{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T04:34:12Z","timestamp":1725683652521},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T00:00:00Z","timestamp":1624406400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T00:00:00Z","timestamp":1624406400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Wireless Inf Networks"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s10776-021-00523-w","type":"journal-article","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T15:03:53Z","timestamp":1624460633000},"page":"344-361","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An Efficient Trust-Based Routing Scheme Against Malicious Communication in MANET"],"prefix":"10.1007","volume":"28","author":[{"given":"Ankita A.","family":"Mahamune","sequence":"first","affiliation":[]},{"given":"M. M.","family":"Chandane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,23]]},"reference":[{"key":"523_CR1","doi-asserted-by":"publisher","first-page":"35302","DOI":"10.1109\/ACCESS.2019.2903150","volume":"7","author":"T Li","year":"2019","unstructured":"Li, T., Ma, J., Pei, Q., Song, H., Shen, Y., Sun, C.: DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification. IEEE Access 7, 35302\u201335316 (2019).","journal-title":"IEEE Access"},{"key":"523_CR2","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1007\/s12083-019-00815-2","volume":"13","author":"J Wilson","year":"2020","unstructured":"Wilson, J., Subramaniam, K.: Improved multi objective data transmission using conventional route selection algorithm in mobile ad hoc network. Peer-to-Peer Networking and Applications, Springer 13, 1091\u20131101 (2020).","journal-title":"Peer-to-Peer Networking and Applications, Springer"},{"key":"523_CR3","first-page":"1","volume":"40","author":"S Du","year":"2020","unstructured":"Du, S., Hou, J., Song, S., Song, Y., Zhu, Y.: A geographical hierarchy greedy routing strategy for vehicular big data communications over millimeter wave. Physical Communication, Elsevier 40, 1\u20139 (2020).","journal-title":"Physical Communication, Elsevier"},{"key":"523_CR4","first-page":"1","volume":"25","author":"D Manivannan","year":"2020","unstructured":"Manivannan, D., Moni, S.S., Zeadally, S.: Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs). Vehicular Communications, Elsevier 25, 1\u201318 (2020)","journal-title":"Vehicular Communications, Elsevier"},{"key":"523_CR5","doi-asserted-by":"publisher","first-page":"3169","DOI":"10.1007\/s11276-019-02129-w","volume":"26","author":"W Fang","year":"2020","unstructured":"Fang, W., Zhang, W., Chen, W., Liu, Y., Tang, C.: TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing. Wireless Networks, Springer 26, 3169\u20133182 (2020).","journal-title":"Wireless Networks, Springer"},{"key":"523_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2020.102148","volume":"103","author":"TK Saini","year":"2020","unstructured":"Saini, T.K., Sharma, S.C.: Recent advancements, review analysis, and extensions of the aodv with the illustration of the applied concept. Ad Hoc Networks, Elsevier 103, 1\u201320 (2020).","journal-title":"Ad Hoc Networks, Elsevier"},{"key":"523_CR7","doi-asserted-by":"publisher","first-page":"74849","DOI":"10.1109\/ACCESS.2019.2916318","volume":"7","author":"H Kojima","year":"2019","unstructured":"Kojima, H., Yanai, N., Cruz, J.P.: ISDSRC: Improving the security and availability of secure routing protocol. IEEE Access 7, 74849\u201374868 (2019).","journal-title":"IEEE Access"},{"key":"523_CR8","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/s10776-020-00481-9","volume":"27","author":"EEA Pereira","year":"2020","unstructured":"Pereira, E.E.A., Leonardo, E.J.: Performance Evaluation of DSR for MANETs with Channel Fading. International Journal of Wireless Information Networks, Springer 27, 494\u2013502 (2020).","journal-title":"International Journal of Wireless Information Networks, Springer"},{"key":"523_CR9","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.comcom.2020.06.030","volume":"160","author":"A Sharma","year":"2020","unstructured":"Sharma, A., Pilli, E.S., Mazumdar, A.P., Gera, P.: Towards trustworthy internet of things: A survey on trust management applications and schemes. Computer Communications, Elsevier 160, 475\u2013493 (2020)","journal-title":"Computer Communications, Elsevier"},{"key":"523_CR10","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.comcom.2019.10.034","volume":"150","author":"RK