{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:55:46Z","timestamp":1743105346059,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811563171"},{"type":"electronic","value":"9789811563188"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-6318-8_39","type":"book-chapter","created":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T23:12:33Z","timestamp":1592953953000},"page":"475-485","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Trust-Based Detection of Malicious Nodes for Wireless Mesh Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0493-6020","authenticated-orcid":false,"given":"Amit Kumar","family":"Roy","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1568-7872","authenticated-orcid":false,"given":"Ajoy Kumar","family":"Khan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5568-1577","authenticated-orcid":false,"given":"Hridoy Jyoti","family":"Mahanta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,6,15]]},"reference":[{"key":"39_CR1","doi-asserted-by":"publisher","first-page":"S23","DOI":"10.1109\/MCOM.2005.1509968","volume":"9","author":"IF Akyildiz","year":"2005","unstructured":"Akyildiz, I.F., Wang, X.: A survey on wireless mesh networks. IEEE Commun. Mag. 9, S23\u2013S30 (2005)","journal-title":"IEEE Commun. Mag."},{"key":"39_CR2","doi-asserted-by":"publisher","unstructured":"Piechowiak, M., Zwierzykowski, P., Owczarek, P., Was\u0142owicz, M.: Comparative analysis of routing protocols for wireless mesh networks. In: 10th International Symposium on IEEE Communication Systems, Networks and Digital Signal Processing (CSNDSP), pp. 1\u20135, Prague, Czech Republic (2016). \nhttps:\/\/doi.org\/10.1109\/CSNDSP.2016.7573902","DOI":"10.1109\/CSNDSP.2016.7573902"},{"key":"39_CR3","doi-asserted-by":"publisher","unstructured":"Moudni, H., Er-rouidi, M., Mouncif, H., El Hadadi, B.: Secure routing protocols for mobile ad hoc networks. In: International Conference on IEEE Information Technology for Organizations Development (IT4OD), Fez, Moroccopp, pp. 1\u20137 (2016). \nhttps:\/\/doi.org\/10.1109\/IT4OD.2016.7479295","DOI":"10.1109\/IT4OD.2016.7479295"},{"key":"39_CR4","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-0-387-68839-8_12","volume-title":"Security Issues in Wireless Mesh Networks","author":"W Zhang","year":"2008","unstructured":"Zhang, W., Wang, Z., Das, S.K., Hassan, M.: Security Issues in Wireless Mesh Networks, pp. 309\u2013330. Springer, Boston (2008). \nhttps:\/\/doi.org\/10.1007\/978-0-387-68839-8_12"},{"key":"39_CR5","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MWC.2008.4599217","volume":"15","author":"L Santhanam","year":"2008","unstructured":"Santhanam, L., Xie, B., Agrawal, D.P.: Selfishness in mesh networks: wired multihop MANETs. IEEE Wireless Commun. 15, 16\u201323 (2008)","journal-title":"IEEE Wireless Commun."},{"key":"39_CR6","unstructured":"Altman, Y., Keren, A.Y.: U.S. Patent No. 9,479,523. Washington, DC. U.S. Patent and Trademark Office"},{"key":"39_CR7","doi-asserted-by":"publisher","unstructured":"Sen, J.: An efficient algorithm for detection of selfish packet dropping nodes in wireless mesh networks. In: International Conference on IEEE Computer Information Systems and Industrial Management Applications (CISIM), Krackow, Poland, pp. 283\u2013288 (2010). \nhttps:\/\/doi.org\/10.1109\/CISIM.2010.5643647","DOI":"10.1109\/CISIM.2010.5643647"},{"key":"39_CR8","unstructured":"Wang, B., Soltani, S., Shaprio, J.K., Tan, P.N., Mutka, M.: Distributed detection of selfish routing in wireless mesh networks. Technical report MSU-CSE-06-19, Department of Computer Science and Engineering, Michigan State University (2008)"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. In: Communication Networks and Distributed Systems Modeling and Simulation Conference, (No. CONF), SCS, San Antonio, TX, pp. 1\u201313 (2002)","DOI":"10.1016\/S1570-8705(03)00018-0"},{"key":"39_CR10","doi-asserted-by":"publisher","unstructured":"Buttyan, L., Thong, T.V.: Formal verification of secure ad-hoc network routing protocols using deductive model-checking. In: Proceedings of the Wireless and Mobile Networking Conference (WMNC), pp. 1\u20136. IEEE, Budapest (2010). \nhttps:\/\/doi.org\/10.1109\/WMNC.2010.5678752","DOI":"10.1109\/WMNC.2010.5678752"},{"key":"39_CR11","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-0-387-73821-5-6","volume-title":"Routing Security in Ad Hoc Wireless Networks","author":"MO Pervaiz","year":"2005","unstructured":"Pervaiz, M.O., Cardei, M., Wu, J.: Routing Security in Ad Hoc Wireless Networks, pp. 117\u2013142. Springer, Boston (2005). \nhttps:\/\/doi.org\/10.1007\/978-0-387-73821-5-6"},{"key":"39_CR12","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.18576\/amis\/110423","volume":"11","author":"R Regan","year":"2017","unstructured":"Regan, R., Manickam, J.M.L.: Detecting and denying malicious behavior using adaptive learning based routing protocols in wireless mesh network. Appl. Math. Inf. Sci. 11, 1155\u20131162 (2017)","journal-title":"Appl. Math. Inf. Sci."