{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T14:25:13Z","timestamp":1763389513687,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030863555"},{"type":"electronic","value":"9783030863562"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-86356-2_3","type":"book-chapter","created":{"date-parts":[[2021,12,11]],"date-time":"2021-12-11T13:02:41Z","timestamp":1639227761000},"page":"31-41","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Performance Evaluation of VANET Routing Protocol Using a 2k Full Factorial Design"],"prefix":"10.1007","author":[{"given":"Souad","family":"Ajjaj","sequence":"first","affiliation":[]},{"given":"Mohammed-Alamine","family":"El Houssaini","sequence":"additional","affiliation":[]},{"given":"Mustapha","family":"Hain","sequence":"additional","affiliation":[]},{"given":"Souad","family":"El Houssaini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,12,12]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"100179","DOI":"10.1016\/j.vehcom.2019.100179","volume":"19","author":"M Arif","year":"2019","unstructured":"Arif, M., Wang, G., Bhuiyan, M.Z.A., Wang, T., Chen, J.: A survey on security attacks in VANETs: Communication, applications and challenges. Veh. Commun. 19, 100179 (2019). https:\/\/doi.org\/10.1016\/j.vehcom.2019.100179","journal-title":"Veh. Commun."},{"key":"3_CR2","doi-asserted-by":"publisher","unstructured":"Law, A.M.: A tutorial on design of experiments for simulation modeling. In: Proceedings of the Winter Simulation Conference 2014, pp. 66\u201380 (2014). https:\/\/doi.org\/10.1109\/WSC.2014.7019878","DOI":"10.1109\/WSC.2014.7019878"},{"key":"3_CR3","doi-asserted-by":"publisher","unstructured":"Jones, R.: Design and analysis of experiments (fifth edition), Douglas Montgomery, John Wiley and Sons, 2001, 684 pages, \u00a333.95. Qual. Reliab. Eng. Int. 18, 163 (2002). https:\/\/doi.org\/10.1002\/qre.458","DOI":"10.1002\/qre.458"},{"key":"3_CR4","first-page":"6418","volume":"3","author":"P Gupta","year":"2014","unstructured":"Gupta, P., Chaba, Y.: Performance analysis of routing protocols in vehicular ad hoc networks for CBR applications over UDP connections. Int. J. Eng. Comput. Sci. 3, 6418\u20136421 (2014)","journal-title":"Int. J. Eng. Comput. Sci."},{"key":"3_CR5","doi-asserted-by":"publisher","unstructured":"Hu, S., Jia, Y., She, C.: Performance analysis of VANET routing protocols and implementation of a VANET terminal. In: 2017 International Conference on Computer Technology, Electronics and Communication (ICCTEC), pp. 1248\u20131252 (2017). https:\/\/doi.org\/10.1109\/ICCTEC.2017.00272","DOI":"10.1109\/ICCTEC.2017.00272"},{"key":"3_CR6","doi-asserted-by":"publisher","unstructured":"Paul, B., Roy, A., Paul, S.K.: Comparison of DSR, AODV, and DSDV routing protocols with varying pause time node density over TCP CBR connections in VANET. In: 2014 International Conference on Computational Intelligence and Communication Networks, pp. 374\u2013379 (2014). https:\/\/doi.org\/10.1109\/CICN.2014.90","DOI":"10.1109\/CICN.2014.90"},{"issue":"4","key":"3_CR7","doi-asserted-by":"publisher","first-page":"5099","DOI":"10.1007\/s11277-017-4770-6","volume":"97","author":"KC Purohit","year":"2017","unstructured":"Purohit, K.C., Dimri, S.C., Jasola, S.: Mitigation and performance analysis of routing protocols under black-hole attack in vehicular ad-hoc network (VANET). Wireless Pers. Commun. 97(4), 5099\u20135114 (2017). https:\/\/doi.org\/10.1007\/s11277-017-4770-6","journal-title":"Wireless Pers. Commun."},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"e5017","DOI":"10.1002\/cpe.5017","volume":"32","author":"SS Narayanan","year":"2018","unstructured":"Narayanan, S.S., Gurusamy, M.: Modified secure AODV protocol to prevent wormhole attack in MANET. Concurr. Comput. Pract. Exp. 32, e5017 (2018). https:\/\/doi.org\/10.1002\/cpe.5017","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"3_CR9","volume-title":"Alternative Methods of Regression","author":"Y Dodge","year":"1993","unstructured":"Dodge, Y., Rousson, V.: Alternative Methods of Regression. A Wiley-Interscience Publication, New York (1993)"},{"key":"3_CR10","doi-asserted-by":"publisher","unstructured":"Taghizadegan, S.: Road map to lean six sigma continuous improvement engineering strategies. In: Taghizadegan, S. (ed.) Essentials of Lean Six Sigma, pp. 107\u2013174. Butterworth-Heinemann, Burlington (2006). https:\/\/doi.org\/10.1016\/B978-012370502-0\/50010-2","DOI":"10.1016\/B978-012370502-0\/50010-2"},{"key":"3_CR11","unstructured":"Das, S.R., Belding-Royer, E.M., Perkins, C.E.: Ad Hoc On-Demand Distance Vector (AODV) Routing. https:\/\/tools.ietf.org\/html\/rfc3561. Accessed 20 Dec 2020"},{"issue":"3&4","key":"3_CR12","first-page":"128","volume":"5","author":"D Krajzewicz","year":"2012","unstructured":"Krajzewicz, D., Erdmann, J., Behrisch, M., Bieker-Walz, L.: Recent development and applications of SUMO - simulation of urban MObility. Int. J. Adv. Syst. Measur. 5(3 & 4), 128\u2013138 (2012)","journal-title":"Int. J. Adv. Syst. Measur."},{"key":"3_CR13","doi-asserted-by":"publisher","first-page":"879","DOI":"10.23956\/ijarcsse\/V7I4\/0116","volume":"7","author":"S Devi","year":"2017","unstructured":"Devi, S., Mamini, K., Bhargavi, Y.: Performance analysis of AODV under worm hole attack. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 7, 879\u2013883 (2017). https:\/\/doi.org\/10.23956\/ijarcsse\/V7I4\/0116","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"3_CR14","doi-asserted-by":"publisher","unstructured":"Pranav, K., Kapang, L., Tuithung, T.: Simulation based analysis of adhoc routing protocol in urban and highway scenario of VANET (2011). https:\/\/doi.org\/10.5120\/1716-2302","DOI":"10.5120\/1716-2302"},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"Viswacheda Duduku, V., Chekima, A., Wong, F., Dargham, J.: A study on vehicular ad hoc networks, 1 December 2015. https:\/\/doi.org\/10.1109\/AIMS.2015.73","DOI":"10.1109\/AIMS.2015.73"},{"key":"3_CR16","first-page":"15","volume":"44","author":"V Kumar","year":"2012","unstructured":"Kumar, V., Kush, A.: Worm_secure protocol for wormhole protection in AODV routing protocol. Int. J. Comput. Appl. 44, 15\u201321 (2012)","journal-title":"Int. J. Comput. Appl."}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-86356-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,11]],"date-time":"2021-12-11T13:03:18Z","timestamp":1639227798000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-86356-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030863555","9783030863562"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-86356-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"12 December 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"UNet","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Ubiquitous Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"unet2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/unet-conf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}