{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:41:25Z","timestamp":1776116485638,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T00:00:00Z","timestamp":1631145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T00:00:00Z","timestamp":1631145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s10207-020-00531-6","type":"journal-article","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T09:02:41Z","timestamp":1631178161000},"page":"469-488","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Novel trust-aware intrusion detection and prevention system for 5G MANET\u2013Cloud"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2677-6387","authenticated-orcid":false,"given":"Saleh A.","family":"Alghamdi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,9]]},"reference":[{"key":"531_CR1","doi-asserted-by":"crossref","unstructured":"Huang, D., Zhang, X., Kang, M., Luo, J.: MobiCloud: building secure cloud framework for mobile computing and communication. In: 2010 Fifth IEEE International Symposium on Service Oriented System Engineering (2010)","DOI":"10.1109\/SOSE.2010.20"},{"issue":"16","key":"531_CR2","doi-asserted-by":"publisher","first-page":"2572","DOI":"10.1002\/wcm.2709","volume":"16","author":"I Yaqoob","year":"2016","unstructured":"Yaqoob, I., Ahmed, E., Gani, A., Mokhtar, S., Imran, M., Guizani, S.: Mobile ad hoc cloud: a survey. Wirel. Commun. Mobile Comput. 16(16), 2572\u20132589 (2016)","journal-title":"Wirel. Commun. Mobile Comput."},{"key":"531_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/232419","volume":"2014","author":"R Lacuesta","year":"2014","unstructured":"Lacuesta, R., Lloret, J., Sendra, S., Pe\u00f1alver, L.: Spontaneous ad hoc mobile cloud computing network. Sci. World J. 2014, 1\u201319 (2014)","journal-title":"Sci. World J."},{"issue":"4","key":"531_CR4","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1007\/s11276-015-1029-6","volume":"22","author":"SA Alghamdi","year":"2015","unstructured":"Alghamdi, S.A.: Load balancing maximal minimal nodal residual energy ad hoc on-demand multipath distance vector routing protocol (LBMMRE-AOMDV). Wirel. Netw. 22(4), 1355\u20131363 (2015)","journal-title":"Wirel. Netw."},{"key":"531_CR5","doi-asserted-by":"publisher","unstructured":"Alghamdi, S.A.: Cuckoo energy-efficient load-balancing on-demand multipath routing protocol. Arab. J. Sci. Eng. (2021). https:\/\/doi.org\/10.1007\/s13369-021-05841-y","DOI":"10.1007\/s13369-021-05841-y"},{"issue":"6","key":"531_CR6","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.3390\/s19061467","volume":"19","author":"W Alnumay","year":"2019","unstructured":"Alnumay, W., Ghosh, U., Chatterjee, P.: A trust-based predictive model for mobile ad hoc network in internet of things. Sensors 19(6), 1467 (2019)","journal-title":"Sensors"},{"key":"531_CR7","doi-asserted-by":"publisher","first-page":"32","DOI":"10.33166\/AETiC.2019.02.004","volume":"3","author":"MR Belgaum","year":"2019","unstructured":"Belgaum, M.R., Musa, S., Su\u2019ud, M.M., Alam, M., Soomro, S., Alansari, Z.: Secured approach towards reactive routing protocols using triple factor in mobile adhoc networks. Ann. Emerg. Technol. Comput. 3, 32\u201340 (2019)","journal-title":"Ann. Emerg. Technol. Comput."},{"key":"531_CR8","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/j.procs.2019.01.275","volume":"147","author":"San-shun Zhang","year":"2019","unstructured":"Zhang, San-shun, Wang, Shi-wen, Hui, Xia, Cheng, Xiang-guo: An attack-resistant reputation management system for mobile ad hoc networks. Proc. Comput. Sci. 147, 473\u2013479 (2019)","journal-title":"Proc. Comput. Sci."