{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:58:29Z","timestamp":1743109109554,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319591049"},{"type":"electronic","value":"9783319591056"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59105-6_23","type":"book-chapter","created":{"date-parts":[[2017,5,16]],"date-time":"2017-05-16T07:45:06Z","timestamp":1494920706000},"page":"264-276","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["POMSec: Pseudo-Opportunistic, Multipath Secured Routing Protocol for Communications in Smart Grid"],"prefix":"10.1007","author":[{"given":"Manali","family":"Chakraborty","sequence":"first","affiliation":[]},{"given":"Novarun","family":"Deb","sequence":"additional","affiliation":[]},{"given":"Nabendu","family":"Chaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,17]]},"reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-642-33260-9_30","volume-title":"Computer Information Systems and Industrial Management","author":"M Chakraborty","year":"2012","unstructured":"Chakraborty, M., Chaki, N.: ETSeM: a energy-aware, trust-based, selective multi-path routing protocol. In: Cortesi, A., Chaki, N., Saeed, K., Wierzcho\u0144, S. (eds.) CISIM 2012. LNCS, vol. 7564, pp. 351\u2013360. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-33260-9_30"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Sen, P., Chaki, N., Chaki, R.: HIDS: honesty-rate based collaborative intrusion detection system for mobile ad-hoc networks. In: Computer Information Systems and Industrial Management, pp. 121\u2013126 (2008)","DOI":"10.1109\/CISIM.2008.14"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-642-33260-9_6","volume-title":"Computer Information Systems and Industrial Management","author":"N Deb","year":"2012","unstructured":"Deb, N., Chaki, N.: TIDS: trust-based intrusion detection system for wireless ad-hoc networks. In: Cortesi, A., Chaki, N., Saeed, K., Wierzcho\u0144, S. (eds.) CISIM 2012. LNCS, vol. 7564, pp. 80\u201391. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-33260-9_6"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Deb, N., Chakraborty, M., Chaki, N.: Honesty and trust bases IDS solutions. In: Chaki, N., Chaki, R. (eds.) Intrusion Detection in Wireless Ad Hoc Networks, pp. 111\u2013145. CRC Press, Taylor & Francis Group (2014)","DOI":"10.1201\/b16394"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Lee, S.-W., Choi, J.Y., Lim, K.W., Ko, Y.-B., Roh, B.-H.: A reliable and hybrid multipath routing protocol for multi-interface tactical ad hoc networks. In: The Military Communication Conference, pp. 1531\u20131536 (2010)","DOI":"10.1109\/MILCOM.2010.5680384"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-540-24663-3_10","volume-title":"Performance Tools and Applications to Networked Systems","author":"S Mueller","year":"2004","unstructured":"Mueller, S., Tsang, R.P., Ghosal, D.: Multipath routing in mobile ad hoc networks: issues and challenges. In: Calzarossa, M.C., Gelenbe, E. (eds.) MASCOTS 2003. LNCS, vol. 2965, pp. 209\u2013234. Springer, Heidelberg (2004). doi:10.1007\/978-3-540-24663-3_10"},{"key":"23_CR7","unstructured":"Marina, M.K., Das, S.R.: Ad hoc on-demand multipath distance vector routing, Computer Science Department, Stony Brook University (2003)"},{"key":"23_CR8","unstructured":"Ganjali, Y., Keshavarzian, A.: Load balancing in ad hoc networks: single-path routing vs. multi-path routing. In: IEEE International Advance Computing Conference, IACC 2009, pp. 32\u201334 (2009)"},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1002\/dac.843","volume":"20","author":"YM Lu","year":"2007","unstructured":"Lu, Y.M., Wong, V.W.S.: An energy-efficient multipath routing protocol for wireless sensor networks. Int. J. Commun. Syst. 20, 747\u2013766 (2007)","journal-title":"Int. J. Commun. Syst."