{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T18:03:10Z","timestamp":1733335390073,"version":"3.30.1"},"update-to":[{"updated":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T00:00:00Z","timestamp":1556496000000},"DOI":"10.1007\/s11277-019-06385-z","type":"retraction","label":"Retraction"}],"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T00:00:00Z","timestamp":1556496000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T00:00:00Z","timestamp":1556496000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11277-019-06385-z","type":"journal-article","created":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T22:53:55Z","timestamp":1556578435000},"page":"693-693","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["RETRACTED ARTICLE: Optimal Hop Selection Based Novel Trust Based DDoS Attack Removal Framework for Reliable and Secured Transmission of Data in VANETs"],"prefix":"10.1007","volume":"113","author":[{"given":"Prabakeran","family":"Saravanan","sequence":"first","affiliation":[]},{"given":"T.","family":"Sethukarasi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,29]]},"reference":[{"key":"6385_CR1","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.adhoc.2016.02.017","volume":"44","author":"F Cunha","year":"2016","unstructured":"Cunha, F., Villas, L., Boukerche, A., Maia, G., Viana, A., Mini, R. A., et al. (2016). Data communication in VANETS: Protocols, applications and challenges. Ad Hoc Networks, 44, 90\u2013103.","journal-title":"Ad Hoc Networks"},{"issue":"11","key":"6385_CR2","doi-asserted-by":"crossref","first-page":"2497","DOI":"10.1002\/dac.2484","volume":"27","author":"Wang Xiaonan","year":"2014","unstructured":"Xiaonan, Wang, & Huanyan, Qian. (2014). Constructing a VANET based on cluster chains. International Journal of Communication Systems, 27(11), 2497\u20132517.","journal-title":"International Journal of Communication Systems"},{"key":"6385_CR3","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.vehcom.2016.11.010","volume":"9","author":"CA Kerrache","year":"2017","unstructured":"Kerrache, C. A., Lagraa, N., Calafate, C. T., & Lakas, A. (2017). TFDD: A trust-based framework for reliable data delivery and DoS defense in VANETs. Vehicular Communications, 9, 254\u2013267.","journal-title":"Vehicular Communications"},{"key":"6385_CR4","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.compeleceng.2015.02.018","volume":"43","author":"H Sedjelmaci","year":"2015","unstructured":"Sedjelmaci, H., & Senouci, S. M. (2015). An accurate and efficient collaborative intrusion detection framework to secure vehicular networks. Computers & Electrical Engineering, 43, 33\u201347.","journal-title":"Computers & Electrical Engineering"},{"key":"6385_CR5","doi-asserted-by":"crossref","unstructured":"Guo, Y., Schildt, S., & Wolf, L. (2014). Using cluster analysis to detect attackers in vehicular delay tolerant networks. In Ad Hoc networks (pp. 181\u2013196). Springer.","DOI":"10.1007\/978-3-319-14225-8_12"},{"key":"6385_CR6","unstructured":"Moore, T., Raya, M., Clulow, J., Papadimitratos, P., Anderson, R., & Hubaux, J.-P. (2008). Fast exclusion of errant devices from vehicular networks. In: Sensor, mesh and ad hoc communications and networks. SECON\u201908."},{"key":"6385_CR7","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili, S., Mirjalili, S. M., & Lewis, A. (2014). Grey wolf optimizer. Advances in Engineering Software, 69, 46\u201361.","journal-title":"Advances in Engineering Software"},{"key":"6385_CR8","unstructured":"The Network Simulator NS-2 Documentation. http:\/\/www.isi.edu\/nsnam\/ns\/ . Accessed October 18, 2015."