},{"key":"531_CR9","doi-asserted-by":"publisher","unstructured":"Faisal, M., Abbas, S., Ur Rahman, H.: Identity attack detection system for 802.11-based ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2018,128 (2018). https:\/\/doi.org\/10.1186\/s13638-018-1143-0","DOI":"10.1186\/s13638-018-1143-0"},{"issue":"3","key":"531_CR10","doi-asserted-by":"publisher","first-page":"975","DOI":"10.1007\/s11276-017-1639-2","volume":"25","author":"S Gurung","year":"2017","unstructured":"Gurung, S., Chauhan, S.: Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET. Wirel. Netw. 25(3), 975\u2013988 (2017)","journal-title":"Wirel. Netw."},{"issue":"4","key":"531_CR11","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1177\/1748301817725305","volume":"11","author":"A Roles","year":"2017","unstructured":"Roles, A., ElAarag, H.: Coexistence with malicious and selfish nodes in wireless ad hoc networks: a Bayesian game approach. J. Algorithms Comput. Technol. 11(4), 353\u2013365 (2017)","journal-title":"J. Algorithms Comput. Technol."},{"key":"531_CR12","first-page":"559","volume":"32","author":"Yaser Taheri","year":"2016","unstructured":"Taheri, Yaser, Gharaee, Hossein, Mohammadzadeh, Naser: A game theory approach for malicious node detection in MANETs. J. Inf. Sci. Eng. 32, 559\u2013573 (2016)","journal-title":"J. Inf. Sci. Eng."},{"key":"531_CR13","doi-asserted-by":"publisher","unstructured":"Manoranjini, J., Chandrasekar, A., Jothi, S.: Improved QoS and avoidance of black hole attacks in MANET using trust detection framework, Automatika. (2019). https:\/\/doi.org\/10.1080\/00051144.2019.1576965","DOI":"10.1080\/00051144.2019.1576965"},{"key":"531_CR14","doi-asserted-by":"crossref","unstructured":"Yasin, A., Abu-Zant Avoiding and isolating flooding attack by enhancing AODV MANET protocol (AIF_AODV). Security Commun Netw. 1\u201312 (2019)","DOI":"10.1155\/2019\/8249108"},{"key":"531_CR15","doi-asserted-by":"crossref","unstructured":"Elwahsh, H., Gamal, M., Salama, A., Henawy, I.: A Novel approach for classify MANETs attacks with a neutrosophic intelligent system based on genetic algorithm. Secur. Commun. Netw (2018)","DOI":"10.1155\/2018\/5828517"},{"key":"531_CR16","doi-asserted-by":"crossref","unstructured":"Karlsson, J., Dooley, L. S., Pulkkis, G.: Secure routing for MANET connected internet of things systems. In: 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud) (2018)","DOI":"10.1109\/FiCloud.2018.00024"},{"key":"531_CR17","doi-asserted-by":"publisher","first-page":"4412","DOI":"10.11591\/ijece.v8i6.pp4412-4422","volume":"8","author":"J Sultana","year":"2018","unstructured":"Sultana, J., Ahmed, T.: Elliptic curve cryptography based data transmission against blackhole attack in MANET. Int. J. Electr. Comput. Eng. (IJECE) 8, 4412 (2018)","journal-title":"Int. J. Electr. Comput. Eng. (IJECE)"},{"key":"531_CR18","doi-asserted-by":"publisher","unstructured":"Aranganathan, A., Suriyakala, C.D.: An efficient secure detection and prevention of malevolent nodes with lightweight surprise check scheme using trusted mobile agents in mobile ad-hoc networks. J. Ambient Intell. Humaniz. Comput. 