{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:11:33Z","timestamp":1725909093372},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319569901"},{"type":"electronic","value":"9783319569918"}],"license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-56991-8_50","type":"book-chapter","created":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T23:57:16Z","timestamp":1503359836000},"page":"689-701","source":"Crossref","is-referenced-by-count":0,"title":["JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in Mobile Adhoc Network"],"prefix":"10.1007","author":[{"given":"Burhan Ul Islam","family":"Khan","sequence":"first","affiliation":[]},{"given":"Nurul Fariza","family":"Zulkurnain","sequence":"additional","affiliation":[]},{"given":"Rashidah F.","family":"Olanrewaju","sequence":"additional","affiliation":[]},{"given":"Gousia","family":"Nissar","sequence":"additional","affiliation":[]},{"given":"Asifa Mehraj","family":"Baba","sequence":"additional","affiliation":[]},{"given":"Sajaad Ahmad","family":"Lone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"key":"50_CR1","first-page":"2124","volume":"61","author":"M Jin","year":"2014","unstructured":"Jin, M., Du, Z.: Management innovation and information technology. WIT Trans. Inf. Commun. Technol. 61, 2124 (2014)","journal-title":"WIT Trans. Inf. Commun. Technol."},{"key":"50_CR2","volume-title":"Wireless Sensor and Ad Hoc Networks under Diversified Network Scenarios","author":"S Sarkar","year":"2012","unstructured":"Sarkar, S.: Wireless Sensor and Ad Hoc Networks under Diversified Network Scenarios. Artech House, Boston (2012)"},{"key":"50_CR3","volume-title":"Mobile Ad Hoc Networks: Current Status and Future Trends","author":"J Loo","year":"2012","unstructured":"Loo, J., Mauri, J., Ortiz, J.: Mobile Ad Hoc Networks: Current Status and Future Trends. CRC Press, Inc., Boca Raton (2012). p. 538"},{"key":"50_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-6111-2","volume-title":"Wireless Network Design","author":"J Kennington","year":"2011","unstructured":"Kennington, J., Olinick, E., Rajan, D.: Wireless Network Design. Springer, New York (2011)"},{"issue":"1","key":"50_CR5","first-page":"25","volume":"77","author":"RF Olanrewaju","year":"2015","unstructured":"Olanrewaju, R.F., Khan, B., Anwar, F., Shah, A.: Strategic profiling for behaviour visualization of malicious node in MANETs using Game Theory. J. Theor. Appl. Inf. Technol. 77(1), 25\u201343 (2015)","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"50_CR6","doi-asserted-by":"crossref","unstructured":"Amine, A., Ait Mohamed, O., Benatallah, B.: Network Security Technologies: Design and Applications. IGI Global, p. 330 (2013)","DOI":"10.4018\/978-1-4666-4789-3"},{"key":"50_CR7","doi-asserted-by":"crossref","DOI":"10.1201\/b14574","volume-title":"Building Next-Generation Converged Networks: Theory and Practice","author":"A Pathan","year":"2013","unstructured":"Pathan, A., Monowar, M., Fadlullah, Z.: Building Next-Generation Converged Networks: Theory and Practice. CRC Press, Boca Raton (2013)"},{"key":"50_CR8","volume-title":"Security of self-organizing networks: MANET, WSN, WMN, VANET","author":"A Pathan","year":"2011","unstructured":"Pathan, A.: Security of self-organizing networks: MANET, WSN, WMN, VANET. Auerbach Pub., Boca Raton (2011)"},{"issue":"12","key":"50_CR9","first-page":"286","volume":"7","author":"B Khan","year":"2013","unstructured":"Khan, B., Olanrewaju, R., Habaebi, M.: Malicious behaviour of node and its significant security techniques in MANET-A review. Aust. J. Basic Appl. Sci. 7(12), 286\u2013293 (2013)","journal-title":"Aust. J. Basic Appl. Sci."},{"issue":"3","key":"50_CR10","first-page":"10","volume":"2","author":"B Khan","year":"2015","unstructured":"Khan, B., Olanrewaju, R., Mir, R., Adebayo, B.: Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach. Am. J. Comput. Sci. Eng. 2(3), 10\u201319 (2015)","journal-title":"Am. J. Comput. Sci. Eng."