{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T02:57:35Z","timestamp":1723172255919},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T00:00:00Z","timestamp":1586304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T00:00:00Z","timestamp":1586304000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11277-020-07316-z","type":"journal-article","created":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T17:02:22Z","timestamp":1586365342000},"page":"2141-2166","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A Novel Wolf Based Trust Accumulation Approach for Preventing the Malicious Activities in Mobile Ad Hoc Network"],"prefix":"10.1007","volume":"113","author":[{"given":"Ramesh","family":"Vatambeti","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,8]]},"reference":[{"key":"7316_CR1","doi-asserted-by":"crossref","first-page":"e3716","DOI":"10.1002\/ett.3716","volume":"1","author":"WC Wu","year":"2020","unstructured":"Wu, W. C. (2020). Spectrum sensing in optical wireless communication network. Transactions on Emerging Telecommunications Technologies,1, e3716.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"7316_CR2","doi-asserted-by":"crossref","first-page":"e3853","DOI":"10.1002\/ett.3853","volume":"1","author":"SJ Sultanuddin","year":"2020","unstructured":"Sultanuddin, S. J., & Ali Hussain, M. (2020). Token system-based efficient route optimization in mobile ad hoc network for v ehicular ad hoc network in smart city. Transactions on Emerging Telecommunications Technologies,1, e3853.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"7316_CR3","doi-asserted-by":"crossref","first-page":"e3866","DOI":"10.1002\/ett.3866","volume":"1","author":"H Ur Rahman","year":"2020","unstructured":"Ur Rahman, H., et al. (2020). A community-based social P2P network for sharing human life digital memories. Transactions on Emerging Telecommunications Technologies,1, e3866.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"7316_CR4","doi-asserted-by":"crossref","first-page":"e3863","DOI":"10.1002\/ett.3863","volume":"1","author":"R Sundar","year":"2020","unstructured":"Sundar, R., & Kathirvel, A. (2020). Aggressively delivered mechanism over variable length density using a simulated annealing algorithm in mobile ad hoc network. Transactions on Emerging Telecommunications Technologies,1, e3863.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"7316_CR5","doi-asserted-by":"crossref","first-page":"e3860","DOI":"10.1002\/ett.3860","volume":"1","author":"M Bany Taha","year":"2020","unstructured":"Bany Taha, M., et al. (2020). TD-PSO: Task distribution approach based on particle swarm optimization for vehicular ad hoc network. Transactions on Emerging Telecommunications Technologies,1, e3860.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"11","key":"7316_CR6","doi-asserted-by":"crossref","first-page":"4455","DOI":"10.1007\/s12652-018-1126-3","volume":"10","author":"YH Robinson","year":"2019","unstructured":"Robinson, Y. H., et al. (2019). FD-AOMDV: fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks. Journal of Ambient Intelligence and Humanized Computing,10(11), 4455\u20134472.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"7316_CR7","doi-asserted-by":"crossref","first-page":"21343","DOI":"10.1109\/ACCESS.2019.2896699","volume":"7","author":"S Liu","year":"2019","unstructured":"Liu, S., et al. (2019). Dynamic analysis for the average shortest path length of mobile ad hoc networks under random failure scenarios. IEEE Access,7, 21343\u201321358.","journal-title":"IEEE Access"},{"key":"7316_CR8","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.comnet.2019.02.004","volume":"152","author":"A Madhja","year":"2019","unstructured":"Madhja, A., Nikoletseas, S., & Voudouris, A. A. (2019). Adaptive wireless power transfer in mobile ad hoc networks. Computer Networks,152, 87\u201397.","journal-title":"Computer Networks"},{"key":"7316_CR9","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1007\/978-981-10-8639-7_57","volume-title":"QTM: A QoS task monitoring system for mobile ad hoc networks. Recent Findings in Intelligent Computing Techniques","author":"M Rath","year":"2019","unstructured":"Rath, M., et al. (2019). QTM: A QoS task monitoring system for mobile ad hoc networks. Recent Findings in Intelligent Computing Techniques (pp. 543\u2013550). Singapore: Springer."