{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:51:33Z","timestamp":1743133893310,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030493356"},{"type":"electronic","value":"9783030493363"}],"license":[{"start":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T00:00:00Z","timestamp":1597276800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T00:00:00Z","timestamp":1597276800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-49336-3_30","type":"book-chapter","created":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T12:05:28Z","timestamp":1597233928000},"page":"299-308","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detection and Prevention of Black Hole Attack Using Trusted and Secure Routing in Wireless Sensor Network"],"prefix":"10.1007","author":[{"given":"Dhananjay","family":"Bisen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bhavana","family":"Barmaiya","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ritu","family":"Prasad","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Praneet","family":"Saurabh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,8,13]]},"reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Cao, Q., Abdelzaher, T., Stankovic, J., Whitehouse, K., Luo, L.: Declarative tracepoints: a programmable and application independent debugging system for wireless sensor networks. In: Proceedings of the ACM SenSys, Raleigh, NC, USA, pp. 85\u201398 (2008)","DOI":"10.1145\/1460412.1460422"},{"issue":"7","key":"30_CR2","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1109\/TMC.2010.36","volume":"9","author":"T Shu","year":"2010","unstructured":"Shu, T., Krunz, M., Liu, S.: Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Trans. Mobile Comput. 9(7), 941\u2013954 (2010)","journal-title":"IEEE Trans. Mobile Comput."},{"issue":"2","key":"30_CR3","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.adhoc.2008.04.007","volume":"7","author":"O Souihli","year":"2009","unstructured":"Souihli, O., Frikha, M., Hamouda, B.M.: Load-balancing in MANET shortest-path routing protocols. Ad Hoc Netw. 7(2), 431\u2013442 (2009)","journal-title":"Ad Hoc Netw."},{"key":"30_CR4","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-981-10-7563-6_40","volume-title":"Information and Decision Sciences","author":"S Khan","year":"2017","unstructured":"Khan, S., Prasad, R., Saurabh, P., Verma, B.: Weight based secure approach for identifying selfishness behavior of node in MANET. In: Satapathy, S., Tavares, J., Bhateja, V., Mohanty, J. (eds.) Information and Decision Sciences. Advances in Intelligent Systems and Computing, vol. 701, pp. 387\u2013397. Springer, Singapore (2017)"},{"issue":"4","key":"30_CR5","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1109\/TNET.2007.904002","volume":"16","author":"I Aad","year":"2008","unstructured":"Aad, I., Hubaux, J.-P., Knightly, W.E.: Impact of denial of service attacks on ad hoc networks. IEEE-ACM Trans. Netw. 16(4), 791\u2013802 (2008)","journal-title":"IEEE-ACM Trans. Netw."},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Mandala, S., Jenni, K., Ngadi, A., Kamat, M., Coulibaly, Y.: Quantifying the severity of blackhole attack in wireless mobile adhoc networks. In: Security in Computing and Communications. Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-662-44966-0_6"},{"issue":"9","key":"30_CR7","doi-asserted-by":"publisher","first-page":"2013","DOI":"10.1109\/TIFS.2016.2570740","volume":"11","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Dong, M., Ota, K., Liu, A.: ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 11(9), 2013\u20132028 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"30_CR8","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1109\/TPDS.2015.2388482","volume":"27","author":"M Dong","year":"2016","unstructured":"Dong, M., Ota, K., Liu, A., Guo, M.: Joint optimization of lifetime and transport delay under reliability constraint wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 27(1), 225\u2013236 (2016)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"30_CR9","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1109\/TSC.2015.2449314","volume":"9","author":"X Liu","year":"2016","unstructured":"Liu, X., Dong, M., Ota, K., Hung, P., Liu, A.: Service pricing decision in cyber-physical systems: insights from game theory. IEEE Trans. Serv. Comput. 9(2), 186\u2013198 (2016)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"6","key":"30_CR10","doi-asserted-by":"publisher","first-page":"1952","DOI":"10.1109\/TNET.2013.2288646","volume":"22","author":"W Dong","year":"2014","unstructured":"Dong, W., Liu, Y., He, Y., Zhu, T., Chen, C.: Measurement and analysis on the packet delivery performance in a large-scale sensor network. IEEE\/ACM Trans. Netw. 22(6), 1952\u20131963 (2014)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"3","key":"30_CR11","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1109\/TNSM.2015.2448656","volume":"12","author":"PV Illiano","year":"2015","unstructured":"Illiano, P.V., Lupu, C.E.: Detecting malicious data injections in event detection wireless sensor networks. IEEE Trans. Netw. Serv. Manag. 12(3), 496\u2013512 (2015)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Ma, Q., Liu, K., Zhu, T., Gong, W., Liu, Y.: BOND: exploring hidden bottleneck nodes in large-scale wireless sensor networks. In: Proceedings of the IEEE ICDCS, Madrid, Spain, pp. 399\u2013408 (2014)","DOI":"10.1109\/ICDCS.2014.48"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Magistretti, E., Gurewitz, O., Knightly, E.: Inferring and mitigating a link\u2019s hindering transmissions in managed 802.11 wireless networks. In: Proceedings of the ACM MobiCom, Chicago, IL, USA, pp. 305\u2013316 (2010)","DOI":"10.1145\/1859995.1860030"},{"key":"30_CR14","unstructured":"Son, D., Krishnamachari, B., Heidemann, J.: Experimental analysis of concurrent packet transmissions in low-power wireless networks. In: Proceedings of the ACM SenSys, San Diego, CA, USA, pp. 237\u2013250 (2005)"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Li, X., Ma, Q., Cao, Z., Liu, K., Liu, Y.: Enhancing visibility of network performance in large-scale sensor networks. In: Proceedings of the IEEE ICDCS, Madrid, Spain, pp. 409\u2013418 (2014)","DOI":"10.1109\/ICDCS.2014.49"},{"key":"30_CR16","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.eswa.2016.03.042","volume":"60","author":"P Saurabh","year":"2016","unstructured":"Saurabh, P., Verma, B.: An efficient proactive artificial immune system based anomaly detection and prevention system. Expert Syst. Appl. 60, 311\u2013320 (2016)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"30_CR17","first-page":"289","volume":"15","author":"P Saurabh","year":"2018","unstructured":"Saurabh, P., Verma, B.: Immunity inspired cooperative agent based security system. Int. Arab J. Inf. Technol. 15(2), 289\u2013295 (2018)","journal-title":"Int. Arab J. Inf. Technol."},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Saurabh, P., Verma, B., Sharma, S.: An immunity inspired anomaly detection system: a general framework. In: Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012). Advances in Intelligent Systems and Computing, vol. 202, pp. 417\u2013428. Springer (2012)","DOI":"10.1007\/978-81-322-1041-2_36"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Saurabh, P., Verma, B., Sharma, S.: Biologically inspired computer security system: the way ahead. In: Recent Trends in Computer Networks & Distributed Systems Security. CCIS, vol. 335, pp. 474\u2013484. Springer (2011)","DOI":"10.1007\/978-3-642-34135-9_46"}],"container-title":["Advances in Intelligent Systems and Computing","Hybrid Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49336-3_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T12:57:50Z","timestamp":1597237070000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-49336-3_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,13]]},"ISBN":["9783030493356","9783030493363"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49336-3_30","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,13]]},"assertion":[{"value":"13 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Hybrid Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sehore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"his2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/his19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}