{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T13:09:49Z","timestamp":1775221789785,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,1,27]],"date-time":"2024-01-27T00:00:00Z","timestamp":1706313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,27]],"date-time":"2024-01-27T00:00:00Z","timestamp":1706313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s10207-023-00804-w","type":"journal-article","created":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T23:31:11Z","timestamp":1706311871000},"page":"1667-1677","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Blockchain-based BATMAN protocol using mobile ad hoc network (MANET) with an ensemble algorithm"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8215-1552","authenticated-orcid":false,"given":"Upendra","family":"Singh","sequence":"first","affiliation":[]},{"given":"Sumit Kumar","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Mukul","family":"Shukla","sequence":"additional","affiliation":[]},{"given":"Preeti","family":"Jha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,27]]},"reference":[{"key":"804_CR1","doi-asserted-by":"crossref","unstructured":"Aublin, P.L., Mokhtar, S.B., Qu\u00e9ma, V.: Rbft: redundant byzantine fault tolerance. In: 2013 IEEE 33rd International Conference on Distributed Computing Systems, IEEE, pp 297\u2013306 (2013)","DOI":"10.1109\/ICDCS.2013.53"},{"issue":"17","key":"804_CR2","doi-asserted-by":"publisher","first-page":"17216","DOI":"10.1109\/JSEN.2022.3193504","volume":"22","author":"B Citoni","year":"2022","unstructured":"Citoni, B., Ansari, S., Abbasi, Q.H., Imran, M.A., Hussain, S.: Comparative analysis of an urban lorawan deployment: real world versus simulation. IEEE Sens. J. 22(17), 17216\u201317223 (2022). https:\/\/doi.org\/10.1109\/JSEN.2022.3193504","journal-title":"IEEE Sens. J."},{"key":"804_CR3","doi-asserted-by":"crossref","unstructured":"Clausen, T., Jacquet, P., Adjih, C., Laouiti, A., Minet, P., Muhlethaler, P., Qayyum, A., Viennot, L.: Optimized link state routing protocol (OLSR) (2003)","DOI":"10.17487\/rfc3626"},{"key":"804_CR4","doi-asserted-by":"publisher","unstructured":"Cordova, D., Laube, A., Nguyen, T.M.T., Pujolle, G.: Blockgraph: a blockchain for mobile ad hoc networks. In: 2020 4th Cyber Security in Networking Conference (CSNet), pp. 1\u20138 (2020). https:\/\/doi.org\/10.1109\/CSNet50428.2020.9265532","DOI":"10.1109\/CSNet50428.2020.9265532"},{"key":"804_CR5","doi-asserted-by":"crossref","unstructured":"Dennis, R., Owen, G.: Rep on the block: a next generation reputation system based on the blockchain. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), IEEE, pp. 131\u2013138 (2015)","DOI":"10.1109\/ICITST.2015.7412073"},{"key":"804_CR6","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D., Baras, J.: On trust establishment in mobile ad-hoc networks. In: International Workshop on Security Protocols, Springer, pp. 47\u201366 (2002)","DOI":"10.1007\/978-3-540-39871-4_6"},{"issue":"23","key":"804_CR7","doi-asserted-by":"publisher","first-page":"23590","DOI":"10.1109\/JSEN.2022.3218136","volume":"22","author":"D Han","year":"2022","unstructured":"Han, D., Du, X., Liu, X., Tian, X.: FCLR: fuzzy control-based layering routing protocol for underwater acoustic networks. IEEE Sens. J. 22(23), 23590\u201323602 (2022). https:\/\/doi.org\/10.1109\/JSEN.2022.3218136","journal-title":"IEEE Sens. J."},{"issue":"6","key":"804_CR8","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1109\/TMC.2014.2343627","volume":"14","author":"E Hernandez-Orallo","year":"2014","unstructured":"Hernandez-Orallo, E., Olmos, M.D.S., Cano, J.C., Calafate, C.T., Manzoni, P.: CoCoWa: a collaborative contact-based watchdog for detecting selfish nodes. IEEE Trans. Mob. Comput. 14(6), 1162\u20131175 (2014)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"804_CR9","unstructured":"Johnson, D., Ntlatlapa, N.S., Aichele, C.: Simple pragmatic approach to mesh routing using batman (2008)"},{"key":"804_CR10","doi-asserted-by":"crossref","unstructured":"Kannhavong, B., Nakayama, H., Kato, N., Nemoto, Y., Jamalipour, A.: Analysis of the node isolation attack against olsr-based mobile ad hoc networks. In: 2006 International Symposium on Computer Networks, IEEE, pp. 30\u201335 (2006)","DOI":"10.1109\/GLOCOM.2006.262"},{"key":"804_CR11","doi-asserted-by":"crossref","unstructured":"Kotla, R., Dahlin, M.: High throughput byzantine fault