},{"key":"7316_CR10","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.adhoc.2019.03.001","volume":"89","author":"TK Saini","year":"2019","unstructured":"Saini, T. K., & Sharma, S. C. (2019). Prominent unicast routing protocols for Mobile Ad hoc Networks: Criterion, classification, and key attributes. Ad Hoc Networks,89, 58\u201377.","journal-title":"Ad Hoc Networks"},{"issue":"2","key":"7316_CR11","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1007\/s11276-017-1569-z","volume":"25","author":"W Wang","year":"2019","unstructured":"Wang, W., et al. (2019). A realistic mobility model with irregular obstacle constraints for mobile ad hoc networks. Wireless Networks,25(2), 487\u2013506.","journal-title":"Wireless Networks"},{"key":"7316_CR12","doi-asserted-by":"crossref","first-page":"102425","DOI":"10.1016\/j.jisa.2019.102425","volume":"51","author":"E Elmahdi","year":"2020","unstructured":"Elmahdi, E., Yoo, S. M., & Sharshembiev, K. (2020). Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks. Journal of Information Security and Applications,51, 102425.","journal-title":"Journal of Information Security and Applications"},{"key":"7316_CR13","first-page":"1","volume":"1","author":"SM Darwish","year":"2019","unstructured":"Darwish, S. M., Elmasry, A., & Ibrahim, S. H. (2019). Optimal Shortest Path in Mobile Ad-Hoc Network Based on Fruit Fly Optimization Algorithm. International Conference on Advanced Machine Learning Technologies and Applications,1, 1.","journal-title":"International Conference on Advanced Machine Learning Technologies and Applications"},{"issue":"1","key":"7316_CR14","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s41870-018-0143-y","volume":"11","author":"A Banerjee","year":"2019","unstructured":"Banerjee, A., Dutta, P., & Sufian, A. (2019). Movement guided management of topology (MGMT) with balanced load in mobile ad hoc networks. International Journal of Information Technology,11(1), 149\u2013158.","journal-title":"International Journal of Information Technology"},{"issue":"1","key":"7316_CR15","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s12652-017-0609-y","volume":"10","author":"MAJ Jamali","year":"2019","unstructured":"Jamali, M. A. J. (2019). A multipath QoS multicast routing protocol based on link stability and route reliability in mobile ad-hoc networks. Journal of Ambient Intelligence and Humanized Computing,10(1), 107\u2013123.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"4","key":"7316_CR16","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1007\/s11277-019-06378-y","volume":"107","author":"A Sufian","year":"2019","unstructured":"Sufian, A., Banerjee, A., & Dutta, P. (2019). Energy and velocity based tree multicast routing in mobile Ad-Hoc networks. Wireless Personal Communications,107(4), 2191\u20132209.","journal-title":"Wireless Personal Communications"},{"key":"7316_CR17","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1016\/j.future.2019.03.013","volume":"97","author":"VK Sharma","year":"2019","unstructured":"Sharma, V. K., Verma, L. P., & Kumar, M. (2019). CL-ADSP: Cross-layer adaptive data scheduling policy in mobile ad hoc networks. Future Generation Computer Systems,97, 530\u2013563.","journal-title":"Future Generation Computer Systems"},{"key":"7316_CR18","series-title":"Microelectronics, Electromagnetics and Telecommunications","first-page":"567","volume-title":"Simulation and QoS metrics comparison of routing protocols for mobile ad hoc networks using network simulator","author":"P Lavanya","year":"2019","unstructured":"Lavanya, P., Reddy, V. S. K., & Prasad, A. M. (2019). Simulation and QoS metrics comparison of routing protocols for mobile ad hoc networks using network simulator (pp. 567\u2013575)., Microelectronics, Electromagnetics and Telecommunications Singapore: Springer."