Chahal","year":"2020","unstructured":"Chahal, R.K., Kumar, N., Batra, S.: Trust management in social internet of things: A taxonomy, open issues, and challenges. Computer Communications, Elsevier 150, 13\u201346 (2020).","journal-title":"Computer Communications, Elsevier"},{"issue":"1","key":"523_CR11","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/TMC.2018.2828814","volume":"18","author":"RJ Cai","year":"2019","unstructured":"Cai, R.J., Li, X.J., Chong, P.H.J.: An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs. IEEE Transactions on Mobile Computing 18(1), 42\u201355 (2019).","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"523_CR12","doi-asserted-by":"publisher","first-page":"6211","DOI":"10.1007\/s13369-020-04461-2","volume":"45","author":"SN Mahapatra","year":"2020","unstructured":"Mahapatra, S.N., Singh, B.K., Kumar, V.: A survey on secure transmission in internet of things: Taxonomy, recent techniques, research requirements, and challenges. Arabian Journal for Science and Engineering, Springer 45, 6211\u20136240 (2020).","journal-title":"Arabian Journal for Science and Engineering, Springer"},{"key":"523_CR13","first-page":"1","volume":"53","author":"MA Qurashi","year":"2020","unstructured":"Qurashi, M.A., Angelopoulos, C.M., Katos, V.: An architecture for resilient intrusion detection in ad-hoc networks. Journal of Information Security and Applications, Elsevier 53, 1\u201312 (2020).","journal-title":"Journal of Information Security and Applications, Elsevier"},{"key":"523_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2019.102021","volume":"97","author":"H Riasudheen","year":"2020","unstructured":"Riasudheen, H., Selvamani, K., Mukherjee, S., Divyasree, I.: An efficient energy-aware routing scheme for cloud-assisted manets in 5G. Ad Hoc Networks, Elsevier 97, 1\u201322 (2020).","journal-title":"Ad Hoc Networks, Elsevier"},{"key":"523_CR15","doi-asserted-by":"publisher","first-page":"21380","DOI":"10.1109\/ACCESS.2020.2969447","volume":"8","author":"H Xu","year":"2020","unstructured":"Xu, H., et al.: Trust-based probabilistic broadcast scheme for mobile ad hoc networks. IEEE Access 8, 21380\u201321392 (2020).","journal-title":"IEEE Access"},{"key":"523_CR16","doi-asserted-by":"publisher","first-page":"4173","DOI":"10.1007\/s11276-020-02326-y","volume":"26","author":"P Theerthagiri","year":"2020","unstructured":"Theerthagiri, P.: FUCEM: futuristic cooperation evaluation model using markov process for evaluating node reliability and link stability in mobile ad hoc network. Wireless Networks, Springer 26, 4173\u20134188 (2020).","journal-title":"Wireless Networks, Springer"},{"key":"523_CR17","first-page":"1","volume":"52","author":"N Djedjig","year":"2020","unstructured":"Djedjig, N., Tandjaoui, D., Medjek, F., Romdhani, I.: Trust-aware and cooperative routing protocol for iot security. Journal of Information Security and Applications, Elsevier 52, 1\u201317 (2020).","journal-title":"Journal of Information Security and Applications, Elsevier"},{"key":"523_CR18","first-page":"1","volume":"30","author":"RH Jhaveri","year":"2016","unstructured":"Jhaveri, R.H., Patel, N.M.: Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks. International Journal of Communication Systems, Wiley 30, 1\u201324 (2016).","journal-title":"International Journal of Communication Systems, Wiley"},{"key":"523_CR19","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/s41870-018-0188-y","volume":"11","author":"AM Desai","year":"2018","unstructured":"Desai, A.M., Jhaveri, R.H.: Secure routing in mobile Ad hoc networks: a predictive approach. International Journal of Information Technology volume, Springer 11, 345\u2013356 (2018).","journal-title":"International Journal of Information Technology volume, Springer"},{"key":"523_CR20","doi-asserted-by":"crossref","unstructured":"Jhaveri, R.H., Desai, A., Patel, A., Zhong, Y.: A Sequence Number Prediction Based Bait Detection Scheme to Mitigate Sequence Number Attacks in MANETs. Security and Communication Networks, Wiley-Hindawi, 1\u201313 (2018).","DOI":"10.1155\/2018\/3210207"},{"key":"523_CR21","doi-asserted-by":"publisher","first-page":"80","DOI":"10.23919\/SAIEE.2017.8531629","volume":"108","author":"E Ochola","year":"2017","unstructured":"Ochola, E., Mejaele, L., Eloff, M., van der Poll, J.: Manet Reactive Routing