},{"key":"23_CR10","unstructured":"Xiong, L., Liu, L.: Building trust in decentralized peer-to-peer electronic communities. In: Proceedings of the 5th International Conference on Electronic Commerce Research (ICECR-5) (2002)"},{"key":"23_CR11","unstructured":"Zhang, J., Jeong, C.K., Lee, G.Y., Kim, H.J.: Cluster-based multi-path routing algorithm for multi-hop wireless network. Int. J. Future Gener. Commun. Netw. (2009)"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Agrakhed, J., Biradar, G.S., Mytri, V.D.: Energy efficient interference aware Multipath Routing protocol in WMSN. In: 2011 Annual IEEE India Conference (INDICON), pp. 1\u20134 (2011)","DOI":"10.1109\/INDCON.2011.6139615"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Yahya, B., Ben-Othman, J.: REER: robust and energy efficient multipath routing protocol for wireless sensor networks. In: Global Telecommunications Conference, GLOBECOM, pp. 1\u20137. IEEE (2009)","DOI":"10.1109\/GLOCOM.2009.5425587"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Yahya, B., Ben-Othman, J.: RELAX: an energy efficient multipath routing protocol for wireless sensor networks. In: Proceedings of IEEE International Conference on Communications (ICC), pp. 1\u20136 (2010)","DOI":"10.1109\/ICC.2010.5502156"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Varma, S., Tiwary, U.S., Jain, A., Sharma, T.: Statistical energy efficient multipath routing protocol. In: International Conference on Information Networking (ICOIN), pp. 1\u20135 (2008)","DOI":"10.1109\/ICOIN.2008.4472773"},{"key":"23_CR16","unstructured":"Comer, D.E.: Computer Networks and Internets, p. 476. Prentice Hall, Upper Saddle River (2008)"},{"key":"23_CR17","doi-asserted-by":"publisher","first-page":"3592","DOI":"10.1016\/j.comnet.2011.06.021","volume":"55","author":"C-J Hsu","year":"2011","unstructured":"Hsu, C.-J., Liu, H.-I., Seah, W.K.G.: Opportunistic routing - a review and the challenges ahead. Comput. Netw. 55, 3592\u20133603 (2011)","journal-title":"Comput. Netw."},{"key":"23_CR18","doi-asserted-by":"publisher","first-page":"2107","DOI":"10.1016\/j.jss.2011.05.043","volume":"84","author":"W Boa","year":"2011","unstructured":"Boa, W., Chuanhea, H., Layuanb, L., Wenzhonga, Y.: Trust-based minimum cost opportunistic routing for Ad hoc networks. J. Syst. Softw. 84, 2107\u20132122 (2011)","journal-title":"J. Syst. Softw."},{"key":"23_CR19","unstructured":"NIST Special Publication 1108, NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0, U.S. Department of Commerce, January 2010"},{"key":"23_CR20","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1016\/j.comnet.2006.01.005","volume":"50","author":"V Cagri Gungor","year":"2006","unstructured":"Cagri Gungor, V., Lambert, F.C.: A survey on communication networks for electric system automation. Comput. Netw. 50, 877\u2013897 (2006). Elsevier","journal-title":"Comput. Netw."},{"issue":"7","key":"23_CR21","doi-asserted-by":"publisher","first-page":"1864","DOI":"10.1109\/TPDS.2013.240","volume":"25","author":"L Cheng","year":"2014","unstructured":"Cheng, L., Niu, J., Cao, J.: QoS aware geographic opportunistic routing in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(7), 1864\u20131875 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"23_CR22","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/TSG.2013.2279184","volume":"5","author":"S-G Yoon","year":"2014","unstructured":"Yoon, S.-G., Jang, S., Kim, Y.-H., Bahk, S.: Opportunistic routing for smart grid with power line communication access networks. IEEE Trans. Smart Grid 5(1), 303\u2013311 (2014)","journal-title":"IEEE Trans. Smart Grid"},{"key":"23_CR23","first-page":"1","volume":"59","author":"Y Qian","year":"2016","unstructured":"Qian, Y., Zhang, C., Xu, Z., Shu, F., Dong, L., Li, J.: A reliable opportunistic routing for smart grid with in-home power line communication networks. Inf. Sci. 59, 1\u201313 (2016). Science China Press and Springer-Verlag Berlin Heidelberg","journal-title":"Inf. Sci."}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59105-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T00:05:38Z","timestamp":1621123538000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-59105-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319591049","9783319591056"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59105-6_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"17 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Computer Information Systems and Industrial Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bialystok","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisim2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wi.pb.edu.pl\/cisim2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}