},{"issue":"6","key":"7316_CR19","doi-asserted-by":"crossref","first-page":"14991","DOI":"10.1007\/s10586-018-2479-2","volume":"22","author":"U Palani","year":"2019","unstructured":"Palani, U., Suresh, K. C., & Nachiappan, A. (2019). Mobility prediction in mobile ad hoc networks using eye of coverage approach. Cluster Computing,22(6), 14991\u201314998.","journal-title":"Cluster Computing"},{"key":"7316_CR20","doi-asserted-by":"crossref","unstructured":"Zeng, B., Yao, L., & Wang, R. (2019). A reliable routing decision algorithm with minimal multicast power consumption in mobile wireless network. In IEEE 7th international conference on computer science and network technology (ICCSNT). IEEE.","DOI":"10.1109\/ICCSNT47585.2019.8962455"},{"key":"7316_CR21","first-page":"1","volume":"1","author":"NSS Farheen","year":"2020","unstructured":"Farheen, N. S. S., & Jain, A. (2020). Improved routing in MANET with optimized multi path routing fine-tuned with hybrid modeling. Journal of King Saud University-Computer and Information Sciences,1, 1.","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"7316_CR22","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/978-981-13-9574-1_6","volume-title":"Study and design of route repairing mechanism in MANET. Design frameworks for wireless networks","author":"H Kumar","year":"2020","unstructured":"Kumar, H., et al. (2020). Study and design of route repairing mechanism in MANET. Design frameworks for wireless networks (pp. 123\u2013149). Singapore: Springer."},{"issue":"1","key":"7316_CR23","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s11277-019-06711-5","volume":"110","author":"K Juneja","year":"2020","unstructured":"Juneja, K. (2020). Random-session and K-neighbour based suspected node analysis approach for cooperative blackhole detection in MANET. Wireless Personal Communications,110(1), 45\u201368.","journal-title":"Wireless Personal Communications"},{"key":"7316_CR24","first-page":"1","volume":"1","author":"M Islabudeen","year":"2020","unstructured":"Islabudeen, M., & Devi, M. K. K. (2020). A smart approach for intrusion detection and prevention system in mobile ad hoc networks against security attacks. Wireless Personal Communications,1, 1\u201332.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"7316_CR25","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/s11276-016-1353-5","volume":"24","author":"S Gurung","year":"2018","unstructured":"Gurung, S., & Chauhan, S. (2018). A novel approach for mitigating gray hole attack in MANET. Wireless Networks,24(2), 565\u2013579. https:\/\/doi.org\/10.1007\/s11276-016-1353-5.","journal-title":"Wireless Networks"},{"key":"7316_CR26","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.suscom.2017.07.001","volume":"18","author":"YM Khamayseh","year":"2018","unstructured":"Khamayseh, Y. M., Aljawarneh, S. A., & Asaad, A. E. (2018). Ensuring survivability against Black Hole Attacks in MANETS for preserving energy efficiency. Sustainable Computing: Informatics and Systems,18, 90\u2013100. https:\/\/doi.org\/10.1016\/j.suscom.2017.07.001.","journal-title":"Sustainable Computing: Informatics and Systems"},{"issue":"2","key":"7316_CR27","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s11277-017-5070-x","volume":"100","author":"VH Kshirsagar","year":"2018","unstructured":"Kshirsagar, V. H., Kanthe, A. M., & Simunic, D. (2018). Trust based detection and elimination of packet drop attack in the mobile ad-hoc networks. Wireless Personal Communications,100(2), 311\u2013320. https:\/\/doi.org\/10.1007\/s11277-017-5070-x.","journal-title":"Wireless Personal Communications"},{"key":"7316_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-1723-0","author":"R Bhuvaneswari","year":"2018","unstructured":"Bhuvaneswari, R., & Ramachandran, R. (2018). Denial of service attack solution in OLSR based manet by varying number of fictitious nodes. Cluster Computing. https:\/\/doi.org\/10.1007\/s10586-018-1723-0.","journal-title":"Cluster Computing"},{"issue":"4","key":"7316_CR29","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1007\/s41870-018-0168-2","volume":"11","author":"T Jamal","year":"2019","unstructured":"Jamal, T., & Butt, S. A. (2019). Malicious node analysis