{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:51:18Z","timestamp":1743144678975,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030387518"},{"type":"electronic","value":"9783030387525"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-38752-5_15","type":"book-chapter","created":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T15:02:41Z","timestamp":1578409361000},"page":"185-200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Trusted MANET Routing Algorithm Based on Fuzzy Logic"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3606-8563","authenticated-orcid":false,"given":"Qahtan M.","family":"Yas","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3805-5627","authenticated-orcid":false,"given":"Mohammed","family":"Khalaf","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,8]]},"reference":[{"issue":"1","key":"15_CR1","first-page":"408","volume":"3","author":"M Computing","year":"2014","unstructured":"Computing, M.: An overview of MANET: applications, attacks and challenges abstract. Int. J. Comp. Sci. Mobile Comput. 3(1), 408\u2013417 (2014)","journal-title":"Int. J. Comp. Sci. Mobile Comput."},{"issue":"12","key":"15_CR2","first-page":"6","volume":"3","author":"A Kaid","year":"2015","unstructured":"Kaid, A., Ali, S., Kulkarni, U.V.: Characteristics, applications and challenges in mobile ad-hoc networks (MANET): overview. Wirel. Netw. 3(12), 6\u201312 (2015)","journal-title":"Wirel. Netw."},{"key":"15_CR3","first-page":"128","volume":"3","author":"D Eldein","year":"2017","unstructured":"Eldein, D., Ahmed, M., Khalifa, O.O.: An overview of MANETs: applications, characteristics, challenges and recent issues. IJEAT 3, 128\u2013133 (2017)","journal-title":"IJEAT"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Patel, D.N., Patel, S.B., Hemangi, R.: A survey of reactive routing protocols in MANET. In: International Conference on Information Communication and Embedded Systems (ICICES 2014), pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/ICICES.2014.7033833"},{"issue":"3","key":"15_CR5","first-page":"498","volume":"4","author":"H Kaur","year":"2013","unstructured":"Kaur, H., Sahni, V., Bala, M.: A survey of reactive, proactive and hybrid routing protocols in MANET: a review. Network 4(3), 498\u2013500 (2013)","journal-title":"Network"},{"issue":"1","key":"15_CR6","first-page":"1","volume":"3","author":"A Hinds","year":"2013","unstructured":"Hinds, A., Ngulube, M., Zhu, S., Al-aqrabi, H.: A review of routing protocols for mobile ad-hoc networks (MANET). Int. J. Inf. Educ. Technol. 3(1), 1\u20135 (2013)","journal-title":"Int. J. Inf. Educ. Technol."},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Alslaim, M.N., Alaqel, H.A., Zaghloul, S.S.: A comparative study of MANET routing protocols. In: The Third International Conference on e-Technologies and Networks for Development (ICeND 2014), pp. 178\u2013182. IEEE (2014)","DOI":"10.1109\/ICeND.2014.6991375"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Kerrache, C.A., Lagraa, N., Calafate, C.T., Lakas, A.: TROUVE\u202f: a trusted routing protocol for urban vehicular environments. In: 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 260\u2013267. IEEE (2015)","DOI":"10.1109\/WiMOB.2015.7347970"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Khalaf, M., et al.: A data science methodology based on machine learning algorithms for flood severity prediction. In 2018 IEEE Congress on Evolutionary Computation (CEC), pp. 1\u20138. IEEE (2015)","DOI":"10.1109\/CEC.2018.8477904"},{"issue":"3","key":"15_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.35741\/issn.0258-2724.54.3.1","volume":"54","author":"QM Yas","year":"2019","unstructured":"Yas, Q.M., Khalaf, M.: Reactive routing algorithm based trustworthy with less hop counts for mobile ad-hoc networks using fuzzy logic system. J. Southwest Jiaotong Univ. 54(3), 1\u201311 (2019)","journal-title":"J. Southwest Jiaotong Univ."