{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T15:23:45Z","timestamp":1761578625278,"version":"3.41.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"S5","license":[{"start":{"date-parts":[[2017,11,13]],"date-time":"2017-11-13T00:00:00Z","timestamp":1510531200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s10586-017-1202-z","type":"journal-article","created":{"date-parts":[[2017,11,13]],"date-time":"2017-11-13T07:11:03Z","timestamp":1510557063000},"page":"10849-10860","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET"],"prefix":"10.1007","volume":"22","author":[{"given":"S.","family":"Satheeshkumar","sequence":"first","affiliation":[]},{"given":"N.","family":"Sengottaiyan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,13]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Eichler, S., Roman, C.: Challenges of secure routing in MANETs: a simulative approach using AODV-SEC. In: 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 481\u2013484 (2006)","key":"1202_CR1","DOI":"10.1109\/MOBHOC.2006.278589"},{"issue":"11","key":"1202_CR2","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MCOM.2008.4689245","volume":"46","author":"L Kant","year":"2008","unstructured":"Kant, L., Young, K., Younis, O., Shallcross, D., Sinkar, K., Mcauley, A., Graff, C.: Network science based approaches to design and analyze MANETs for military applications. IEEE Commun. Mag. 46(11), 55\u201361 (2008)","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"1202_CR3","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1109\/TVT.2006.876687","volume":"55","author":"S Ci","year":"2006","unstructured":"Ci, S., Guizani, M., Chen, H.H., Sharif, H.: Self-regulating network utilization in mobile ad hoc wireless networks. IEEE Trans. Veh. Technol. 55(4), 1302\u20131310 (2006)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"1202_CR4","first-page":"279","volume":"1","author":"S Taneja","year":"2010","unstructured":"Taneja, S., Kush, A.: A survey of routing protocols in mobile ad hoc networks. Int. J. Innov. Manag. Technol. 1(3), 279 (2010)","journal-title":"Int. J. Innov. Manag. Technol."},{"doi-asserted-by":"crossref","unstructured":"Maan, F., Mazhar, N.: MANET routing protocols vs mobility models: a performance evaluation. In: 2011 Third International Conference on Ubiquitous and Future Networks (ICUFN), pp. 179\u2013184 (2011)","key":"1202_CR5","DOI":"10.1109\/ICUFN.2011.5949158"},{"doi-asserted-by":"crossref","unstructured":"Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing (No. RFC 3561) (2003)","key":"1202_CR6","DOI":"10.17487\/rfc3561"},{"doi-asserted-by":"crossref","unstructured":"Clausen, T., Jacquet, P.: Optimized link state routing protocol (OLSR)\u00a0(No. RFC 3626) (2003)","key":"1202_CR7","DOI":"10.17487\/rfc3626"},{"issue":"4","key":"1202_CR8","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/LCOMM.2005.1413635","volume":"9","author":"A Shevtekar","year":"2005","unstructured":"Shevtekar, A., Anantharam, K., Ansari, N.: Low rate TCP denial-of-service attack detection at edge routers. IEEE Commun. Lett. 9(4), 363\u2013365 (2005)","journal-title":"IEEE Commun. Lett."},{"issue":"1","key":"1202_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1216370.1216371","volume":"39","author":"JVD Merwe","year":"2007","unstructured":"Merwe, J.V.D., Dawoud, D., McDonald, S.: A survey on peer-to-peer key management for mobile ad hoc networks. ACM Comput. Surv. (CSUR) 39(1), 1 (2007)","journal-title":"ACM Comput. Surv. (CSUR)"},{"unstructured":"Bhargava, B., de Oliveira, R., Zhang, Y., Idika, N.C.: Addressing collaborative attacks and defense in ad hoc wireless networks. In: 29th IEEE International Conference on Distributed Computing Systems Workshops, 2009. ICDCS Workshops\u2019 09, pp. 447\u2013450 (2009)","key":"1202_CR10"},{"issue":"1","key":"1202_CR11","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/JSYST.2013.2296197","volume":"9","author":"JM Chang","year":"2015","unstructured":"Chang, J.M., Tsou, P.C., Woungang, I., Chao, H.C., Lai, C.F.: Defending against collaborative attacks by malicious nodes in MANETs: a cooperative bait detection approach. IEEE Syst. J. 9(1), 65\u201375 (2015)","journal-title":"IEEE Syst. J."