in MANETS. International Journal of Information Technology,11(4), 859\u2013867. https:\/\/doi.org\/10.1007\/s41870-018-0168-2.","journal-title":"International Journal of Information Technology"},{"issue":"6","key":"7316_CR30","doi-asserted-by":"publisher","first-page":"15541","DOI":"10.1007\/s10586-018-2698-6","volume":"22","author":"PB Srikaanth","year":"2019","unstructured":"Srikaanth, P. B., & Nagarajan, V. (2019). Semi-Markov chain-based grey prediction-based mitigation scheme for vampire attacks in MANETs. Cluster Computing,22(6), 15541\u201315549. https:\/\/doi.org\/10.1007\/s10586-018-2698-6.","journal-title":"Cluster Computing"},{"key":"7316_CR31","doi-asserted-by":"crossref","first-page":"112971","DOI":"10.1016\/j.eswa.2019.112971","volume":"142","author":"A Zareie","year":"2020","unstructured":"Zareie, A., Sheikhahmadi, A., & Jalili, M. (2020). Identification of influential users in social network using gray wolf optimization algorithm. Expert Systems with Applications,142, 112971.","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"7316_CR32","doi-asserted-by":"crossref","first-page":"61","DOI":"10.3390\/fi11030061","volume":"11","author":"Z Ali Zardari","year":"2019","unstructured":"Ali Zardari, Z., et al. (2019). A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in MANETs. Future Internet,11(3), 61.","journal-title":"Future Internet"},{"key":"7316_CR33","first-page":"1","volume":"1","author":"A Pal","year":"2020","unstructured":"Pal, A., et al. (2020). An efficient load balanced stable multi-path routing for mobile ad-hoc network. Microsystem Technologies,1, 1\u201315.","journal-title":"Microsystem Technologies"},{"key":"7316_CR34","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.compeleceng.2019.02.005","volume":"74","author":"M Vigenesh","year":"2019","unstructured":"Vigenesh, M., & Santhosh, R. (2019). An efficient stream region sink position analysis model for routing attack detection in mobile ad hoc networks. Computers & Electrical Engineering,74, 273\u2013280.","journal-title":"Computers & Electrical Engineering"},{"issue":"2","key":"7316_CR35","doi-asserted-by":"crossref","first-page":"4065","DOI":"10.1007\/s10586-018-2686-x","volume":"22","author":"S Vimala","year":"2019","unstructured":"Vimala, S., Khanaa, V., & Nalini, C. (2019). A study on supervised machine learning algorithm to improvise intrusion detection systems for mobile ad hoc networks. Cluster Computing,22(2), 4065\u20134074.","journal-title":"Cluster Computing"},{"issue":"6","key":"7316_CR36","doi-asserted-by":"crossref","first-page":"15205","DOI":"10.1007\/s10586-018-2545-9","volume":"22","author":"K Bala","year":"2019","unstructured":"Bala, K., Jothi, S., & Chandrasekar, A. (2019). An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis. Cluster Computing,22(6), 15205\u201315212.","journal-title":"Cluster Computing"},{"key":"7316_CR37","doi-asserted-by":"crossref","first-page":"1176","DOI":"10.1016\/j.procs.2019.04.168","volume":"151","author":"H Moudni","year":"2019","unstructured":"Moudni, H., et al. (2019). Black hole attack detection using fuzzy based intrusion detection systems in MANET. Procedia Computer Science,151, 1176\u20131181.","journal-title":"Procedia Computer Science"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07316-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-020-07316-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07316-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T18:19:05Z","timestamp":1696011545000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-020-07316-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,8]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["7316"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07316-z","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,8]]},"assertion":[{"value":"8 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no potential conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All applicable institutional and\/or national guidelines for the care and use of animals were followed.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and Animal Rights"}}]}}