{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T05:48:19Z","timestamp":1774158499831,"version":"3.50.1"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030017033","type":"print"},{"value":"9783030017040","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01704-0_26","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T16:02:50Z","timestamp":1546012970000},"page":"453-467","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Secure AODV Protocol Improvement Scheme Based on Fuzzy Neural Network"],"prefix":"10.1007","author":[{"given":"Tongyi","family":"Xie","sequence":"first","affiliation":[]},{"given":"Jiawei","family":"Mo","sequence":"additional","affiliation":[]},{"given":"Baohua","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Perkins, C., Belding-Royer, E., Das, S.: Request for comments: ad hoc on-demand distance vector (AODV) routing. Exp. Internet Soc. 6(7), 90 (2003)","DOI":"10.17487\/rfc3561"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Jain, A., Prajapati, U., Chouhan, P.: Trust based mechanism with AODV protocol for prevention of black-hole attack in MANET scenario. In: Colossal Data Analysis and Networking, pp. 1\u20135. IEEE, CDAN (2016)","DOI":"10.1109\/CDAN.2016.7570866"},{"key":"26_CR3","unstructured":"Shoja, M.K., Taheri, H., Vakilinia, S.: Preventing black hole attack in AODV through use of hash chain. In: Electrical Engineering, pp. 1\u20132. IEEE (2011)"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Balakrishnan, V., Varadharajan, V., Lucs, P., et al.: Trust enhanced secure mobile ad-hoc network routing. In: International Conference on Advanced Information Networking and Applications Workshops, Salt Lake City, Utah, USA, pp. 21\u201333. IEEE Computer Society (2007)","DOI":"10.1109\/AINAW.2007.359"},{"key":"26_CR5","first-page":"649","volume":"55","author":"U Hiroki","year":"2014","unstructured":"Hiroki, U., Sonoko, T., Hiroshi, S.: An effective secure routing protocol considering trust in mobile ad hoc networks. IPSJ J. 55, 649\u2013658 (2014)","journal-title":"IPSJ J."},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Umeda, S., Takeda, S., Shigeno, H.: Trust evaluation method adapted to node behavior for secure routing in mobile ad hoc networks. In: Eighth International Conference on Mobile Computing and Ubiquitous Networking, Melbourne, Australia, pp. 143\u2013148. IEEE (2015)","DOI":"10.1109\/ICMU.2015.7061057"},{"issue":"2","key":"26_CR7","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/TDSC.2011.58","volume":"9","author":"G Zhan","year":"2012","unstructured":"Zhan, G., Shi, W., Deng, J.: Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Trans. Dependable Secure Comput. 9(2), 184\u2013197 (2012)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"26_CR8","unstructured":"Li, H., Singhal, M.: A secure routing protocol for wireless ad hoc networks. In: Hawaii International Conference on System Sciences, Hawaii, USA, p. 225a. IEEE (2006)"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Singh, B., Srikanth, D., Kumar, C.R.S.: Mitigating effects of black hole attack in mobile ad-hoc NETworks: military perspective. In: IEEE International Conference on Engineering and Technology, Hammamet, Tunisia, pp. 21\u201322. IEEE (2016)","DOI":"10.1109\/ICETECH.2016.7569360"},{"key":"26_CR10","unstructured":"Zhu, Y.-S., Dou, G.-Q.: A dimensional trust based security data aggregation method in wireless sensor networks. J. Wuhan Univ. (Natural Science Edition). 59(2), 193\u2013197 (2013)"},{"issue":"3","key":"26_CR11","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/S0378-8733(03)00009-1","volume":"25","author":"LA Adamic","year":"2003","unstructured":"Adamic, L.A., Adar, E.: Friends and neighbors on the web. Soc. Netw. 25(3), 211\u2013230 (2003)","journal-title":"Soc. Netw."},{"issue":"5","key":"26_CR12","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1016\/S1004-9541(06)60118-3","volume":"14","author":"W Xiao","year":"2006","unstructured":"Xiao, W., Dong, H., Xin, Q.-L., et al.: Synthesis of large-scale multistream heat exchanger networks based on stream pseudo temperature. Chin. J. Chem. Eng. 14(5), 574\u2013583 (2006)","journal-title":"Chin. J. Chem. Eng."},{"key":"26_CR13","unstructured":"Rehmani, M.H., Saleem, Y.: Network simulator NS-2. J. Inst. Image Inf. Telev. Eng. 65, 946\u2013949 (2015)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01704-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T06:03:19Z","timestamp":1573624999000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01704-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017033","9783030017040"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01704-0_26","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}