{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T11:50:48Z","timestamp":1723031448292},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,6,29]],"date-time":"2016-06-29T00:00:00Z","timestamp":1467158400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1007\/s11276-016-1320-1","type":"journal-article","created":{"date-parts":[[2016,6,29]],"date-time":"2016-06-29T08:29:29Z","timestamp":1467188969000},"page":"173-194","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Design of efficient lightweight strategies to combat DoS attack in delay tolerant network routing"],"prefix":"10.1007","volume":"24","author":[{"given":"Sujoy","family":"Saha","sequence":"first","affiliation":[]},{"given":"Subrata","family":"Nandi","sequence":"additional","affiliation":[]},{"given":"Rohit","family":"Verma","sequence":"additional","affiliation":[]},{"given":"Satadal","family":"Sengupta","sequence":"additional","affiliation":[]},{"given":"Kartikeya","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Vivek","family":"Sinha","sequence":"additional","affiliation":[]},{"given":"Sajal K.","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,29]]},"reference":[{"issue":"3","key":"1320_CR1","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/TMC.2003.1233531","volume":"2","author":"C Bettstetter","year":"2003","unstructured":"Bettstetter, C., Resta, G., & Santi, P. (2003). The node distribution of the random waypoint mobility model for wireless ad hoc networks. Mobile Computing, IEEE Transactions on, 2(3), 257\u2013269.","journal-title":"Mobile Computing, IEEE Transactions on"},{"key":"1320_CR2","first-page":"1","volume":"6","author":"J Burgess","year":"2006","unstructured":"Burgess, J., Gallagher, B., Jensen, D., & Levine, B. N. (2006). Maxprop: Routing for vehicle-based disruption-tolerant networks. INFOCOM, 6, 1\u201311.","journal-title":"INFOCOM"},{"key":"1320_CR3","doi-asserted-by":"crossref","unstructured":"Chuah, M., Yang, P., & Han, J. (2007). A ferry-based intrusion detection scheme for sparsely connected ad hoc networks. In Mobile and Ubiquitous Systems: Networking & Services, 2007. MobiQuitous 2007. Fourth Annual International Conference on (pp. 1\u20138). IEEE.","DOI":"10.1109\/MOBIQ.2007.4451068"},{"key":"1320_CR4","doi-asserted-by":"publisher","unstructured":"Dvir, A., & Vasilakos, A. V. (2010). Backpressure-based routing protocol for DTNs. In Proceedings of the ACM SIGCOMM 2010 Conference, SIGCOMM \u201910 (pp. 405\u2013406). New York, NY: ACM. doi:\n 10.1145\/1851182.1851233\n \n .","DOI":"10.1145\/1851182.1851233"},{"key":"1320_CR5","unstructured":"E-one for security. \n http:\/\/www.nitdgp.ac.in\/MCN-RG\/eONE\/security\/security.html\n \n ."},{"key":"1320_CR6","doi-asserted-by":"crossref","unstructured":"Fall, K. (2003). A delay-tolerant network architecture for challenged internets. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (pp. 27\u201334). ACM.","DOI":"10.1145\/863955.863960"},{"key":"1320_CR7","doi-asserted-by":"crossref","unstructured":"Guo, Y., Schildt, S., & Wolf, L. (2013). Detecting blackhole and greyhole attacks in vehicular delay tolerant networks. In Communication Systems and Networks (COMSNETS), 2013 Fifth International Conference on (pp. 1\u20137). IEEE.","DOI":"10.1109\/COMSNETS.2013.6465569"},{"issue":"8","key":"1320_CR8","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481\u20132501. doi:\n 10.1007\/s11276-014-0761-7\n \n .","journal-title":"Wireless Networks"},{"key":"1320_CR9","doi-asserted-by":"crossref","unstructured":"Ker\u00e4nen, A., Ott, J., & K\u00e4rkk\u00e4inen, T. (2009). The one simulator for dtn protocol evaluation. In Proceedings of the 2nd International Conference on Simulation Tools and Techniques (p. 55). Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST).","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"1320_CR10","doi-asserted-by":"crossref","unstructured":"Li, F., Wu, J., & Srinivasan, A. (2009). Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets. In INFOCOM 2009, IEEE (pp. 2428\u20132436). IEEE.","DOI":"10.1109\/INFCOM.2009.5062170"},{"key":"1320_CR11","doi-asserted-by":"crossref","unstructured":"Li, Q., Zhu, S., & Cao, G. (2010). Routing in socially selfish delay tolerant networks. In INFOCOM, 2010 Proceedings IEEE (pp. 1\u20139). IEEE.","DOI":"10.1109\/INFCOM.2010.5462138"},{"issue":"3","key":"1320_CR12","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/961268.961272","volume":"7","author":"A Lindgren","year":"2003","unstructured":"Lindgren, A., Doria, A., & Schel\u00e9n, O. (2003). Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Computing and Communications Review, 7(3), 19\u201320.","journal-title":"ACM SIGMOBILE Mobile Computing and Communications Review"},{"issue":"3","key":"1320_CR13","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1109\/TIFS.2013.2296437","volume":"9","author":"B Liu","year":"2014","unstructured":"Liu, B., Bi, J., & Vasilakos, A. V. (2014). Toward incentivizing anti-spoofing deployment. Information Forensics and Security, IEEE Transactions on, 9(3), 436\u2013450.","journal-title":"Information Forensics and Security, IEEE Transactions on"},{"key":"1320_CR14","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1016\/j.ins.2015.08.019","volume":"327","author":"J Liu","year":"2016","unstructured":"Liu, J., Li, Y., Wang, H., Jin, D., Su, L., Zeng, L., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288\u2013299. doi:\n 10.1016\/j.ins.2015.08.019\n \n .","journal-title":"Information Sciences"},{"issue":"4","key":"1320_CR15","doi-asserted-by":"crossref","first-page":"1483","DOI":"10.1109\/TWC.2010.04.090557","volume":"9","author":"R Lu","year":"2010","unstructured":"Lu, R., Lin, X., Zhu, H., Shen, X. S., & Preiss, B. (2010). Pi: A practical incentive protocol for delay tolerant networks. Wireless Communications, IEEE Transactions on, 9(4), 1483\u20131493.","journal-title":"Wireless Communications, IEEE Transactions on"},{"key":"1320_CR16","doi-asserted-by":"crossref","unstructured":"Ning, T., Yang, Z., Xie, X., & Wu, H. (2011). Incentive-aware data dissemination in delay-tolerant mobile networks. In Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2011 8th Annual IEEE Communications Society Conference on (pp. 539\u2013547). IEEE.","DOI":"10.1109\/SAHCN.2011.5984940"},{"key":"1320_CR17","doi-asserted-by":"crossref","unstructured":"Ren, Y., Chuah, M. C., Yang, J., & Chen, Y. (2010). Muton: Detecting malicious nodes in disruption-tolerant networks. In Wireless Communications and Networking Conference (WCNC), 2010 IEEE (pp. 1\u20136). IEEE.","DOI":"10.1109\/WCNC.2010.5506574"},{"issue":"5","key":"1320_CR18","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MWC.2010.5601956","volume":"17","author":"Y Ren","year":"2010","unstructured":"Ren, Y., Chuah, M. C., Yang, J., & Chen, Y. (2010). Detecting wormhole attacks in delay-tolerant networks [security and privacy in emerging wireless networks]. Wireless Communications, IEEE, 17(5), 36\u201342.","journal-title":"Wireless Communications, IEEE"},{"key":"1320_CR19","doi-asserted-by":"publisher","unstructured":"Saha, S., Nandi, S., Paul, P. S., Shah, V. K., Roy, A., & Das, S. K. (2015). Designing delay constrained hybrid ad hoc network infrastructure for post-disaster communication. Ad Hoc Networks, 25 (Part B), 406\u2013429. doi:\n 10.1016\/j.adhoc.2014.08.009\n \n . \n http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1570870514001802\n \n . New Research Challenges in Mobile, Opportunistic and Delay-Tolerant NetworksEnergy-Aware Data Centers: Architecture, Infrastructure, and Communication.","DOI":"10.1016\/j.adhoc.2014.08.009"},{"key":"1320_CR20","doi-asserted-by":"crossref","unstructured":"Saha, S., Verma, R., Sengupta, S., Mishra, V., & Nandi, S. (2012). SRSnF: a strategy for secured routing in spray and focus routing protocol for DTN. In Advances in Computing and Information Technology (pp. 159\u2013169). Springer.","DOI":"10.1007\/978-3-642-31513-8_17"},{"key":"1320_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-016-0676-x","author":"Z