{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T16:10:08Z","timestamp":1751645408390,"version":"3.41.0"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319911915"},{"type":"electronic","value":"9783319911922"}],"license":[{"start":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T00:00:00Z","timestamp":1526515200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-91192-2_30","type":"book-chapter","created":{"date-parts":[[2018,5,16]],"date-time":"2018-05-16T17:45:41Z","timestamp":1526492741000},"page":"300-310","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SC-MANET: Threats, Risk and Solution Strategies for Security Concerns in Mobile Ad-Hoc Network"],"prefix":"10.1007","author":[{"given":"C. K.","family":"Vanamala","sequence":"first","affiliation":[]},{"given":"G.","family":"Raghvendra Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,17]]},"reference":[{"key":"30_CR1","unstructured":"Gantes, A., Stucky, J.: A platform on a mobile ad hoc network challenging collaborative gaming. In: International Symposium on Collaborative Technologies and Systems (2008)"},{"key":"30_CR2","unstructured":"Khan, K.U.R., Zaman, R.U., Reddy, A.V.G.: Integrating mobile ad hoc networks and the internet challenges and a review of strategies. In: Presented at the 3rd International Conference on Communication Systems Software and Middleware and Workshops, COMSWARE (2008)"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Suguna, M., Subathra, P.: Establishment of stable certificate chains for authentication in mobile ad hoc networks. In: Presented at the International Conference on Recent Trends in Information Technology (ICRTIT) (2011)","DOI":"10.1109\/ICRTIT.2011.5972278"},{"issue":"3","key":"30_CR4","doi-asserted-by":"publisher","first-page":"1158","DOI":"10.1109\/TWC.2012.010312.110783","volume":"11","author":"H Nishiyama","year":"2012","unstructured":"Nishiyama, H., Ngo, T., Ansari, N., Kato, N.: On minimizing the impact of mobility on topology control in mobile ad hoc networks. IEEE Trans. Wirel. Commun. 11(3), 1158\u20131166 (2012)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Rango, F.D., Fotino, M., Marano, S.: EE-OLSR: energy efficient OLSR routing protocol for mobile ad-hoc networks. In: Presented at the Military Communications Conference, MILCOM (2008)","DOI":"10.1109\/MILCOM.2008.4753611"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Du, K., Yang, Y.: Policy-based time slot assignment algorithm in a MANET (PBTSA). In: Presented at the 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID (2009)","DOI":"10.1109\/ICASID.2009.5276946"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Sheikh, R., Chande, M.S., Mishra, D.K.: Security issues in MANET: a review. In: Presented at the Seventh International Conference on Wireless and Optical Communications Networks (WOCN) (2010)","DOI":"10.1109\/WOCN.2010.5587317"},{"key":"30_CR8","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MCOM.2002.1039859","volume":"10","author":"H Deng","year":"2002","unstructured":"Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Commun. Mag. 10, 70\u201375 (2002)","journal-title":"IEEE Commun. Mag."},{"key":"30_CR9","unstructured":"Papadimitrates, P., Hass, Z.J.: Secure routing for mobile ad hoc networks. In: Proceeding of SCS Communication Networks and Distributed System Modeling and Simulation Conference (CNDS), San Antonio, TX, (2002)"},{"key":"30_CR10","first-page":"319","volume-title":"Ad Hoc Wireless Networks","author":"W Lou","year":"2003","unstructured":"Lou, W., Fang, Y.: A survey of wireless security in mobile ad hoc networks: challenges and available solutions. In: Chen, X., Huang, X., Du, D. (eds.) Ad Hoc Wireless Networks, pp. 319\u2013364. Kluwer Academic Publishers, Dordrecht (2003)"},{"key":"30_CR11","unstructured":"Yi, S., Kravets, R.: Composite key management for ad hoc networks. In: Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2004), pp. 52\u201361 (2004)"},{"issue":"6","key":"30_CR12","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L Zhou","year":"1999","unstructured":"Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Netw. Mag. 13(6), 24\u201330 (1999)","journal-title":"IEEE Netw. Mag."