},{"doi-asserted-by":"crossref","unstructured":"Weerasinghe, H., Fu, H.: Preventing cooperative black hole attacks in mobile ad hoc networks: simulation implementation and evaluation. In: Future Generation Communication and Networking (FGCN 2007), Vol. 2, pp. 362\u2013367 (2007)","key":"1202_CR12","DOI":"10.1109\/FGCN.2007.184"},{"issue":"1","key":"1202_CR13","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.adhoc.2006.07.005","volume":"6","author":"HL Nguyen","year":"2008","unstructured":"Nguyen, H.L., Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Netw. 6(1), 32\u201346 (2008)","journal-title":"Ad Hoc Netw."},{"issue":"2","key":"1202_CR14","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s11276-007-0035-8","volume":"15","author":"G Chen","year":"2009","unstructured":"Chen, G., Li, C., Ye, M., Wu, J.: An unequal cluster-based routing protocol in wireless sensor networks. Wirel. Netw. 15(2), 193\u2013207 (2009)","journal-title":"Wirel. Netw."},{"doi-asserted-by":"crossref","unstructured":"Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting Black-hole Attack in Mobile Ad Hoc Networks. In: Paper Presented at the 5th European Personal Mobile Communications Conference, Glasgow, UK, pp. 22\u201325 (2003)","key":"1202_CR15","DOI":"10.1049\/cp:20030303"},{"doi-asserted-by":"crossref","unstructured":"Al-Shurman, M., Yoo, S-M., Park, S.: Black hole attack in mobile ad hoc networks. In: Paper Presented at the 42nd Annual ACM Southeast Regional Conference (ACM-SE\u201942), Huntsville, Alabama, 2\u20133 April 2004","key":"1202_CR16","DOI":"10.1145\/986537.986560"},{"doi-asserted-by":"crossref","unstructured":"Kozma, W., Lazos, L.: REAct: Resource-efficient accountability for node misbehavior in ad hoc networks based on random audits. In: Paper Presented at the Second ACM Conference on Wireless Network Security, Zurich, Switzerland, pp. 16\u201318 (2009)","key":"1202_CR17","DOI":"10.1145\/1514274.1514290"},{"unstructured":"Yu, C.W., Wu, T-K., Cheng, R.H, Chang, S.C.: A distributed and cooperative black hole node detection and elimination mechanism for ad hoc network. In: Paper Presented at the PAKDD Workshops, Nanjing, China, 22\u201325 May 2007","key":"1202_CR18"},{"unstructured":"Wang, W., Bhargava, B., Linderman, M.: Defending against collaborative packet drop attacks on MANETs. In: Paper Presented at the 2nd International Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2009) (in Conjunction with IEEE SRDS 2009), New York, USA, 27 September 2009","key":"1202_CR19"},{"doi-asserted-by":"crossref","unstructured":"Min, Z., Jiliu, Z.: Cooperative black hole attack prevention for mobile ad hoc networks. In: Paper Presented at the International Symposium on Information Engineering and Electronic Commerce, Ternopil, Ukraine, 16\u201317 May 2009","key":"1202_CR20","DOI":"10.1109\/IEEC.2009.12"},{"unstructured":"Tsou, P-C., Chang, J-M., Lin, Y-H., Chao, H-C., Chen, J-L.: Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs. In: Paper Presented at the 13th International Conference on Advanced Communication Technology, Phoenix Park, Korea, pp. 13\u201316 (2011)","key":"1202_CR21"},{"unstructured":"Dahill, B., Levine, B., Royer, E., Shields, C.: A secure routing protocol for ad hoc networks. Tech report 02-32, Department of Computer Science, University of Massachusetts, Amherst (2001)","key":"1202_CR22"},{"unstructured":"Papadimitratos, P., Haas, Z.: Secure routing for mobile ad hoc networks. In: Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS) (2002)","key":"1202_CR23"},{"unstructured":"Hu, Y., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of INFOCOM (2003)","key":"1202_CR24"},{"doi-asserted-by":"crossref","unstructured":"Capkun, S., Buttyan, L., Hubaux, J.: Sector: secure tracking of node encounters in multi-hop wireless networks. In: Proceedings of the ACM workshop on security of ad hoc and sensor networks (2003)","key":"1202_CR25","DOI":"10.1145\/986858.986862"},{"issue":"3","key":"1202_CR26","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1007\/s10586-016-0575-8","volume":"19","author":"S Kianpisheh","year":"2016","unstructured":"Kianpisheh, S., Charkari, N.M.: Ant colony based constrained workflow scheduling for heterogeneous computing systems. Clust. Comput. 