Shu","year":"2016","unstructured":"Shu, Z., Wan, J., Li, D., Lin, J., Vasilakos, A. V., & Imran, M. (2016). Security in software-defined networking: Threats and countermeasures. Mobile Networks and Applications. doi:\n 10.1007\/s11036-016-0676-x\n \n .","journal-title":"Mobile Networks and Applications"},{"key":"1320_CR22","doi-asserted-by":"crossref","unstructured":"Spyropoulos, T., Psounis, K., & Raghavendra, C. S. (2007). Spray and focus: Efficient mobility-assisted routing for heterogeneous and correlated mobility. In Pervasive Computing and Communications Workshops, 2007. PerCom Workshops\u2019 07. Fifth Annual IEEE International Conference on, pp. 79\u201385. IEEE.","DOI":"10.1109\/PERCOMW.2007.108"},{"issue":"8","key":"1320_CR23","doi-asserted-by":"publisher","first-page":"2349","DOI":"10.1007\/s11276-010-0276-9","volume":"16","author":"T Spyropoulos","year":"2010","unstructured":"Spyropoulos, T., Rais, R. N. B., Turletti, T., Obraczka, K., & Vasilakos, A. (2010). Routing for disruption tolerant networks: Taxonomy and design. Wireless Networks, 16(8), 2349\u20132370. doi:\n 10.1007\/s11276-010-0276-9\n \n .","journal-title":"Wireless Networks"},{"key":"1320_CR24","unstructured":"The one simulator. \n http:\/\/www.netlab.tkk.fi\/tutkimus\/dtn\/theone\/\n \n ."},{"key":"1320_CR25","volume-title":"Delay tolerant networks: Protocols and applications","author":"AV Vasilakos","year":"2011","unstructured":"Vasilakos, A. V., Zhang, Y., & Spyropoulos, T. (2011). Delay tolerant networks: Protocols and applications (1st ed.). Boca Raton, FL: CRC Press Inc.","edition":"1"},{"key":"1320_CR26","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.comnet.2013.08.020","volume":"58","author":"H Yang","year":"2014","unstructured":"Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29\u201338.","journal-title":"Computer Networks"},{"issue":"3","key":"1320_CR27","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1109\/TIFS.2014.2381873","volume":"10","author":"G Yao","year":"2015","unstructured":"Yao, G., Bi, J., & Vasilakos, A. V. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. Information Forensics and Security, IEEE Transactions on, 10(3), 471\u2013484.","journal-title":"Information Forensics and Security, IEEE Transactions on"},{"issue":"2","key":"1320_CR28","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s11276-012-0457-9","volume":"19","author":"Y Zeng","year":"2013","unstructured":"Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. V. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161\u2013173. doi:\n 10.1007\/s11276-012-0457-9\n \n .","journal-title":"Wireless Networks"},{"issue":"6","key":"1320_CR29","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1109\/TIFS.2015.2407326","volume":"10","author":"J Zhou","year":"2015","unstructured":"Zhou, J., Dong, X., Cao, Z., & Vasilakos, A. V. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299\u20131314.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"8","key":"1320_CR30","doi-asserted-by":"crossref","first-page":"4628","DOI":"10.1109\/TVT.2009.2020105","volume":"58","author":"H Zhu","year":"2009","unstructured":"Zhu, H., Lin, X., Lu, R., Fan, Y., & Shen, X. (2009). Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks. Vehicular Technology, IEEE Transactions on, 58(8), 4628\u20134639.","journal-title":"Vehicular Technology, IEEE Transactions on"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-016-1320-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1320-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1320-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1320-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,9]],"date-time":"2018-01-09T03:56:27Z","timestamp":1515470187000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-016-1320-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,29]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["1320"],"URL":"https:\/\/doi.org\/10.1007\/s11276-016-1320-1","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,29]]}}}