},{"key":"6385_CR9","doi-asserted-by":"crossref","unstructured":"Gazdar, T., Rachedi, A., Benslimane, A., & Belghith, A. (2012) A distributed advanced analytical trust model for VANETs. In Global communications conference (GLOBECOM), 2012 IEEE (pp. 201\u2013206). IEEE.","DOI":"10.1109\/GLOCOM.2012.6503113"},{"issue":"3","key":"6385_CR10","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.vehcom.2015.06.001","volume":"2","author":"TRV Krishna","year":"2015","unstructured":"Krishna, T. R. V., Barnwal, R. P., & Ghosh, S. K. (2015). CAT: Consensus-assisted trust estimation of mds-equipped collaborators in vehicular ad-hoc network. Vehicular Communications, 2(3), 150\u2013157.","journal-title":"Vehicular Communications"},{"issue":"6","key":"6385_CR11","doi-asserted-by":"publisher","first-page":"2221","DOI":"10.1166\/jctn.2018.7440","volume":"15","author":"P Saravanan","year":"2018","unstructured":"Saravanan, P., Sethukarasi, T., & Indumathi, V. (2018). An efficient software defined network based cooperative scheme for mitigation of distributed denial of service (DDoS) attacks. Journal of Computational and Theoretical Nanoscience, 15(6), 2221\u20132226.","journal-title":"Journal of Computational and Theoretical Nanoscience"},{"issue":"6","key":"6385_CR12","doi-asserted-by":"publisher","first-page":"2383","DOI":"10.1166\/jctn.2018.7474","volume":"15","author":"P Saravanan","year":"2018","unstructured":"Saravanan, P., Sethukarasi, T., & Indumathi, V. (2018). Authentic novel trust propagation model with deceptive recommendation penalty scheme for distributed denial of service attacks. Journal of Computational and Theoretical Nanoscience, 15(6), 2383\u20132389.","journal-title":"Journal of Computational and Theoretical Nanoscience"},{"key":"6385_CR13","unstructured":"Saravanan, P., Sethukarasi, T., & Indumathi, V. (2018). Two level trust propagation model with global weighted index for detecting and mitigating denial of service. TAGA Journal of Graphic Technology, 14, ISSN: 1748-0345 (Online)"},{"key":"6385_CR14","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.jnca.2018.08.014","volume":"122","author":"Debasis Das","year":"2018","unstructured":"Das, Debasis, & Misra, Rajiv. (2018). Improvised dynamic network connectivity model for Vehicular Ad-Hoc Networks (VANETs). Journal of Network and Computer Applications, 122, 107\u2013114.","journal-title":"Journal of Network and Computer Applications"},{"key":"6385_CR15","first-page":"65","volume-title":"Studies in computational intelligence","author":"XS Yang","year":"2010","unstructured":"Yang, X. S. (2010). A new metaheuristic bat-inspired algorithm. In J. Gonz\u00e1lez, D. Pelta, C. Cruz, G. Terrazas, & N. Krasnogor (Eds.), Studies in computational intelligence (pp. 65\u201374). Heidelberg: Springer."},{"key":"6385_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, J. (2011). A survey on trust management for VANETs. In 2011 IEEE international conference on advanced information networking and applications (AINA) (pp. 105\u2013112). IEEE.","DOI":"10.1109\/AINA.2011.86"},{"key":"6385_CR17","doi-asserted-by":"crossref","unstructured":"Golle, P., Greene, D., & Staddon, J. (2004). Detecting and correcting malicious data in VANETs. In Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks (pp. 29\u201337). ACM.","DOI":"10.1145\/1023875.1023881"},{"key":"6385_CR18","doi-asserted-by":"crossref","unstructured":"Raya, M., Papadimitratos, P., Gligor, V. D., & Hubaux, J.-P. (2008). On data-centric trust establishment in ephemeral ad hoc networks. In The 27th conference on computer communications. INFOCOM 2008. IEEE.","DOI":"10.1109\/INFOCOM.2008.180"},{"key":"6385_CR19","unstructured":"Liu, Z., Joy, A. W., & Thompson, R. A. (2004). A dynamic trust model for mobile ad hoc networks. In 10th IEEE international workshop on future trends of distributed computing systems, 2004. FTDCS 2004. Proceedings (pp. 80\u201385). IEEE."},{"issue":"1","key":"6385_CR20","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s11277-018-6014-9","volume":"104","author":"V Sundararaj","year":"2019","unstructured":"Sundararaj, V. (2019). Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wireless Personal Communications, 104(1), 173\u2013197.","journal-title":"Wireless Personal Communications"},{"issue":"6","key":"6385_CR21","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1016\/S0305-0483(00)00021-9","volume":"28","author":"D Gefen","year":"2000","unstructured":"Gefen, D. (2000). E-commerce: the role of familiarity and trust. Omega, 28(6), 725\u2013737.","journal-title":"Omega"},{"issue":"6","key":"6385_CR22","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/65.806987","volume":"13","author":"R Perlman","year":"1999","unstructured":"Perlman, R. (1999). An overview of PKI trust models. Network, IEEE, 13(6), 38\u201343.","journal-title":"Network, IEEE"},{"key":"6385_CR23","doi-asserted-by":"crossref","unstructured":"Tajeddine, A., Kayssi, A., & Chehab, A. (2010). A privacy-preserving trust model for VANETs. In 2010 IEEE 10th international conference on computer and information technology (CIT) (pp. 832\u2013837). IEEE.","DOI":"10.1109\/CIT.2010.157"},{"key":"6385_CR24","doi-asserted-by":"crossref","unstructured":"Haddadou, N., Rachedi, A., & Ghamri-Doudane, Y. (2013). Trust and exclusion in vehicular ad hoc networks: An economic incentive model based approach. In Computing, communications and IT applications conference (Com- ComAp) (pp. 13\u201318). IEEE.","DOI":"10.1109\/ComComAp.2013.6533601"},{"key":"6385_CR25","doi-asserted-by":"crossref","unstructured":"Gurung, S., Lin, D., Squicciarini, A. C., & Bertino, E. (2013). Information-oriented trustworthiness evaluation in vehicular ad-hoc networks. In NSS (pp. 94\u2013108). Springer.","DOI":"10.1007\/978-3-642-38631-2_8"},{"issue":"1","key":"6385_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/sec.519","volume":"6","author":"J Zhang","year":"2013","unstructured":"Zhang, J., Chen, C., & Cohen, R. (2013). Trust modeling for message relay control and local action decision making in VANETs. Security and Communication Networks, 6(1), 1\u201314.","journal-title":"Security and Communication Networks"},{"issue":"3","key":"6385_CR27","doi-asserted-by":"publisher","first-page":"934","DOI":"10.1016\/j.jnca.2011.03.028","volume":"35","author":"F G\u00f3mez M\u00e1rmol","year":"2012","unstructured":"G\u00f3mez M\u00e1rmol, F., & Mart\u00ednez P\u00e9rez, G. (2012). TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. Journal of Network and Computer Applications, 35(3), 934\u2013941.","journal-title":"Journal of Network and Computer Applications"},{"key":"6385_CR28","doi-asserted-by":"crossref","unstructured":"Li, X., Liu, J., Li, X., & Sun, W. (2013). RGTE: A reputation-based global trust establishment in VANETs. In 2013 5th international conference on intelligent networking and collaborative systems (INCoS) (pp. 210\u2013214). IEEE.","DOI":"10.1109\/INCoS.2013.91"},{"key":"6385_CR29","first-page":"17","volume":"27","author":"M Srinivas","year":"1994","unstructured":"Srinivas, M., & Patnaik, L. M. (1994). Genetic algorithms: a survey. Computer (Long Beach California), 27, 17\u201326.","journal-title":"Computer (Long Beach California)"},{"issue":"6","key":"6385_CR30","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1016\/j.compeleceng.2014.01.009","volume":"40","author":"N Kumar","year":"2014","unstructured":"Kumar, N., & Chilamkurti, N. (2014). Collaborative trust aware intelligent intrusion detection in VANETs. Computers & Electrical Engineering, 40(6), 1981\u20131996.","journal-title":"Computers & Electrical Engineering"},{"issue":"1","key":"6385_CR31","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.amc.2009.03.090","volume":"214","author":"D Karaboga","year":"2009","unstructured":"Karaboga, D., & Akay, B. (2009). A comparative study of artificial bee colony algorithm. Applied Mathematics and Computation, 214(1), 108\u2013132.","journal-title":"Applied Mathematics and Computation"},{"key":"6385_CR32","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.eswa.2015.10.039","volume":"47","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili, S., Saremi, S., Mirjalili, S. M., & Coelho, L. D. S. (2016). Multi-objective grey wolf optimizer: A novel algorithm for multi-criterion optimization. Expert Systems with Applications, 47, 106\u2013119.","journal-title":"Expert Systems with Applications"},{"key":"6385_CR33","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-1-84882-983-1_15","volume-title":"Research and development in intelligent systems XXVI: Incorporating applications and innovations in intelligent systems XVII","author":"X-S Yang","year":"2010","unstructured":"Yang, X.