Protocols Node Mobility Variation Effect in Analysing the Impact of Black Hole Attack. SAIEE Africa Research Journal 108, 80\u201392 (2017).","journal-title":"SAIEE Africa Research Journal"},{"key":"523_CR22","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TPDS.2013.116","volume":"25","author":"IR Chen","year":"2014","unstructured":"Chen, I.R., Bao, F., Chang, M., Cho, J.H.: Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing. IEEE Transactions On Parallel and Distributed Systems 25, 1200\u20131210 (2014).","journal-title":"IEEE Transactions On Parallel and Distributed Systems"},{"key":"523_CR23","unstructured":"EXata: Exata network emulator software (2021). https:\/\/www.scalable-networks.com\/exata-network-emulator-software"},{"key":"523_CR24","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1007\/s10776-020-00492-6","volume":"27","author":"O Moradipour","year":"2020","unstructured":"Moradipour, O., Fathi, M.: An Anti-Gray Hole Attack Scheme in Mobile Ad Hoc Network. International Journal of Wireless Information Networks, Springer 27, 558\u2013567 (2020)","journal-title":"International Journal of Wireless Information Networks, Springer"},{"key":"523_CR25","doi-asserted-by":"publisher","first-page":"18409","DOI":"10.1109\/ACCESS.2019.2896001","volume":"7","author":"T Poongodi","year":"2019","unstructured":"Poongodi, T., Khan, M.S., Patan, R., Gandomi, A.H., Balusamy, B.: Robust defense scheme against selective drop attack in wireless ad hoc networks. IEEE Access 7, 18409\u201318419 (2019).","journal-title":"IEEE Access"},{"key":"523_CR26","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/s10776-017-0373-0","volume":"25","author":"BS Bhati","year":"2018","unstructured":"Bhati, B.S., Venkataram, P.: Performance Analysis of Privacy Protection System During Data Transfer in MANETs. International Journal of Wireless Information Networks, Springer 25, 30\u201343 (2018).","journal-title":"International Journal of Wireless Information Networks, Springer"},{"key":"523_CR27","first-page":"1","volume":"51","author":"E Elmahdi","year":"2020","unstructured":"Elmahdi, E., Yoo, S.M., Sharshembiev, K.: Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks. Journal of Information Security and Applications, Elsevier 51, 1\u201310 (2020).","journal-title":"Journal of Information Security and Applications, Elsevier"},{"issue":"14","key":"523_CR28","first-page":"1833","volume":"119","author":"R Bai","year":"2018","unstructured":"Bai, R., Singhal, M.: A Study on Different Security Attacks Associated With Routing In Mobile Ad Hoc Networks. International Journal of Pure and Applied Mathematics 119(14), 1833\u20131841 (2018).","journal-title":"International Journal of Pure and Applied Mathematics"},{"key":"523_CR29","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/s10776-018-0418-z","volume":"26","author":"P Ndajah","year":"2019","unstructured":"Ndajah, P., Matine, A.O., Hounkonnou, M.N.: Black Hole Attack Prevention in Wireless Peer-to-Peer Networks: A New Strategy. International Journal of Wireless Information Networks, Springer 26, 48\u201360 (2019).","journal-title":"International Journal of Wireless Information Networks, Springer"},{"key":"523_CR30","doi-asserted-by":"publisher","first-page":"95197","DOI":"10.1109\/ACCESS.2019.2928804","volume":"7","author":"AM El-Semary","year":"2019","unstructured":"El-Semary, A.M., Diab, H.: BP-AODV: Blackhole protected aodv routing protocol for MANETs based on chaotic map. IEEE Access 7, 95197\u201395211 (2019).","journal-title":"IEEE Access"}],"container-title":["International Journal of Wireless Information Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-021-00523-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10776-021-00523-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-021-00523-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T21:03:05Z","timestamp":1629925385000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10776-021-00523-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,23]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["523"],"URL":"https:\/\/doi.org\/10.1007\/s10776-021-00523-w","relation":{},"ISSN":["1068-9605","1572-8129"],"issn-type":[{"value":"1068-9605","type":"print"},{"value":"1572-8129","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,23]]},"assertion":[{"value":"2 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}