},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Inaba, T., Sakamoto, S., Kulla, E., Caballe, S.: An integrated system for wireless cellular and ad-hoc networks using fuzzy logic. In: 2014 International Conference on Intelligent Networking and Collaborative Systems, pp. 157\u2013162. IEEE (2014)","DOI":"10.1109\/INCoS.2014.43"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.procs.2015.04.071","volume":"50","author":"EV Balan","year":"2015","unstructured":"Balan, E.V., Priyan, M.K., Gokulnath, C., Devi, G.U.: Fuzzy based intrusion detection systems in MANET. Procedia Comput. Sci. 50, 109\u2013114 (2015)","journal-title":"Procedia Comput. Sci."},{"issue":"03","key":"15_CR13","doi-asserted-by":"publisher","first-page":"1759002","DOI":"10.1142\/S0218001417590029","volume":"31","author":"QM Yas","year":"2017","unstructured":"Yas, Q.M., Zadain, A.A., Zaidan, B.B., Lakulu, M.B., Rahmatullah, B.: Towards on develop a framework for the evaluation and benchmarking of skin detectors based on artificial intelligent models using multi-criteria decision-making techniques. Int. J. Pattern Recogn. Artif. Intell. 31(03), 1759002 (2017)","journal-title":"Int. J. Pattern Recogn. Artif. Intell."},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.measurement.2017.09.027","volume":"114","author":"QM Yas","year":"2017","unstructured":"Yas, Q.M., Zaidan, A.A., Zaidan, B.B., Rahmatullah, B., Karim, H.A.: Comprehensive insights into evaluation and benchmarking of real-time skin detectors: review, open issues & challenges, and recommended solutions. Measurement 114, 243\u2013260 (2017)","journal-title":"Measurement"},{"key":"15_CR15","unstructured":"Jassim, H.S., Yussof, S., Kiong, T.S., Koh, S.P., Ismail, R.: A routing protocol based on trusted and shortest path selection for mobile ad hoc network. In: 2009 IEEE 9th Malaysia International Conference on Communications (MICC), pp. 547\u2013554. IEEE (2009)"},{"key":"15_CR16","unstructured":"Vlpduhpduh, K., et al.: Performance analysis of optimized trust AODV using ant algorithm. In: 2014 IEEE International Conference on Communications (ICC), pp. 1843\u20131848. IEEE (2014)"},{"issue":"9","key":"15_CR17","doi-asserted-by":"publisher","first-page":"1078","DOI":"10.1016\/j.comcom.2012.09.002","volume":"36","author":"H Xia","year":"2013","unstructured":"Xia, H., Jia, Z., Ju, L., Li, X., Sha, E.H.: Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Comput. Commun. 36(9), 1078\u20131093 (2013)","journal-title":"Comput. Commun."},{"key":"15_CR18","unstructured":"Chaudhary, A., Kumar, A., Tiwari, V.N.: A reliable solution against packet dropping attack due to malicious nodes using fuzzy logic in MANETs. In: 2014 International Conference on Reliability Optimization and Information Technology (ICROIT), pp. 178\u2013181. IEEE (2014). C. Science, E. Communication, and C. Science"},{"issue":"5","key":"15_CR19","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1007\/s11276-016-1211-5","volume":"23","author":"M Anuradha","year":"2016","unstructured":"Anuradha, M., Mala, G.S.A.: Cross-layer based congestion detection and routing protocol using fuzzy logic for MANET. Wirel. Netw. 23(5), 1373\u20131385 (2016)","journal-title":"Wirel. Netw."},{"issue":"3","key":"15_CR20","first-page":"622","volume":"10","author":"YH Robinson","year":"2016","unstructured":"Robinson, Y.H., Rajaram, M., Julie, E.G., Balaji, S.: Detection of black holes in MANET using collaborative watchdog with fuzzy logic. World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng. 10(3), 622\u2013628 (2016)","journal-title":"World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng."},{"issue":"2","key":"15_CR21","doi-asserted-by":"publisher","first-page":"449","DOI":"10.18576\/amis\/110213","volume":"11","author":"KV Kumar","year":"2017","unstructured":"Kumar, K.V., Sankar, T.J., Prabhakaran, M., Srinivasan, V.: Fuzzy logic based efficient multipath routing for mobile adhoc networks. Appl. Math. Inf. Sci. 11(2), 449\u2013455 (2017)","journal-title":"Appl. Math. Inf. Sci."},{"issue":"2","key":"15_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijsc.2012.3201","volume":"3","author":"A Sarkar","year":"2012","unstructured":"Sarkar, A.: Application of fuzzy logic in transport. Int. J. Soft Comput. 3(2), 1\u201321 (2012)","journal-title":"Int. J. Soft Comput."