{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:44:21Z","timestamp":1761709461647,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":13,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811088896"},{"type":"electronic","value":"9789811088902"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-8890-2_25","type":"book-chapter","created":{"date-parts":[[2018,3,27]],"date-time":"2018-03-27T11:54:25Z","timestamp":1522151665000},"page":"338-349","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Trust Mechanism Based AODV Routing Protocol for Forward Node Authentication in Mobile Ad Hoc Network"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7234-8108","authenticated-orcid":false,"given":"Muhammad","family":"Sohail","sequence":"first","affiliation":[]},{"given":"Liangmin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bushra","family":"Yamin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,28]]},"reference":[{"issue":"8","key":"25_CR1","doi-asserted-by":"crossref","first-page":"2193","DOI":"10.1109\/TITS.2016.2517603","volume":"17","author":"S Jiang","year":"2016","unstructured":"Jiang, S., Zhu, X., Wang, L.: An efcient anonymous batch authentication scheme based on HMAC for vanets. IEEE Trans. Intell. Transp. Syst. 17(8), 2193\u20132204 (2016)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"25_CR2","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1109\/COMST.2015.2496147","volume":"18","author":"Z Movahedi","year":"2016","unstructured":"Movahedi, Z., Hosseini, Z., Bayan, F., Pujolle, G.: Trust-distortion resistant trust management frameworks on mobile ad hoc networks: a survey. IEEE Commun. Surv. Tutorials 18(2), 1287\u20131309 (2016)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"25_CR3","unstructured":"Cook, K.S.: Trust in Society. Russell Sage Foundation Series on Trust, vol. 2, February 2003"},{"issue":"03","key":"25_CR4","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"09","author":"A Josang","year":"2001","unstructured":"Josang, A.: A logic for uncertain probabilities. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 09(03), 279\u2013311 (2001)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Liu, G., Yang, Q., Wang, H., Lin, X., Wittie, M.P.: Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic. In: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, pp. 1698\u20131706 (2014)","DOI":"10.1109\/INFOCOM.2014.6848107"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Liu, G., Chen, Q., Yang, Q., Wang, H., Zhu, B., Wang, W.: Opinionwalk: an efficient solution to massive trust assessment in online social networks. In: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications (2017)","DOI":"10.1109\/INFOCOM.2017.8057106"},{"issue":"7","key":"25_CR7","first-page":"1345","volume":"20","author":"SK Awasthi","year":"2016","unstructured":"Awasthi, S.K., Singh, Y.N.: Generalized analysis of convergence of absolute trust in peer-to-peer networks. IEEE Commun. Lett. 20(7), 1345\u20131348 (2016)","journal-title":"IEEE Commun. Lett."},{"issue":"1","key":"25_CR8","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1109\/JCN.2016.000013","volume":"18","author":"DQ Nguyen","year":"2016","unstructured":"Nguyen, D.Q., Toulgoat, M., Lamont, L.: Impact of trust-based security association and mobility on the delay metric in MANET. J. Commun. Networks 18(1), 105\u2013111 (2016)","journal-title":"J. Commun. Networks"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Liu, G., Yang, Q., Wang, H., Wu, S., Wittie, M.P.: Uncovering the mystery of trust in an online social network. In: 2015 IEEE Conference on Communications and Network Security (CNS), Florence, pp. 488\u2013496 (2015)","DOI":"10.1109\/CNS.2015.7346861"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 99, pp. 90-100 (1999)","DOI":"10.1109\/MCSA.1999.749281"},{"issue":"7","key":"25_CR11","doi-asserted-by":"crossref","first-page":"2096","DOI":"10.1016\/j.adhoc.2012.02.009","volume":"11","author":"H Xia","year":"2013","unstructured":"Xia, H., Jia, Z., Li, X., Ju, L., Sha, H.M.: Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 11(7), 2096\u20132114 (2013)","journal-title":"Ad Hoc Netw."},{"key":"25_CR12","unstructured":"Jsang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference, pp. 2502\u20132511 (2002)"},{"issue":"2","key":"25_CR13","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1109\/TNSM.2011.050311.100028","volume":"8","author":"CJ Fung","year":"2011","unstructured":"Fung, C.J., Zhang, J., Aib, I., Boutaba, R.: Dirichlet-based trust management for effective collaborative intrusion detection networks. IEEE Trans. Netw. Serv. Manage. 8(2), 79\u201391 (2011)","journal-title":"IEEE Trans. Netw. Serv. Manage."}],"container-title":["Communications in Computer and Information Science","Mobile Ad-hoc and Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-8890-2_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:32:35Z","timestamp":1751502755000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-8890-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811088896","9789811088902"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-8890-2_25","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}