},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Yi, S., Naldurg, P., Kravets, R.: Security aware ad hoc routing for wireless networks. In: Report No. UIUCDCS-R-2290, UIUC (2002)","DOI":"10.1145\/501416.501464"},{"key":"30_CR14","first-page":"139","volume-title":"DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks","author":"DB Johnson","year":"2001","unstructured":"Johnson, D.B., Maltz, A., Broch, J.: DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks, vol. 5, pp. 139\u2013172. Addison-Wesley, Boston (2001)"},{"issue":"2","key":"30_CR15","first-page":"226","volume":"2","author":"AK Gupta","year":"2010","unstructured":"Gupta, A.K., Sadawarti, H., Verma, A.K.: Performance analysis of AODV, DSR & TORA routing protocols. Int. J. Eng. Technol. 2(2), 226 (2010)","journal-title":"Int. J. Eng. Technol."},{"key":"30_CR16","unstructured":"He, G.: Destination-sequenced distance vector (DSDV) protocol, pp. 1\u20139. Networking Laboratory, University of Technology, Helsinki (2002)"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Perkins, C., B-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing. No. RFC 3561 (2003)","DOI":"10.17487\/rfc3561"},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Weiss, E., Hiertz, G.R., Xu, B.: Performance analysis of temporally ordered routing algorithm based on IEEE 802.11 a. In: IEEE 61st Vehicular Technology Conference, VTC-Spring, vol. 4. IEEE (2005)","DOI":"10.1109\/VETECS.2005.1543798"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Park, V.D., Macker, J.P., Corson, M.S.: Applicability of the temporally-ordered routing algorithm for use in mobile tactical networks. In: 1998 Proceedings of Military Communications Conference, MILCOM 98, vol. 2. IEEE (1998)","DOI":"10.21236\/ADA464908"},{"issue":"3","key":"30_CR20","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MNET.2010.5464224","volume":"24","author":"F Yu","year":"2010","unstructured":"Yu, F., Huang, M., Tang, H.: Biologically inspired consensus-based spectrum sensing in mobile ad hoc networks with cognitive radios. IEEE Netw. 24(3), 26\u201330 (2010)","journal-title":"IEEE Netw."},{"issue":"1","key":"30_CR21","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/TSMCC.2009.2023676","volume":"40","author":"S Yang","year":"2010","unstructured":"Yang, S., Cheng, H., Wang, F.: Genetic algorithms with immigrants and memory schemes for dynamic shortest path routing problems in mobile ad hoc networks. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 40(1), 52\u201363 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.)"},{"issue":"10","key":"30_CR22","doi-asserted-by":"publisher","first-page":"3072","DOI":"10.1109\/TWC.2010.080610.090759","volume":"9","author":"L-C Li","year":"2010","unstructured":"Li, L.-C., Liu, R.-S.: Securing cluster-based ad hoc networks with distributed authorities. IEEE Trans. Wirel. Commun. 9(10), 3072\u20133081 (2010)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"7","key":"30_CR23","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1109\/TMC.2010.44","volume":"9","author":"F Li","year":"2010","unstructured":"Li, F., Wu, J.: Uncertainty modeling and reduction in MANETs. IEEE Trans. Mob. Comput. 9(7), 1035\u20131048 (2010)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"9","key":"30_CR24","doi-asserted-by":"publisher","first-page":"3064","DOI":"10.1109\/TWC.2011.071411.102123","volume":"10","author":"S Bu","year":"2011","unstructured":"Bu, S.: Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks. IEEE Trans. Wirel. Commun. 10(9), 3064\u20133073 (2011)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"10","key":"30_CR25","doi-asserted-by":"publisher","first-page":"1926","DOI":"10.1109\/JSAC.2011.111203","volume":"29","author":"K E-Defrawy","year":"2011","unstructured":"E-Defrawy, K., Tsudik, G.: Privacy-preserving location-based on-demand routing in MANETs. IEEE J. Select. Areas Commun. 