tolerance. In: International Conference on Dependable Systems and Networks, 2004, IEEE, pp. 575\u2013584 (2004)","DOI":"10.1109\/DSN.2004.1311928"},{"key":"804_CR12","doi-asserted-by":"crossref","unstructured":"Kulla, E., Ikeda, M., Barolli, L., Miho, R.: Impact of source and destination movement on MANET performance considering BATMAN and AODV protocols. In: 2010 International Conference on Broadband, pp. 94\u2013101. Wireless Computing, Communication and Applications, IEEE (2010)","DOI":"10.1109\/BWCCA.2010.54"},{"key":"804_CR13","doi-asserted-by":"crossref","unstructured":"Kulla, E., Ikeda, M., Hiyama, M., Barolli, L., Miho, R.: Performance evaluation of olsr and batman protocols for vertical topology using indoor stairs testbed. In: 2011 International Conference on Broadband and Wireless Computing, pp. 159\u2013166. Communication and Applications, IEEE (2011)","DOI":"10.1109\/BWCCA.2011.28"},{"issue":"2","key":"804_CR14","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1016\/j.camwa.2011.07.035","volume":"63","author":"E Kulla","year":"2012","unstructured":"Kulla, E., Hiyama, M., Ikeda, M., Barolli, L.: Performance comparison of olsr and batman routing protocols by a manet testbed in stairs environment. Comput. Math. Appl. 63(2), 339\u2013349 (2012)","journal-title":"Comput. Math. Appl."},{"key":"804_CR15","doi-asserted-by":"crossref","unstructured":"Kulla, E., Ikeda, M., Oda, T., Barolli, L., Xhafa, F., Takizawa, M.: Multimedia transmissions over a manet testbed: problems and issues. In: 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems, IEEE, pp. 141\u2013147 (2012b)","DOI":"10.1109\/CISIS.2012.82"},{"key":"804_CR16","doi-asserted-by":"crossref","unstructured":"Laube, A., Martin, S., Al\u00a0Agha, K.: A solution to the split & merge problem for blockchain-based applications in ad hoc networks. In: 2019 8th International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), IEEE, pp. 1\u20136 (2019)","DOI":"10.23919\/PEMWN47208.2019.8986959"},{"key":"804_CR17","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1109\/TBDATA.2020.2981438","volume":"8","author":"G Liu","year":"2020","unstructured":"Liu, G., Dong, H., Yan, Z., Zhou, X., Shimizu, S.: B4sdc: a blockchain system for security data collection in manets. IEEE Trans. Big Data 8, 739\u2013752 (2020)","journal-title":"IEEE Trans. Big Data"},{"issue":"3","key":"804_CR18","doi-asserted-by":"publisher","first-page":"698","DOI":"10.3390\/s20030698","volume":"20","author":"MT Lwin","year":"2020","unstructured":"Lwin, M.T., Yim, J., Ko, Y.B.: Blockchain-based lightweight trust management in mobile ad-hoc networks. Sensors 20(3), 698 (2020)","journal-title":"Sensors"},{"issue":"3","key":"804_CR19","doi-asserted-by":"publisher","first-page":"698","DOI":"10.3390\/s20030698","volume":"20","author":"MT Lwin","year":"2020","unstructured":"Lwin, M.T., Yim, J., Ko, Y.B.: Blockchain-based lightweight trust management in mobile ad-hoc networks. Sensors 20(3), 698 (2020)","journal-title":"Sensors"},{"key":"804_CR20","doi-asserted-by":"publisher","first-page":"102321","DOI":"10.1016\/j.adhoc.2020.102321","volume":"110","author":"C Machado","year":"2021","unstructured":"Machado, C., Westphall, C.M.: Blockchain incentivized data forwarding in manets: strategies and challenges. Ad Hoc Netw. 110, 102321 (2021)","journal-title":"Ad Hoc Netw."},{"key":"804_CR21","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255\u2013265 (2000)","DOI":"10.1145\/345910.345955"},{"key":"804_CR22","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Tech. rep, Manubot (2019)"},{"issue":"1","key":"804_CR23","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1016\/j.jnca.2011.08.008","volume":"35","author":"M Omar","year":"2012","unstructured":"Omar, M., Challal, Y., Bouabdallah, A.: Certification-based trust models in mobile ad hoc networks: a survey and taxonomy. J. Netw. Comput. Appl. 35(1), 268\u2013286 (2012)","journal-title":"J. Netw. Comput. Appl."