},{"issue":"1","key":"50_CR11","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/JCN.2013.000007","volume":"15","author":"M Marimuthu","year":"2013","unstructured":"Marimuthu, M., Krishnamurthi, I.: Enhanced OLSR for defense against DOS attack in ad hoc networks. J. Commun. Netw. 15(1), 31\u201337 (2013)","journal-title":"J. Commun. Netw."},{"issue":"3","key":"50_CR12","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1049\/iet-ifs.2011.0234","volume":"6","author":"R Venkataraman","year":"2012","unstructured":"Venkataraman, R., RamaRao, T., Pushpalatha, M.: Regression-based trust model for mobile ad hoc networks. IET Inf. Secur. 6(3), 131\u2013140 (2012)","journal-title":"IET Inf. Secur."},{"issue":"2","key":"50_CR13","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1049\/iet-ifs.2010.0314","volume":"7","author":"X Lv","year":"2013","unstructured":"Lv, X., Li, H.: Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks. IET Inf. Secur. 7(2), 61\u201366 (2013)","journal-title":"IET Inf. Secur."},{"issue":"9","key":"50_CR14","doi-asserted-by":"crossref","first-page":"2211","DOI":"10.1109\/TPDS.2013.161","volume":"25","author":"P Zhang","year":"2014","unstructured":"Zhang, P., Lin, C., Jiang, Y., Fan, Y., Shen, X.: A lightweight encryption scheme for network-coded mobile ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 25(9), 2211\u20132221 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"50_CR15","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1109\/SURV.2011.020211.00045","volume":"14","author":"S Zhao","year":"2012","unstructured":"Zhao, S., Aggarwal, A., Frost, R., Bai, X.: A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun. Surv. Tutorials 14(2), 380\u2013400 (2012)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"4","key":"50_CR16","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1049\/iet-ifs.2012.0244","volume":"7","author":"J Dhanapal","year":"2013","unstructured":"Dhanapal, J., Srivatsa, S.: Link quality-based cache replacement technique in mobile ad hoc network. IET Inf. Secur. 7(4), 277\u2013282 (2013)","journal-title":"IET Inf. Secur."},{"issue":"4","key":"50_CR17","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1109\/CC.2015.7114058","volume":"12","author":"S Xi","year":"2015","unstructured":"Xi, S., Liang, S., Jianfeng, M., Zhuo, M.: A trust management scheme based on behavior feedback for opportunistic networks. China Commun. 12(4), 117\u2013129 (2015)","journal-title":"China Commun."},{"issue":"7","key":"50_CR18","doi-asserted-by":"crossref","first-page":"2096","DOI":"10.1016\/j.adhoc.2012.02.009","volume":"11","author":"H Xia","year":"2013","unstructured":"Xia, H., Jia, Z., Li, X., Ju, L., Sha, E.: Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 11(7), 2096\u20132114 (2013)","journal-title":"Ad Hoc Netw."},{"key":"50_CR19","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.adhoc.2015.03.004","volume":"30","author":"S Tan","year":"2015","unstructured":"Tan, S., Li, X., Dong, Q.: Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Netw. 30, 84\u201398 (2015)","journal-title":"Ad Hoc Netw."},{"issue":"5","key":"50_CR20","doi-asserted-by":"crossref","first-page":"1922","DOI":"10.1109\/TWC.2012.030512.111562","volume":"11","author":"Z Wan","year":"2012","unstructured":"Wan, Z., Ren, K., Gu, M.: USOR: An unobservable secure on-demand routing protocol for mobile ad hoc networks. IEEE Trans. Wireless Commun. 11(5), 1922\u20131932 (2012)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"50_CR21","doi-asserted-by":"crossref","unstructured":"Phu, P., Yi, M., Kim, M.: Securing AODV routing protocol in mobile ad-hoc networks. In: Active and Programmable Networks, vol. 4388, pp. 182\u2013187. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-00972-3_15"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-56991-8_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T13:04:13Z","timestamp":1570021453000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-56991-8_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"ISBN":["9783319569901","9783319569918"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-56991-8_50","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2017,8,23]]}}}