10, 3493\u20133503 (2019). https:\/\/doi.org\/10.1007\/s12652-018-1069-8","DOI":"10.1007\/s12652-018-1069-8"},{"key":"531_CR19","doi-asserted-by":"publisher","first-page":"97","DOI":"10.3991\/ijoe.v14i12.8338","volume":"14","author":"T Alam","year":"2018","unstructured":"Alam, T., Benaida, M.: The role of cloud-MANET framework in the Internet of Things (IoT). Int. J. Online Eng. (iJOE) 14, 97\u2013111 (2018)","journal-title":"Int. J. Online Eng. (iJOE)"},{"key":"531_CR20","doi-asserted-by":"publisher","first-page":"20908","DOI":"10.1109\/ACCESS.2017.2759138","volume":"5","author":"J Li","year":"2017","unstructured":"Li, J., Li, X., Gao, Y., Gao, Y., Zhang, R.: Dynamic cloudlet-assisted energy-saving routing mechanism for mobile ad hoc networks. IEEE Access 5, 20908\u201320920 (2017)","journal-title":"IEEE Access"},{"issue":"2","key":"531_CR21","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1080\/19393555.2017.1415399","volume":"27","author":"A Naveena","year":"2018","unstructured":"Naveena, A., Reddy, K.R.L.: Malicious node prevention and mitigation in MANETs using a hybrid security model. Inf. Secur. J. Global Perspect. 27(2), 92\u2013101 (2018)","journal-title":"Inf. Secur. J. Global Perspect."},{"issue":"8","key":"531_CR22","doi-asserted-by":"publisher","first-page":"2174","DOI":"10.1109\/TMC.2016.2622707","volume":"16","author":"N Schweitzer","year":"2017","unstructured":"Schweitzer, N., Stulman, A., Margalit, R.D., Shabtai, A.: Contradiction based gray-hole attack minimization for ad-hoc networks. IEEE Trans. Mobile Comput. 16(8), 2174\u20132183 (2017)","journal-title":"IEEE Trans. Mobile Comput."},{"key":"531_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/9812135","volume":"2018","author":"A Yasin","year":"2018","unstructured":"Yasin, A., Abu Zant, M.: Detecting and isolating black-hole attacks in MANET using timer based baited technique. Wirel. Commun. Mobile Comput. 2018, 1\u201310 (2018)","journal-title":"Wirel. Commun. Mobile Comput."},{"issue":"1","key":"531_CR24","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s10586-017-0927-z","volume":"21","author":"O Singh","year":"2017","unstructured":"Singh, O., Singh, J., Singh, R.: Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET. Cluster Comput. 21(1), 51\u201363 (2017)","journal-title":"Cluster Comput."},{"key":"531_CR25","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.jocs.2018.11.003","volume":"30","author":"Y Guo","year":"2019","unstructured":"Guo, Y., Zhang, H., Zhang, L., Fang, L., Li, F.: A game theoretic approach to cooperative intrusion detection. J. Comput. Sci. 30, 118\u2013126 (2019)","journal-title":"J. Comput. Sci."},{"key":"531_CR26","unstructured":"Xia, H., Cheng, X., Zheng, Y., Liu, A.: A novel light-weight subjective trust inference framework in MANETs. IEEE Trans. Sustain. Comput. 1\u20131 (2018)"},{"issue":"3","key":"531_CR27","doi-asserted-by":"publisher","first-page":"61","DOI":"10.3390\/fi11030061","volume":"11","author":"Z Ali Zardari","year":"2019","unstructured":"Ali Zardari, Z., He, J., Zhu, N., Mohammadani, K., Pathan, M., Hussain, M., Memon, M.: A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in MANETs. Future Internet 11(3), 61 (2019)","journal-title":"Future Internet"},{"issue":"2","key":"531_CR28","first-page":"345","volume":"11","author":"AM Desai","year":"2018","unstructured":"Desai, A.M., Jhaveri, R.H.: Secure routing in mobile Ad hoc networks: a predictive approach. Int. J. Inf. Technol. 11(2), 345\u2013356 (2018)","journal-title":"Int. J. Inf. Technol."