{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:09:23Z","timestamp":1743052163217,"version":"3.40.3"},"publisher-location":"New Delhi","reference-count":15,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132219842"},{"type":"electronic","value":"9788132219859"}],"license":[{"start":{"date-parts":[[2014,8,23]],"date-time":"2014-08-23T00:00:00Z","timestamp":1408752000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,8,23]],"date-time":"2014-08-23T00:00:00Z","timestamp":1408752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-81-322-1985-9_13","type":"book-chapter","created":{"date-parts":[[2014,8,22]],"date-time":"2014-08-22T11:19:58Z","timestamp":1408706398000},"page":"187-202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Trust-Based Routing for Vehicular Ad Hoc Network"],"prefix":"10.1007","author":[{"given":"Suparna","family":"DasGupta","sequence":"first","affiliation":[]},{"given":"Rituparna","family":"Chaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,23]]},"reference":[{"key":"13_CR1","unstructured":"Granelli, F., Boato, G., Kliazovich, D.: MORA: A movement-based routing algorithm for vehicle ad hoc networks. In: Proceedings of IEEE Workshop on Automotive Networking and Applications (AutoNet 2006), San Francisco, Dec 2006"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Menouar, H., Lenardi, M., Filali, F.: Movement prediction based routing concept for position based routing in vehicular networks. In: Proceedings of the 66th IEEE Vehicular Technology Conference, 30 Sept\u20133 Oct 2007","DOI":"10.1109\/VETECF.2007.441"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Kumar, R., Rao, S.V.: Directional greedy routing protocol (DGRP) in mobile ad hoc network. In: Proceedings of International Conference on Information Technology, ICIT (2008)","DOI":"10.1109\/ICIT.2008.28"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Karp, B., Kung, H.T.: GPSR: greedy perimeter stateless routing for wireless networks. In: Proceedings of the ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom) (2000)","DOI":"10.1145\/345910.345953"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Gong, J., Xu, C., Holle, J.: Predictive directional greedy routing in vehicular ad hoc networks. In: Proceedings of 27th International Conference on Distributed Computing Systems Workshops (ICDCSW \u201807) (2007)","DOI":"10.1109\/ICDCSW.2007.65"},{"key":"13_CR6","unstructured":"Jayasudha, K., Chandrasekhar, C.: Hierarchical clustering based greedy routing in vehicular ad hoc networks. Eur. J. Sci. Res. 67(4), 580\u2013594. ISSN 1450-216X, Euro Journals Publishing, Inc. (2012)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"DasGupta, S., Chaki, R.: SRPV: a speedy routing protocol for VANET. Published in the Proceedings of the International Conference on Advances in Computing, Communication and Control (ICAC3-2011), Communications in Computer and Information Science, vol. 125, Part 2, pp. 275\u2013284, 28\u201329 Jan 2011","DOI":"10.1007\/978-3-642-18440-6_35"},{"key":"13_CR8","unstructured":"Saha, S.B., DasGupta, S., Chaki, R.: A Survey of prediction based routing protocols for vehicular ad hoc networks. In: Proceedings of the IEEE International Conference on Information Technology (ICIT-2009), Dec 2009"},{"key":"13_CR9","unstructured":"Gerlach, M., Festag, A., Leinm\u00fcller, T., Goldacker, G., Harsch, C.: Security architecture for vehicular communication. In: Proceedings of 4th International Workshop on Intelligent Transportation (WIT2007) (2007)"},{"issue":"6","key":"13_CR10","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X Lin","year":"2007","unstructured":"Lin, X., Sun, X., Ho, P.H., Shen, X.: A secure and privacy preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442\u20133456 (2007)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"13_CR11","unstructured":"Durresi, M., Durresi, A., Barolli, L.: Emergency broadcast protocol for inter-vehicle communications. In: Proceedings of 11th IEEE International Conference on Parallel and Distributed Systems (ICPADS\u201905)"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Buttyan, L., Hubaux, J.P., Karg, F., Kung, A., Raya, M.: Architecture for secure and private vehicular communications. In: Proceedings of 7th International Conference on ITS Telecommunications (ITST\u201907), pp. 1\u20136, June 2007","DOI":"10.1109\/ITST.2007.4295890"},{"key":"13_CR13","unstructured":"Raya, M., Jungels, D., Papadimitratos, P., Aad, I., Hubaux, J.P.: Certificate revocation invehicularNetworks. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.92.2291S. 2006"},{"key":"13_CR14","unstructured":"DasGupta, S., Chaki, R., Choudhury, S.: TruVAL: trusted vehicle authentication logic for VANET. Published in the Proceedings of the International Conference on 3rd International Conference on Advances in Computing, Communication and Control (ICAC3-2013) in Mumbai, 18th\u201319th Jan 2013"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Wiedersheim, B., Ma, Z., Kargl, F., Papadimitratos, P.: Privacy in inter-vehicular networks: why simple pseudonym change is not enough. In: Proceedings of 7th International Conference on Wireless On-demand Network Systems and Services (WONS), pp. 176\u201383 (2010)","DOI":"10.1109\/WONS.2010.5437115"}],"container-title":["Advances in Intelligent Systems and Computing","Applied Computation and Security Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-1985-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T21:31:06Z","timestamp":1676410266000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-1985-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,23]]},"ISBN":["9788132219842","9788132219859"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-1985-9_13","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014,8,23]]},"assertion":[{"value":"23 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}