{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:09:19Z","timestamp":1743001759761,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030861292"},{"type":"electronic","value":"9783030861308"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-86130-8_40","type":"book-chapter","created":{"date-parts":[[2021,9,8]],"date-time":"2021-09-08T08:12:16Z","timestamp":1631088736000},"page":"510-522","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["TFRA: Trajectory-Based Message Ferry Recognition Attack in UAV Network"],"prefix":"10.1007","author":[{"given":"Yuting","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yulei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lihong","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,9]]},"reference":[{"key":"40_CR1","unstructured":"Crazyflie 2.1. https:\/\/www.bitcraze.io\/products\/crazyflie-2-1\/"},{"key":"40_CR2","unstructured":"Radar data processing. https:\/\/grasswiki.osgeo.org\/wiki\/Radar_data_processing"},{"key":"40_CR3","unstructured":"Sklearn:feature selection and recursive feature elimination. https:\/\/scikit-learn.org, https:\/\/www.scikit-yb.org"},{"key":"40_CR4","doi-asserted-by":"crossref","unstructured":"Agrawal, P., Ghosh, R.K., Das, S.K.: Cooperative black and gray hole attacks in mobile ad hoc networks. In: Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, pp. 310\u2013314 (2008)","DOI":"10.1145\/1352793.1352859"},{"issue":"10","key":"40_CR5","doi-asserted-by":"publisher","first-page":"25809","DOI":"10.3390\/s151025809","volume":"15","author":"M Alnuaimi","year":"2015","unstructured":"Alnuaimi, M., Shuaib, K., Alnuaimi, K., Abdel-Hafez, M.: Data gathering in delay tolerant wireless sensor networks using a ferry. Sensors 15(10), 25809\u201325830 (2015)","journal-title":"Sensors"},{"key":"40_CR6","doi-asserted-by":"crossref","unstructured":"Alt, H., Godau, M.: Computing the fr\u00e9chet distance between two polygonal curves. Int. J. Comput. Geomet. Appl. 5(01n02), 75\u201391 (1995)","DOI":"10.1142\/S0218195995000064"},{"key":"40_CR7","unstructured":"Ammar, M., Chakrabarty, D., Sarma, A.D., Kalyanasundaram, S., Lipton, R.J.: Algorithms for message ferrying on mobile ad hoc networks. In: IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science. Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik (2009)"},{"issue":"3","key":"40_CR8","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TMC.2016.2561291","volume":"16","author":"M Asadpour","year":"2016","unstructured":"Asadpour, M., Hummel, K.A., Giustiniano, D., Draskovic, S.: Route or carry: motion-driven packet forwarding in micro aerial vehicle networks. IEEE Trans. Mobile Comput. 16(3), 843\u2013856 (2016)","journal-title":"IEEE Trans. Mobile Comput."},{"issue":"3","key":"40_CR9","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1109\/TITS.2010.2048101","volume":"11","author":"S Atev","year":"2010","unstructured":"Atev, S., Miller, G., Papanikolopoulos, N.P.: Clustering of vehicle trajectories. IEEE Trans. Intell. Transp. Syst. 11(3), 647\u2013657 (2010)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"40_CR10","unstructured":"Barton, D.K.: Modern radar system analysis. ah (1988)"},{"key":"40_CR11","unstructured":"Tariq, M.M.B., Ammar, M., Zegura, E.: Message ferry route design for sparse ad hoc networks with mobile nodes. In: Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 37\u201348 (2006)"},{"key":"40_CR12","doi-asserted-by":"publisher","unstructured":"Deza, M.M., Deza, E.: Encyclopedia of distances. In: Encyclopedia of distances, pp. 1\u2013583. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00234-2","DOI":"10.1007\/978-3-642-00234-2"},{"issue":"3","key":"40_CR13","doi-asserted-by":"publisher","first-page":"2739","DOI":"10.1109\/TVT.2019.2891127","volume":"68","author":"X Guangjie Han","year":"2019","unstructured":"Guangjie Han, X., Miao, H.W., Guizani, M., Zhang, W.: CPSLP: a cloud-based scheme for protecting source location privacy in wireless sensor networks using multi-sinks. IEEE Trans. Veh. Technol. 68(3), 2739\u20132750 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"40_CR14","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1016\/j.future.2017.08.044","volume":"82","author":"G Han","year":"2018","unstructured":"Han, G., Zhou, L., Wang, H., Zhang, W., Chan, S.: A source location protection protocol based on dynamic routing in WSNS for the social internet of things. Futur. Gener. Comput. Syst. 82, 689\u2013697 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"40_CR15","doi-asserted-by":"crossref","unstructured":"Hu, C.-L., Lin, H.-Y., Hsu, Y.-F., Huang, S.