},{"key":"531_CR29","doi-asserted-by":"crossref","unstructured":"Sen, B., Meitei, M. G., Sharma, K., Ghose, M.K., Sinha, S.: A trust-based intrusion detection system for mitigating blackhole attacks in MANET. In: Advanced Computational and Communication Paradigms, pp. 765\u2013775 (2018)","DOI":"10.1007\/978-981-10-8237-5_74"},{"key":"531_CR30","doi-asserted-by":"crossref","unstructured":"Singh, K., Singh, K.: Intrusion detection and recovery of MANET by using ACO algorithm and genetic algorithm. Next-Generation Networks, pp. 97\u2013109 (2017)","DOI":"10.1007\/978-981-10-6005-2_11"},{"issue":"3","key":"531_CR31","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MCE.2019.2892223","volume":"8","author":"G Vaseer","year":"2019","unstructured":"Vaseer, G., Ghai, G., Ghai, D.: Novel intrusion detection and prevention for mobile Ad hoc networks: a single-and multiattack case study. IEEE Consum. Electron. Mag. 8(3), 35\u201339 (2019)","journal-title":"IEEE Consum. Electron. Mag."},{"key":"531_CR32","doi-asserted-by":"publisher","first-page":"16","DOI":"10.3390\/fi10020016","volume":"10","author":"MS Pathan","year":"2018","unstructured":"Pathan, M.S., Zhu, N., He, J., Zardari, Z.A., Memon, M.Q., Hussain, M.I.: An efficient trust-based scheme for secure and quality of service routing in MANETs. Future Internet 10, 16 (2018)","journal-title":"Future Internet"},{"issue":"6","key":"531_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s19061467","volume":"19","author":"W Alnumay","year":"2019","unstructured":"Alnumay, W., Ghosh, U., Chatterjee, P.: A trust based predictive model for mobile Ad hoc network in internet of things. Sensors 19(6), 1\u201314 (2019)","journal-title":"Sensors"},{"issue":"1","key":"531_CR34","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/TMC.2018.2828814","volume":"18","author":"RJ Cai","year":"2019","unstructured":"Cai, R.J., Li, X.J., Chong, P.H.J.H.J.: An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE Trans. Mob. Comput. 18(1), 42\u201355 (2019)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"531_CR35","doi-asserted-by":"crossref","unstructured":"Marathe, N., Shinde, S.K.: ITCA, an IDS and trust solution collaborated with ACK based approach to mitigate network layer attack on MANET routing, Wirel. Pers. Commun. 1\u201324 (2019)","DOI":"10.1007\/s11277-019-06282-5"},{"key":"531_CR36","doi-asserted-by":"publisher","unstructured":"Dbouk, T., Mourad, A., Otrok, H., Talhi, C.: Towards ad-hoc cloud based approach for mobile intrusion detection. In: 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 1\u20138. (2016). https:\/\/doi.org\/10.1109\/WiMOB.2016.7763251","DOI":"10.1109\/WiMOB.2016.7763251"},{"issue":"2","key":"531_CR37","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MWC.2016.1500119RP","volume":"24","author":"DM Shila","year":"2017","unstructured":"Shila, D.M., Shen, W., Cheng, Y., Tian, X., Shen, X.S.: AMCloud: toward a secure autonomic mobile ad hoc cloud computing system. IEEE Wirel. Commun. 24(2), 74\u201381 (2017)","journal-title":"IEEE Wirel. Commun."},{"key":"531_CR38","doi-asserted-by":"crossref","unstructured":"Gautam, D., Tokekar, V.: An approach to analyze the impact of DDOS attack on mobile cloud computing. In: 2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC) (2017)","DOI":"10.1109\/ICOMICON.2017.8279033"},{"key":"531_CR39","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1016\/j.compeleceng.2017.10.011","volume":"71","author":"M Chen","year":"2018","unstructured":"Chen, M., Wang, N., Zhou, H., Chen, Y.: FCM technique for efficient intrusion detection system for wireless networks in cloud environment. Comput. Electr. Eng. 71, 978\u2013987 (2018)","journal-title":"Comput. Electr. Eng."