavan Kumar Guptha","year":"2017","unstructured":"Pavan Kumar Guptha, Y., Madhu, M.: Improving security and detecting black hole attack in wireless sensor network. Int. J. Prof. Eng. Stud. 8(5), 260\u2013265 (2017)","journal-title":"Int. J. Prof. Eng. Stud."},{"issue":"3","key":"1622_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijasuc.2010.1301","volume":"1","author":"M Momani","year":"2010","unstructured":"Momani, M., Challa, S.: Survey of trust models in different network domains. IJASUC 1(3), 1\u201319 (2010)","journal-title":"IJASUC"},{"issue":"2","key":"1622_CR7","first-page":"182","volume":"11","author":"R Sathishkumar","year":"2016","unstructured":"Sathishkumar, R., Ramesh, C.: A modified method for preventing black-hole attack in mobile ad hoc networks. J. Eng. Appl. Sci. 11(2), 182\u2013191 (2016)","journal-title":"J. Eng. Appl. Sci."},{"issue":"4","key":"1622_CR8","first-page":"653","volume":"2","author":"A Jain","year":"2012","unstructured":"Jain, A.: Trust based routing mechanism against black hole attack using AOMDV-IDS system in MANET format. Int. J. Emerg. Technol. Adv. Eng. 2(4), 653\u2013661 (2012)","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"issue":"10","key":"1622_CR9","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/MC.2003.1236475","volume":"36","author":"H Chan","year":"2003","unstructured":"Chan, H., Perrg, A.: Security and privacy in sensor networks. Computer 36(10), 103\u2013105 (2003)","journal-title":"Computer"},{"issue":"4","key":"1622_CR10","doi-asserted-by":"publisher","first-page":"1392","DOI":"10.1016\/j.adhoc.2010.11.005","volume":"11","author":"T Zhu","year":"2013","unstructured":"Zhu, T., Zhong, Z., He, T., Zhang, Z.-L.: Energy synchronized computing for sustainable sensor networks. Ad Hoc Netw. 11(4), 1392\u20131404 (2013)","journal-title":"Ad Hoc Netw."},{"key":"1622_CR11","doi-asserted-by":"publisher","first-page":"33","DOI":"10.5815\/ijwmt.2012.02.06","volume":"2","author":"WZ Khan","year":"2012","unstructured":"Khan, W.Z., Yang, X., Aalsalem, M.Y., Arshada, Q.: The selective forwarding attack in sensor networks: detections and countermeasures. Int. J. Wirel. Microw. Technol. 2, 33\u201344 (2012)","journal-title":"Int. J. Wirel. Microw. Technol."},{"key":"1622_CR12","doi-asserted-by":"crossref","unstructured":"Tiwari, M., Arya, K.V., Choudhari, R., Choudhary, K.S.: Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information. In: Proceedings in Fourth International IEEE Conference on Computer Sciences and Convergence Information Technology, Seoul, South Korea, pp. 824\u2013828 (2009)","DOI":"10.1109\/ICCIT.2009.290"},{"issue":"Supplement 2","key":"1622_CR13","first-page":"118","volume":"17","author":"T Bin","year":"2010","unstructured":"Bin, T., Xian, Y.Y., Dong, L., Qi, L., Xin, Y.: A security framework for wireless sensor networks. J. Chin. Univ. Posts Telecommun. 17(Supplement 2), 118\u2013122 (2010)","journal-title":"J. Chin. Univ. Posts Telecommun."},{"issue":"11","key":"1622_CR14","first-page":"3792","volume":"3","author":"D Latha","year":"2014","unstructured":"Latha, D., Palanivel, K.: Secure routing through trusted nodes in wireless sensor networks a survey. Proc. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 3(11), 3792\u20133799 (2014)","journal-title":"Proc. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET)"},{"issue":"9","key":"1622_CR15","doi-asserted-by":"publisher","first-page":"2013","DOI":"10.1109\/TIFS.2016.2570740","volume":"11","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Dong, M., Ota, K., Liu, A.: Active Trust: secure and trustable routing in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 11(9), 2013\u20132027 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1622_CR16","doi-asserted-by":"crossref","unstructured":"Das, S., Barani, S., Wagh, S., Sonavane, S.S.: Energy efficient and trustable routing protocol for wireless sensor networks based on genetic algorithm (E2TRP). In: Proceedings in IEEE International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), Pune, India, pp. 154\u2013159 (2016)","DOI":"10.1109\/ICACDOT.2016.7877569"},{"key":"1622_CR17","doi-asserted-by":"crossref","unstructured":"Sharmila, S., Umamaheswari, G.: Detection of sinkhole attack in wireless sensor networks using message digest algorithms. In: Proceedings in 2011 International Conference on Process Automation, Control and Computing, Coimbatore, India, pp. 1\u20136 (2011)","DOI":"10.1109\/PACC.2011.5978973"},{"key":"1622_CR18","doi-asserted-by":"crossref","unstructured":"Geethu P.C., Mohammed, A.R.: Defense mechanism against selective forwarding attack in wire-less sensor networks. In: Proceedings in 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, India, pp. 1\u20134 (2013)","DOI":"10.1109\/ICCCNT.2013.6726833"},{"key":"1622_CR19","doi-asserted-by":"crossref","unstructured":"Motamedi, M., Yazdani, N.: Detection of black hole attack in wireless sensor network using uav. In: Proceedings in 2015 7th Conference on Information and Knowledge Technology (IKT), Urmia, Iran, pp. 1\u20135 (2015)","DOI":"10.1109\/IKT.2015.7288749"},{"issue":"5","key":"1622_CR20","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.1007\/s11276-015-1039-4","volume":"22","author":"R Kumar","year":"2016","unstructured":"Kumar, R., Kumar, D.: Multi-objective fractional artificial bee colony algorithm to energy aware routing protocol in wireless sensor network. Wirel. Netw. 22(5), 1461\u20131474 (2016)","journal-title":"Wirel. Netw."},{"key":"1622_CR21","unstructured":"Sanzgiri, K., Dahill, B., Levine, B., Shields, C., Belding-Royer, E.: A secure routing protocol for ad hoc networks. In: Proceedings of 10th IEEE International Conference on Network Protocols, Paris, France (2002)"},{"issue":"1","key":"1622_CR22","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s00366-011-0241-y","volume":"29","author":"HG Amir","year":"2013","unstructured":"Amir, H.G., Yang, X.-S., Amir, H.A.: Cuckoo search algorithm: a metaheuristic approach to solve structural optimization problems. Eng. Comput. 29(1), 17\u201335 (2013)","journal-title":"Eng. Comput."},{"key":"1622_CR23","doi-asserted-by":"crossref","unstructured":"Yang, X.-S., Deb, S.: Cuckoo search via Levy flights. In: Proceedings of the World Congress in Nature & Biologically Inspired Computing, Coimbatore, India, pp. 210\u2013214 (2009)","DOI":"10.1109\/NABIC.2009.5393690"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1622-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-1622-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1622-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T14:53:19Z","timestamp":1565621599000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-1622-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,14]]},"references-count":23,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["1622"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-1622-9","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,14]]},"assertion":[{"value":"13 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}