-Z., Hui, L., Zhang, Z.: Message forwarding with ferries in delay-tolerant networks. In: 2019 28th Wireless and Optical Communications Conference (WOCC), pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/WOCC.2019.8770595"},{"key":"40_CR16","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.jnca.2018.10.008","volume":"125","author":"J Jiang","year":"2019","unstructured":"Jiang, J., Han, G., Wang, H., Guizani, M.: A survey on location privacy protection in wireless sensor networks. J. Netw. Comput. Appl. 125, 93\u2013114 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"40_CR17","doi-asserted-by":"crossref","unstructured":"Konstantopoulos, C., Pantziou, G., Vathis, N., Nakos, V., Gavalas, D.: Efficient mobile sink-based data gathering in wireless sensor networks with guaranteed delay. In: Proceedings of the 12th ACM International Symposium on Mobility Management and Wireless Access, pp. 47\u201354 (2014)","DOI":"10.1145\/2642668.2642674"},{"issue":"1","key":"40_CR18","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s10846-010-9439-2","volume":"62","author":"JG Manathara","year":"2011","unstructured":"Manathara, J.G., Sujit, P.B., Beard, R.W.: Multiple UAV coalitions for a search and prosecute mission. J. Intell. Robot. Syst. 62(1), 125\u2013158 (2011)","journal-title":"J. Intell. Robot. Syst."},{"issue":"1\u20134","key":"40_CR19","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/s10846-010-9497-5","volume":"61","author":"I Maza","year":"2011","unstructured":"Maza, I., Caballero, F., Capit\u00e1n, J., Dios, J.R.M., Ollero, A.: Experimental results in multi-UAV coordination for disaster management and civil security applications. J. Intell. Robot. Syst. 61(1\u20134), 563\u2013585 (2011)","journal-title":"J. Intell. Robot. Syst."},{"key":"40_CR20","doi-asserted-by":"crossref","unstructured":"Merino, L., Caballero, F., Ramiro Mart\u00ednez-De-Dios, J., Maza, I., Ollero, A.: An unmanned aircraft system for automatic forest fire monitoring and measurement. J. Intell. Robot. Syst. 65(1\u20134), 533\u2013548 (2012)","DOI":"10.1007\/s10846-011-9560-x"},{"key":"40_CR21","doi-asserted-by":"crossref","unstructured":"Pu, C., Carpenter, L.: To route or to ferry: a hybrid packet forwarding algorithm in flying ad hoc networks. In: 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA), pp. 1\u20138. IEEE (2019)","DOI":"10.1109\/NCA.2019.8935011"},{"issue":"5","key":"40_CR22","doi-asserted-by":"publisher","first-page":"2407","DOI":"10.1109\/TVT.2013.2291811","volume":"63","author":"H Salarian","year":"2013","unstructured":"Salarian, H., Chin, K.-W., Naghdy, F.: An energy-efficient mobile-sink path selection strategy for wireless sensor networks. IEEE Trans. Veh. Technol. 63(5), 2407\u20132419 (2013)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"40_CR23","doi-asserted-by":"crossref","unstructured":"Shah, R.C., Roy, S., Jain, S., Brunette, W.: mules: modeling and analysis of a three-tier architecture for sparse sensor networks (2003)","DOI":"10.1016\/S1570-8705(03)00003-9"},{"issue":"6","key":"40_CR24","doi-asserted-by":"publisher","first-page":"5917","DOI":"10.1109\/TVT.2019.2909505","volume":"68","author":"H Wang","year":"2019","unstructured":"Wang, H., Han, G., Zhang, W., Guizani, M., Chan, S.: A probabilistic source location privacy protection scheme in wireless sensor networks. IEEE Trans. Veh. Technol. 68(6), 5917\u20135927 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"40_CR25","doi-asserted-by":"crossref","unstructured":"Wang, H., Han, G., Zhou, L., Ansere, J.A., Zhang, W.: A source location privacy protection scheme based on ring-loop routing for the IoT. Comput. Netw. 148, 142\u2013150 (2019)","DOI":"10.1016\/j.comnet.2018.11.005"},{"issue":"12","key":"40_CR26","doi-asserted-by":"publisher","first-page":"1430","DOI":"10.1109\/TMC.2008.58","volume":"7","author":"G Xing","year":"2008","unstructured":"Xing, G., Wang, T., Xie, Z., Jia, W.: Rendezvous planning in wireless sensor networks with mobile elements. IEEE Trans. Mob. Comput. 7(12), 1430\u20131443 (2008)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"40_CR27","doi-asserted-by":"crossref","unstructured":"Peng, J., Gao, H., Liu, L., Wu, Y., Xu, X.: FNTAR: a future network topology-aware routing protocol in UAV networks. In: IEEE Wireless Communications and Networking Conference (WCNC) (2020)","DOI":"10.1109\/WCNC45663.2020.9120842"},{"key":"40_CR28","doi-asserted-by":"publisher","first-page":"2230","DOI":"10.1109\/TVT.2019.2962391","volume":"69","author":"J Yoon","year":"2019","unstructured":"Yoon, J., Lee, A.-H., Lee, H.: Rendezvous: opportunistic data delivery to mobile users by UAVs through target trajectory prediction. IEEE Trans. Veh. Technol. 69, 2230\u20132245 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1\u20134","key":"40_CR29","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s10846-012-9737-y","volume":"69","author":"S Zhu","year":"2013","unstructured":"Zhu, S., Wang, D., Low, C.B.: Ground target tracking using UAV with input constraints. J. Intell. Robot. Syst. 69(1\u20134), 417\u2013429 (2013)","journal-title":"J. Intell. Robot. Syst."}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-86130-8_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,8]],"date-time":"2021-09-08T08:40:14Z","timestamp":1631090414000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-86130-8_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030861292","9783030861308"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-86130-8_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"9 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Algorithms, Systems, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Open","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"315","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"103","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}