},{"issue":"1","key":"15_CR23","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1007\/s11277-017-4885-9","volume":"98","author":"S Ghasemnezhad","year":"2017","unstructured":"Ghasemnezhad, S., Ghaffari, A.: Fuzzy logic based reliable and real-time routing protocol for mobile ad hoc networks. Wirel. Pers. Commun. 98(1), 593\u2013611 (2017)","journal-title":"Wirel. Pers. Commun."},{"issue":"1","key":"15_CR24","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1080\/15325008.2016.1234008","volume":"45","author":"DK Sambariya","year":"2016","unstructured":"Sambariya, D.K., Prasad, R.: A novel fuzzy rule matrix design for fuzzy logic-based power system stabilizer. Electr. Power Compon. Syst. 45(1), 34\u201348 (2016)","journal-title":"Electr. Power Compon. Syst."},{"key":"15_CR25","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.asoc.2015.09.003","volume":"38","author":"S Chettibi","year":"2016","unstructured":"Chettibi, S., Chikhi, S.: Dynamic fuzzy logic and reinforcement learning for adaptive energy-efficient routing in mobile ad-hoc networks. Appl. Soft Comput. 38, 321\u2013328 (2016)","journal-title":"Appl. Soft Comput."},{"issue":"1","key":"15_CR26","first-page":"1","volume":"30","author":"AA Pouyan","year":"2015","unstructured":"Pouyan, A.A., Tabari, M.Y.: FPN-SAODV: using fuzzy petri nets for securing AODV routing protocol in mobile ad hoc network. Int. J. Commun Syst 30(1), 1\u201314 (2015)","journal-title":"Int. J. Commun Syst"},{"issue":"4","key":"15_CR27","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1049\/iet-ifs.2009.0140","volume":"4","author":"XLZ Jia","year":"2010","unstructured":"Jia, X.L.Z., Zhang, P.Z.R.: Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf. Secur. 4(4), 212\u2013232 (2010)","journal-title":"IET Inf. Secur."},{"issue":"7","key":"15_CR28","doi-asserted-by":"publisher","first-page":"2096","DOI":"10.1016\/j.adhoc.2012.02.009","volume":"11","author":"H Xia","year":"2013","unstructured":"Xia, H., Jia, Z., Li, X., Ju, L., Sha, E.H.: Ad hoc networks trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 11(7), 2096\u20132114 (2013)","journal-title":"Ad Hoc Netw."},{"key":"15_CR29","unstructured":"Keerthi, T.D.S., Venkataram, P.: AODV route maintenance using honeypots in MANETs. In: 2015 World Congress on Internet Security (WorldCIS), pp. 105\u2013112 (2015)"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Kumar, R.S.: A review and design study of cross-layer scheme based algorithm to reduce the link break in MANETs. In: 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, pp. 139\u2013143. IEEE (2013)","DOI":"10.1109\/ICPRIME.2013.6496462"},{"key":"15_CR31","unstructured":"Patel, R., Patel, N., Kamboj, P.: A comparative study and simulation of AODV MANET routing protocol in NS2 & NS3. In: 2014 International Conference on Computing for Sustainable Global Development (INDIACom), pp. 889\u2013894. IEEE (2014)"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Bouras, C., Charalambides, S., Drakoulelis, M., Kioumourtzis, G.: Simulation modelling practice and theory a tool for automating network simulation and processing tracing data files. Stimul. Model. Pract. Theory 1\u201321 ( 2012)","DOI":"10.1016\/j.simpat.2012.09.001"}],"container-title":["Communications in Computer and Information Science","Applied Computing to Support Industry: Innovation and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-38752-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,13]],"date-time":"2020-01-13T13:09:17Z","timestamp":1578920957000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-38752-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030387518","9783030387525"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-38752-5_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"8 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACRIT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Computing to Support Industry: Innovation and Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ramadi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Iraq","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acrit2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acritt.org.uk\/wp\/acrit-conferences\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"159","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}