19(3), 1053\u20131070 (2016)","journal-title":"Clust. Comput."},{"unstructured":"Yi, S., Naldurg, P., Kravets, R.: Integrating quality of protection into ad hoc routing protocols. In: Proceedings of the 6th World Multi-conference on Systemics, Cybernetics and Informatics (SCI 2002), pp. 286\u2013292 (2002)","key":"1202_CR27"},{"doi-asserted-by":"crossref","unstructured":"Buchegger, S., Le Boudec, J.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc\u201902), pp. 226\u2013236 (2002)","key":"1202_CR28","DOI":"10.1145\/513800.513828"},{"unstructured":"Yu, W., Sun, Y., Liu, K.J.R.: HADOF: defense against routing disruptions in mobile ad hoc networks. In: Proceedings of the IEEE INFOCOM, pp. 1252\u20131261 (2005)","key":"1202_CR29"},{"issue":"2","key":"1202_CR30","first-page":"77","volume":"1","author":"A Rajaram","year":"2010","unstructured":"Rajaram, A., Palaniswami, D.S.: Malicious node detection system for mobile ad hoc networks. Int. J. Comput. Sci. Inf. Technol. 1(2), 77\u201385 (2010)","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"issue":"9622","key":"1202_CR31","first-page":"1694","volume":"2248","author":"A Kaur","year":"2013","unstructured":"Kaur, A., Wadhwa, D.S.: Effects of jelly fish attack on mobile ad-hoc network\u2019s routing protocols. IJERA 2248(9622), 1694\u20131700 (2013)","journal-title":"IJERA"},{"key":"1202_CR32","first-page":"99","volume":"22","author":"V Laxmi","year":"2015","unstructured":"Laxmi, V., Lal, C., Gaur, M.S., Mehta, D.: JellyFish attack: analysis, detection and countermeasure in TCP-based MANET. J. Inf. Secur. Appl. 22, 99\u2013112 (2015)","journal-title":"J. Inf. Secur. Appl."},{"unstructured":"Al-Karaki, J., Kamal, A., Ul-Mustafa, R.: On the optimal clustering in mobile ad hoc networks. In: First IEEE Consumer Communications and Networking Conference, 2004. CCNC, pp. 71\u201376 (2004)","key":"1202_CR33"},{"unstructured":"Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: Proceedings of the 27th Australian Conference on Computer Science (ACSC\u201904), Dunedin, New Zealand, pp. 47\u2013 54 (2004)","key":"1202_CR34"},{"unstructured":"Li, X., Lyu, M. R., Liu, J.: A trust model based routing protocol for secure ad hoc networks. In: Proceedings 2004 IEEE Aerospace Conference, Big Sky, MT, USA, pp. 1286\u20131295 (2004)","key":"1202_CR35"},{"doi-asserted-by":"crossref","unstructured":"Lee, S., Su, W., Gerla, M.: On-demand multicast routing protocol in multihop wireless mobile networks. In: ACM\/Baltzer Mobile Networks and Applications, A Special Issue on Multipoint Communication in Wireless Mobile Networks, vol. 7, pp. 441\u2013453 (2002)","key":"1202_CR36","DOI":"10.1023\/A:1020756600187"},{"issue":"4","key":"1202_CR37","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.1007\/s10586-016-0674-6","volume":"19","author":"B Hu","year":"2016","unstructured":"Hu, B., Qian, H., Shen, Y., Yan, J.: An optimal path finding strategy in networks based on random walk. Clust. Comput. 19(4), 2179\u20132188 (2016)","journal-title":"Clust. Comput."},{"doi-asserted-by":"crossref","unstructured":"Varatharajan, R., Manogaran, G., Priyan, M. K., Revathi sundarasekar.: Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust. Comput 1\u201310 (2017)","key":"1202_CR38","DOI":"10.1007\/s10586-017-0977-2"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1202-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-1202-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1202-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T00:16:14Z","timestamp":1750983374000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-1202-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,13]]},"references-count":38,"journal-issue":{"issue":"S5","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["1202"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-1202-z","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2017,11,13]]},"assertion":[{"value":"22 January 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 September 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2017","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}