},{"key":"804_CR24","doi-asserted-by":"crossref","unstructured":"Peiris, P., Rajapakse, C., Jayawardena, B.: Blockchain-based distributed reputation model for ensuring trust in mobile adhoc networks. In: 2020 International Research Conference on Smart Computing and Systems Engineering (SCSE), IEEE, pp. 51\u201356 (2020)","DOI":"10.1109\/SCSE49731.2020.9312998"},{"key":"804_CR25","doi-asserted-by":"crossref","unstructured":"Perkins, C., Royer, E.M., Das, S.: Ad-hoc on demand distance vector routing (AODV). Tech. rep., Internet-Draft, November 1997. (2003). https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-manet-aodv-00","DOI":"10.17487\/rfc3561"},{"issue":"9","key":"804_CR26","doi-asserted-by":"publisher","first-page":"4947","DOI":"10.1109\/TWC.2014.2321576","volume":"13","author":"R Sanchez-Iborra","year":"2014","unstructured":"Sanchez-Iborra, R., Cano, M.D., Garcia-Haro, J.: Performance evaluation of batman routing protocol for voip services: a QoE perspective. IEEE Trans. Wireless Commun. 13(9), 4947\u20134958 (2014)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"1","key":"804_CR27","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/TMC.2015.2409877","volume":"15","author":"N Schweitzer","year":"2015","unstructured":"Schweitzer, N., Stulman, A., Shabtai, A., Margalit, R.D.: Mitigating denial of service attacks in OLSR protocol using fictitious nodes. IEEE Trans. Mob. Comput. 15(1), 163\u2013172 (2015)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"804_CR28","doi-asserted-by":"crossref","unstructured":"Sliwa, B., Falten, S., Wietfeld, C.: Performance evaluation and optimization of batman v routing for aerial and ground-based mobile ad-hoc networks. In: 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), IEEE, p. 1\u20137 (2019)","DOI":"10.1109\/VTCSpring.2019.8746361"},{"key":"804_CR29","doi-asserted-by":"crossref","unstructured":"Taha, A., Alsaqour, R., Uddin, M., Abdelhaq, M., Saba, T.: Energy efficient multipath routing protocol for mobile ad-hoc network using the fitness function. IEEE Access 5, 10369\u201310381 (2017)","DOI":"10.1109\/ACCESS.2017.2707537"},{"issue":"2","key":"804_CR30","first-page":"137","volume":"3","author":"G Varaprasad","year":"2013","unstructured":"Varaprasad, G., Narayanagowda, S.H., et al.: Implementing a new power aware routing algorithm based on existing dynamic source routing protocol for mobile ad hoc networks. IET Netw. 3(2), 137\u2013142 (2013)","journal-title":"IET Netw."},{"issue":"2","key":"804_CR31","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1109\/TII.2022.3194956","volume":"19","author":"AK Yadav","year":"2023","unstructured":"Yadav, A.K., Misra, M., Pandey, P.K., Liyanage, M.: An EAP-based mutual authentication protocol for WLAN-connected IoT devices. IEEE Trans. Ind. Inf. 19(2), 1343\u20131355 (2023). https:\/\/doi.org\/10.1109\/TII.2022.3194956","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"4","key":"804_CR32","doi-asserted-by":"publisher","first-page":"970","DOI":"10.3390\/s19040970","volume":"19","author":"J Yang","year":"2019","unstructured":"Yang, J., He, S., Xu, Y., Chen, L., Ren, J.: A trusted routing scheme using blockchain and reinforcement learning for wireless sensor networks. Sensors 19(4), 970 (2019)","journal-title":"Sensors"},{"issue":"2","key":"804_CR33","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1109\/TII.2022.3202968","volume":"19","author":"M Zia","year":"2023","unstructured":"Zia, M., Obaidat, M.S., Mahmood, K., Shamshad, S., Saleem, M.A., Chaudhry, S.A.: A provably secure lightweight key agreement protocol for wireless body area networks in healthcare system. IEEE Trans. Ind. Inf. 19(2), 1683\u20131690 (2023). https:\/\/doi.org\/10.1109\/TII.2022.3202968","journal-title":"IEEE Trans. Ind. Inf."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00804-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00804-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00804-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T22:05:00Z","timestamp":1716761100000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00804-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,27]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["804"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00804-w","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-673489\/v1","asserted-by":"object"}]},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,27]]},"assertion":[{"value":"27 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors of this manuscript declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This manuscript does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The research papers which are used for the study of the submitted work have been cited in the manuscript, and the details of the same have been included in the reference section.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}