{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:42:42Z","timestamp":1725882162911},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031526"},{"type":"electronic","value":"9789811031533"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3153-3_73","type":"book-chapter","created":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T07:13:59Z","timestamp":1489648439000},"page":"731-739","source":"Crossref","is-referenced-by-count":2,"title":["BDN: Biodegradable Node, Novel Approach for Routing in Delay Tolerant Network"],"prefix":"10.1007","author":[{"given":"Afreen","family":"Fatimah","sequence":"first","affiliation":[]},{"given":"Rahul","family":"Johari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,17]]},"reference":[{"key":"73_CR1","doi-asserted-by":"crossref","unstructured":"Choo, Fai Cheong, Mun Choon Chan, and Ee-Chien Chang. \u201cRobustness of DTN against routing attacks.\u201d\u00a0Communication Systems and Networks (COMSNETS), 2010 Second International Conference on. IEEE, 2010.","DOI":"10.1109\/COMSNETS.2010.5432014"},{"key":"73_CR2","unstructured":"Farrell, Stephen, and Vinny Cahill. \u201cSecurity considerations in space and delay tolerant networks.\u201d Space Mission Challenges for Information Technology, 2006. SMC-IT 2006. Second IEEE International Conference on. IEEE, 2006."},{"key":"73_CR3","doi-asserted-by":"crossref","unstructured":"Ahuja, Sachin, Rahul Johari, and Chetna Khokhar. \u201cEAST: exploitation of attacks and system threats in network.\u201d In Information Systems Design and Intelligent Applications, pp. 601\u2013611. Springer India, (2015).","DOI":"10.1007\/978-81-322-2250-7_60"},{"key":"73_CR4","doi-asserted-by":"crossref","unstructured":"Patra, Rabin, Sonesh Surana, and Sergiu Nedevschi. \u201cHierarchical identity based cryptography for end-to-end security in DTNs.\u201dIntelligent Computer Communication and Processing, 2008. ICCP 2008. 4th International Conference on. IEEE, 2008.","DOI":"10.1109\/ICCP.2008.4648376"},{"key":"73_CR5","unstructured":"Punitha, K., et al. \u201cA Secure I-Trust Scheme Towards Periodic Trust Establishment in Delay-Tolerant Networks.\u201d (2015)."},{"key":"73_CR6","doi-asserted-by":"crossref","unstructured":"Bhutta, N., et al. \u201cSecurity analysis for delay\/disruption tolerant satellite and sensor networks.\u201d (2009): 385\u2013389.","DOI":"10.1109\/IWSSC.2009.5286339"},{"key":"73_CR7","doi-asserted-by":"crossref","unstructured":"Johari, Rahul, and Dhari A. Mahmood. \u201cGA-LORD: Genetic Algorithm and LTPCL-Oriented Routing Protocol in Delay Tolerant Network.\u201d In Wireless Communications, Networking and Applications, pp. 141\u2013154. Springer India, (2016).","DOI":"10.1007\/978-81-322-2580-5_14"},{"key":"73_CR8","doi-asserted-by":"crossref","unstructured":"Johari, Rahul, and Sakshi Dhama. \u201cRouting Protocols in Delay Tolerant Networks: Application-Oriented Survey.\u201d In Wireless Communications, Networking and Applications, pp. 1255\u20131267. Springer India, (2016).","DOI":"10.1007\/978-81-322-2580-5_114"},{"key":"73_CR9","unstructured":"Anderson, Noel Wayne. \u201cNon-toxic, biodegradable sensor nodes for use with a wireless network.\u201d U.S. Patent No. 8,063,774. 22 Nov. 2011."},{"key":"73_CR10","unstructured":"http:\/\/www.xbow.jp\/imote2.pdf ."},{"key":"73_CR11","doi-asserted-by":"crossref","unstructured":"Ker\u00e4nen, Ari, J\u00f6rg Ott, and Teemu K\u00e4rkk\u00e4inen. \u201cThe ONE simulator for DTN protocol evaluation.\u201d Proceedings of the 2nd international conference on simulation tools and techniques. ICST, 2009.","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"73_CR12","doi-asserted-by":"crossref","unstructured":"Afreen Fatimah, Rahul Johari, \u201cPART: Performance analysis of routing techniques in delay tolerant networks\u201d, International conference of internet of things and cloud computing, Cambridge, UK (ICC\u201916), ACM, 2016.","DOI":"10.1145\/2896387.2900328"},{"key":"73_CR13","doi-asserted-by":"crossref","unstructured":"El Mastapha Sammou and Abdelmounaim Abdali, \u201cRouting in Delay Tolerant Networks(DTNs), Improved Routing with MaxProp and the Model of \u201cTransfer by Delegation\u201d (Custody Transfer)\u201d, Int. J. Comm, Network and System Sciences, 2011, 4, 53\u201358.","DOI":"10.4236\/ijcns.2011.41006"},{"key":"73_CR14","unstructured":"A. Vahdat and D. Becker, \u201cEpidemic Routing for Partially Connected Ad Hoc Networks,\u201d Technical Report CS-200006, Duke University, Durham, April 2000."},{"key":"73_CR15","unstructured":"http:\/\/www.news18.com\/news\/india\/5-2-earthquake-jolts-india-bangladesh-border-593941.html ."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3153-3_73","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T20:31:40Z","timestamp":1568925100000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3153-3_73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031526","9789811031533"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3153-3_73","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}