-S. (2010). Firefly algorithm, l\u00e9vy flights and global optimization. In M. Bramer, R. Ellis, & M. Petridis (Eds.), Research and development in intelligent systems XXVI: Incorporating applications and innovations in intelligent systems XVII (pp. 209\u2013218). London: Springer."},{"issue":"3","key":"6385_CR34","doi-asserted-by":"publisher","first-page":"117","DOI":"10.22266\/ijies2016.0930.12","volume":"9","author":"V Sundararaj","year":"2016","unstructured":"Sundararaj, V. (2016). An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. International Journal of Intelligent Engineering and Systems, 9(3), 117\u2013126.","journal-title":"International Journal of Intelligent Engineering and Systems"},{"key":"6385_CR35","doi-asserted-by":"crossref","unstructured":"Eberhart, R., & Kennedy, J. (1995). A new optimizer using particle swarm theory. In Proceedings of the sixth international symposium on micro machine and human science, 1995. MHS\u201995 (pp. 39\u201343).","DOI":"10.1109\/MHS.1995.494215"},{"key":"6385_CR36","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-642-12538-6_6","volume-title":"Nature inspired cooperative strategies for optimization (NICSO 2010)","author":"X-S Yang","year":"2010","unstructured":"Yang, X.-S. (2010). A new metaheuristic bat-inspired algorithm. In J. R. Gonz\u00e1lez, D. A. Pelta, C. Cruz, G. Terrazas, & N. Krasnogor (Eds.), Nature inspired cooperative strategies for optimization (NICSO 2010) (pp. 65\u201374). Berlin: Springer."},{"key":"6385_CR37","doi-asserted-by":"crossref","unstructured":"Martinez, F. J., Fogue, M., Coll, M., Cano, J.-C., Calafate, C. T., & Manzoni, P. (2010). Assessing the impact of a realistic radio propagation model on vanet scenarios using real maps. In 2010 9th IEEE international symposium on network computing and applications (NCA) (pp. 132\u2013139). IEEE.","DOI":"10.1109\/NCA.2010.24"},{"key":"6385_CR38","doi-asserted-by":"crossref","unstructured":"H\u00e4rri, J., Filali, F., Bonnet, C., & Fiore, M. (2006). VanetMobiSim: generating realistic mobility patterns for VANETs. In Proceedings of the 3rd international workshop on Vehicular ad hoc networks (pp. 96\u201397).ACM.","DOI":"10.1145\/1161064.1161084"},{"key":"6385_CR39","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.cose.2018.04.009","volume":"77","author":"V Sundararaj","year":"2018","unstructured":"Sundararaj, V., Muthukumar, S., & Kumar, R. S. (2018). An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Computers and Security, 77, 277\u2013288.","journal-title":"Computers and Security"},{"key":"6385_CR40","doi-asserted-by":"publisher","DOI":"10.1201\/EBK1439819197","volume-title":"Security of self-organizing networks: MANET, WSN, WMN","author":"A-SK Pathan","year":"2016","unstructured":"Pathan, A.-S. K. (2016). Security of self-organizing networks: MANET, WSN, WMN. VANET: CRC Press."}],"updated-by":[{"updated":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T00:00:00Z","timestamp":1556496000000},"DOI":"10.1007\/s11277-019-06385-z","type":"retraction","label":"Retraction"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06385-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-019-06385-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06385-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T12:26:49Z","timestamp":1721219209000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-019-06385-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,29]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["6385"],"URL":"https:\/\/doi.org\/10.1007\/s11277-019-06385-z","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2019,4,29]]},"assertion":[{"value":"29 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}