{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T19:10:05Z","timestamp":1751569805977,"version":"3.41.0"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031877711"},{"type":"electronic","value":"9783031877728"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87772-8_21","type":"book-chapter","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T07:37:39Z","timestamp":1745307459000},"page":"244-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Secure Routing Protocol for\u00a0Opportunistic Networks"],"prefix":"10.1007","author":[{"given":"Jagdeep","family":"Singh","sequence":"first","affiliation":[]},{"given":"Sanjay Kumar","family":"Dhurandher","sequence":"additional","affiliation":[]},{"given":"Isaac","family":"Woungang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,23]]},"reference":[{"issue":"11","key":"21_CR1","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/MCOM.2006.248176","volume":"44","author":"L Pelusi","year":"2006","unstructured":"Pelusi, L., Passarella, A., Conti, M.: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Mag. 44(11), 134\u2013141 (2006). https:\/\/doi.org\/10.1109\/MCOM.2006.248176","journal-title":"IEEE Commun. Mag."},{"key":"21_CR2","unstructured":"Vahdat, A., Becker, D.: Epidemic routing for partially connected ad hoc networks, Technical Report CS-2000-06. Duke University, Durham, NC, USA, Department of Computer Science (2000)"},{"issue":"4","key":"21_CR3","doi-asserted-by":"publisher","first-page":"3191","DOI":"10.1109\/JSYST.2017.2720757","volume":"12","author":"SK Dhurandher","year":"2018","unstructured":"Dhurandher, S.K., Kumar, A., Obaidat, M.S.: Cryptographybased misbehavior detection and trust control mechanism for opportunistic network systems. IEEE Syst. J. 12(4), 3191\u20133202 (2018)","journal-title":"IEEE Syst. J."},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Naveena, S., Senthilkumar, C., Manikandan, T.: Analysis and countermeasures of blackhole attack in MANET by employing trust-based routing. In: Proceeding of the 6th IEEE International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 1222\u20131227 (2020)","DOI":"10.1109\/ICACCS48705.2020.9074282"},{"key":"21_CR5","first-page":"102425","volume":"51","author":"E Elmahdi","year":"2020","unstructured":"Elmahdi, E., Yoo, S.M., Sharshembiev, K.: Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks. J. Inf. Secur. Appl. 51, 102425 (2020)","journal-title":"J. Inf. Secur. Appl."},{"key":"21_CR6","doi-asserted-by":"publisher","unstructured":"Su, B., Zhu, B.: TBMOR: a lightweight trust-based model for secure routing of opportunistic networks. Egyptian Inf. J. 24(2), 205\u2013214 (2023). ISSN 1110-8665, https:\/\/doi.org\/10.1016\/j.eij.2023.02.002","DOI":"10.1016\/j.eij.2023.02.002"},{"issue":"6","key":"21_CR7","first-page":"1683","volume":"20","author":"SK Dhurandher","year":"2019","unstructured":"Dhurandher, S.K., Singh, J., Woungang, I., Rodrigues, J.J.: Disjoint multipath based secure routing in opportunistic networks. J. Internet Technol. 20(6), 1683\u20131692 (2019)","journal-title":"J. Internet Technol."},{"issue":"2","key":"21_CR8","doi-asserted-by":"publisher","first-page":"73","DOI":"10.2174\/2215081106666161206124014","volume":"5","author":"DK Sharma","year":"2016","unstructured":"Sharma, D.K., Dhurandher, S.K., Woungang, I., Arora, J., Gupta, H.: History-based secure routing protocol to detect blackhole and greyhole attacks in opportunistic networks. Recent Adv. Commun. Netw. Technol. 5(2), 73\u201389 (2016)","journal-title":"Recent Adv. Commun. Netw. Technol."},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Keranen, A., Ott, J., Karkkainen, T.: The one simulator for dtn protocol evaluation. In: International Conference on Simulation Tools and Techniques, ICST, Rome Italy, pp. 1\u201310 (2009)","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87772-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T18:38:05Z","timestamp":1751567885000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87772-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877711","9783031877728"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87772-8_21","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"23 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}