29(10), 1926\u20131934 (2011)","journal-title":"IEEE J. Select. Areas Commun."},{"issue":"3","key":"30_CR26","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1109\/TVT.2010.2103098","volume":"60","author":"S Bu","year":"2011","unstructured":"Bu, S.: Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks. IEEE Trans. Veh. Technol. 60(3), 1025\u20131036 (2011)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"30_CR27","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/JSYST.2010.2095910","volume":"5","author":"SK Dhurandher","year":"2011","unstructured":"Dhurandher, S.K.: FACES: friend-based ad-hoc routing using challenges to establish security in magnets systems. IEEE Syst. J. 5(2), 176\u2013188 (2011)","journal-title":"IEEE Syst. J."},{"issue":"4","key":"30_CR28","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1109\/SURV.2011.092110.00088","volume":"13","author":"J-H Cho","year":"2011","unstructured":"Cho, J.-H., Swami, A., Chen, R.: A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 13(4), 562\u2013583 (2011)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"30_CR29","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1109\/SURV.2011.072210.00026","volume":"13","author":"S Djahel","year":"2011","unstructured":"Djahel, S., N-Abdesselam, F., Zhang, Z.: Mitigating packet dropping problem in mobile ad hoc networks: proposals and challenges. IEEE Commun. Surv. Tutor. 13(4), 658\u2013672 (2011)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"30_CR30","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1109\/TDSC.2010.11","volume":"8","author":"G Xu","year":"2011","unstructured":"Xu, G., Borcea, C., Iftode, L.: A policy enforcing mechanism for trusted ad hoc networks. IEEE Trans. Dependable Secure Comput. 8(3), 321\u2013336 (2011)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"30_CR31","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/WCL.2012.120211.110130","volume":"1","author":"ACF Chan","year":"2012","unstructured":"Chan, A.C.F.: Distributed private key generation for identity-based cryptosystems in ad hoc networks. IEEE Wirel. Commun. Lett. 1(1), 46\u201348 (2012)","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"3","key":"30_CR32","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1049\/iet-ifs.2011.0234","volume":"6","author":"R Venkataraman","year":"2012","unstructured":"Venkataraman, R., Pushpalatha, M., Rao, T.R.: Regression-based trust model for mobile ad hoc networks. IET Inf. Secur. 6(3), 131\u2013140 (2012)","journal-title":"IET Inf. Secur."},{"issue":"2","key":"30_CR33","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/TDSC.2011.51","volume":"9","author":"Z Zhao","year":"2012","unstructured":"Zhao, Z.: Risk-aware mitigation for MANET routing attacks. IEEE Trans. Dependable Secure Comput. 9(2), 250\u2013260 (2012)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"9","key":"30_CR34","doi-asserted-by":"publisher","first-page":"4647","DOI":"10.1109\/TVT.2014.2313865","volume":"63","author":"Z Wei","year":"2014","unstructured":"Wei, Z.: Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63(9), 4647\u20134658 (2014)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"30_CR35","first-page":"201","volume-title":"Advances in Intelligent Systems and Computing","author":"C.K. Vanamala","year":"2017","unstructured":"Vanamala, C.K., Rao, G.R.: Strategic modeling of secure routing decision in OLSR protocol in mobile ad-hoc network. In: Software Engineering Trends and Techniques in Intelligent Systems, pp 201\u2013208 (2017)"}],"container-title":["Advances in Intelligent Systems and Computing","Cybernetics and Algorithms in Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91192-2_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T15:38:09Z","timestamp":1751643489000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-91192-2_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,17]]},"ISBN":["9783319911915","9783319911922"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91192-2_30","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,5,17]]}}}