},{"key":"39_CR13","doi-asserted-by":"publisher","unstructured":"Subhash, P., Ramachandram, S.: Secure neighbour discovery in wireless mesh networks using connectivity information. In: International Conference on IEEE Advances in Computing, Communications and Informatics (ICACCI), Kochi, India, pp. 2061\u20132066 (2015). \nhttps:\/\/doi.org\/10.1109\/ICACCI.2015.7275920","DOI":"10.1109\/ICACCI.2015.7275920"},{"issue":"1","key":"39_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-016-0685-2","volume":"2016","author":"T Gao","year":"2016","unstructured":"Gao, T., Peng, F., Guo, N.: Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network. EURASIP J. Wireless Commun. Network. 2016(1), 1\u201310 (2016). \nhttps:\/\/doi.org\/10.1186\/s13638-016-0685-2","journal-title":"EURASIP J. Wireless Commun. Network."},{"key":"39_CR15","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1587\/transinf.2016EDP7123","volume":"100","author":"T Niizuma","year":"2017","unstructured":"Niizuma, T., Goto, H.: Easy-to-deploy wireless mesh network system with user authentication and WLAN roaming features. IEICE Trans. Inf. Syst. 100, 511\u2013519 (2017)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"1","key":"39_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-015-0050-1","volume":"5","author":"MS Gaur","year":"2015","unstructured":"Gaur, M.S., Pant, B.: Trusted and secure clustering in mobile pervasive environment. Hum. Centric Comput. Inf. Sci. 5(1), 1\u201317 (2015). \nhttps:\/\/doi.org\/10.1186\/s13673-015-0050-1","journal-title":"Hum. Centric Comput. Inf. Sci."},{"key":"39_CR17","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/8354930","author":"R Singh","year":"2016","unstructured":"Singh, R., Singh, J., Singh, R.: WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. Mob. Inf. Syst. (2016). \nhttps:\/\/doi.org\/10.1155\/2016\/8354930","journal-title":"Mob. Inf. Syst."},{"key":"39_CR18","doi-asserted-by":"publisher","first-page":"1595","DOI":"10.1007\/s11277-012-0541-6","volume":"68","author":"J Guo","year":"2013","unstructured":"Guo, J., Zhou, X., Yuan, J., Xu, H.: Secure access control guarding against Internal attacks in distributed networks. Wireless Pers. Commun. 68, 1595\u20131609 (2013)","journal-title":"Wireless Pers. Commun."},{"key":"39_CR19","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MWC.2013.6507392","volume":"20","author":"Z Zhang","year":"2013","unstructured":"Zhang, Z., Long, K., Wang, J.: Self-organization paradigms and optimization approaches for cognitive radio technologies: a survey. IEEE Wirel. Commun. 20, 36\u201342 (2013)","journal-title":"IEEE Wirel. Commun."},{"key":"39_CR20","first-page":"585","volume":"20","author":"M Abdel-Azim","year":"2018","unstructured":"Abdel-Azim, M., Salah, H.E.D., Eissa, M.E.: IDS against black-hole attack for MANET. IJ Network Secur. 20, 585\u2013592 (2018)","journal-title":"IJ Network Secur."}],"container-title":["Communications in Computer and Information Science","Machine Learning, Image Processing, Network Security and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-6318-8_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T23:19:04Z","timestamp":1592954344000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-6318-8_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811563171","9789811563188"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-6318-8_39","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"15 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MIND","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning, Image Processing, Network Security and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Silchar","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mind2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/mind2020.nits.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"219","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"79","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}