},{"key":"531_CR40","doi-asserted-by":"publisher","first-page":"55013","DOI":"10.1109\/ACCESS.2018.2872115","volume":"6","author":"S Abbas","year":"2018","unstructured":"Abbas, S., Faisal, M., Rahman, H.U., Khan, M.Z., Merabti, M., Khan, A.: Masquerading attacks detection in mobile ad hoc networks. IEEE Access 6, 55013\u201355025 (2018)","journal-title":"IEEE Access"},{"key":"531_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/4683982","volume":"2019","author":"RA Sowah","year":"2019","unstructured":"Sowah, R.A., Ofori-Amanfo, K.B., Mills, G.A., Koumadi, K.M.: Detection and prevention of man-in-the-middle spoofing attacks in manets using predictive techniques in artificial neural networks (ANN). J. Comput. Netw. Commun. 2019, 1\u201314 (2019)","journal-title":"J. Comput. Netw. Commun."},{"issue":"2","key":"531_CR42","doi-asserted-by":"publisher","first-page":"1684","DOI":"10.1109\/TVT.2016.2557808","volume":"66","author":"N Marchang","year":"2017","unstructured":"Marchang, N., Datta, R., Das, S.K.: A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks. IEEE Trans. Veh. Technol. 66(2), 1684\u20131695 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"531_CR43","doi-asserted-by":"publisher","unstructured":"Mirjalili, S.: Moth-flame optimization algorithm: a novel nature-inspired heuristic paradigm. Knowl. Based Syst. 89, 228\u2013249 (2015). https:\/\/doi.org\/10.1016\/j.knosys.2015.07.006","DOI":"10.1016\/j.knosys.2015.07.006"},{"key":"531_CR44","doi-asserted-by":"crossref","unstructured":"Harikrishnan, T., Babu, C.: Cryptanalysis of hummingbird algorithm with improved security and throughput. In: 2015 International Conference on VLSI Systems, Architecture, Technology and Applications (VLSI-SATA) (2015)","DOI":"10.1109\/VLSI-SATA.2015.7050460"},{"key":"531_CR45","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-14992-4_2","volume":"6054","author":"D Engels","year":"2010","unstructured":"Engels, D., Fan, X., Gong, G., Hu, Honggang, Smith, E.: Hummingbird: ultra-lightweight cryptography for resource-constrained devices. Financ. Cryptogr. Data Secur. 6054, 3\u201318 (2010)","journal-title":"Financ. Cryptogr. Data Secur."},{"key":"531_CR46","doi-asserted-by":"crossref","unstructured":"Fan, X., Hu, H., Gong, G., Smith, E., Engels, D.: Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers. 1\u20137 (2009)","DOI":"10.1109\/ICITST.2009.5402515"},{"key":"531_CR47","doi-asserted-by":"crossref","unstructured":"Santos, J., Leroux, P., Wauters, T., Volckaert, B., De Turck, F.: Anomaly detection for Smart City applications over 5G low power wide area networks. In: NOMS 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium (2018)","DOI":"10.1109\/NOMS.2018.8406257"},{"issue":"2","key":"531_CR48","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1109\/JIOT.2017.2766085","volume":"5","author":"L-J Chen","year":"2018","unstructured":"Chen, L.-J., Ho, Y.-H., Hsieh, H.-H., Huang, S.-T., Lee, H.-C., Mahajan, S.: ADF: an anomaly detection framework for large-scale PM2.5 sensing systems. IEEE Internet Things J. 5(2), 559\u2013570 (2018)","journal-title":"IEEE Internet Things J."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-020-00531-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-020-00531-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-020-00531-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T02:49:06Z","timestamp":1725763746000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-020-00531-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,9]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["531"],"URL":"https:\/\/doi.org\/10.1007\/s10207-020-00531-6","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,9]]},"assertion":[{"value":"9 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}