{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T17:32:58Z","timestamp":1751477578956},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"S6","license":[{"start":{"date-parts":[[2018,3,5]],"date-time":"2018-03-05T00:00:00Z","timestamp":1520208000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s10586-018-2020-7","type":"journal-article","created":{"date-parts":[[2018,3,5]],"date-time":"2018-03-05T12:51:27Z","timestamp":1520254287000},"page":"13609-13618","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Secure location aware routing protocol with authentication for data integrity"],"prefix":"10.1007","volume":"22","author":[{"given":"S.","family":"Gopinath","sequence":"first","affiliation":[]},{"given":"K.","family":"Vinoth\u00a0Kumar","sequence":"additional","affiliation":[]},{"given":"T.","family":"Jaya\u00a0Sankar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,5]]},"reference":[{"key":"2020_CR1","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.procs.2016.07.334","volume":"92","author":"G Narsimha","year":"2016","unstructured":"Narsimha, G.: Trust based certificate revocation for secure routing in MANET. Procedia Comput. Sci. 92, 431\u2013441 (2016)","journal-title":"Procedia Comput. Sci."},{"issue":"8","key":"2020_CR2","first-page":"5863","volume":"11","author":"G Soma Sekhar","year":"2016","unstructured":"Soma Sekhar, G., Sreenivas Reddy, E.: ENES: exploratory node eminence state for secure routing in mobile ad hoc networks. Int. J. Appl. Eng. Res. 11(8), 5863\u20135868 (2016)","journal-title":"Int. J. Appl. Eng. Res."},{"issue":"4","key":"2020_CR3","doi-asserted-by":"publisher","first-page":"318","DOI":"10.7763\/LNSE.2015.V3.212","volume":"3","author":"VH Patel","year":"2015","unstructured":"Patel, V.H., Zaveri, M.A., Rath, H.K.: Trust based routing in mobile ad-hoc networks. Lect. Notes Softw. Eng. 3(4), 318\u2013324 (2015)","journal-title":"Lect. Notes Softw. Eng."},{"issue":"7","key":"2020_CR4","first-page":"7559","volume":"3","author":"P Singh","year":"2014","unstructured":"Singh, P., Singh, G.: Security issues and link expiration in secure routing protocols in MANET: a review. Int. J. Adv. Res. Comput. Commun. Eng. 3(7), 7559\u20137565 (2014)","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"issue":"15","key":"2020_CR5","first-page":"1735","volume":"8","author":"CK Shyamala","year":"2015","unstructured":"Shyamala, C.K., Ashok, N., Narayanan, B.: Trust-based multi-path security scheme for ad-hoc networks. Int. Sci. Press 8(15), 1735\u20131742 (2015)","journal-title":"Int. Sci. Press"},{"issue":"1","key":"2020_CR6","first-page":"1","volume":"43","author":"V Jayalakshmi","year":"2016","unstructured":"Jayalakshmi, V., Abdul Razak, T.: Trust based power aware secure source routing protocol using fuzzy logic for mobile adhoc networks. Int. J. Comput. Sci. 43(1), 1\u201310 (2016)","journal-title":"Int. J. Comput. Sci."},{"key":"2020_CR7","doi-asserted-by":"crossref","unstructured":"Maxa, J.A., Mahmoud, M.S.B., Larrieu, N.: Secure routing protocol design for UAV ad hoc networks. In: IEEE\/AIAA 34th Digital Avionics Systems Conference, pp. 1\u201315 (2015)","DOI":"10.1109\/DASC.2015.7311581"},{"issue":"6","key":"2020_CR8","first-page":"89","volume":"9","author":"S Yuezhongyi","year":"2015","unstructured":"Yuezhongyi, S.: Reliable and secure routing ad-hoc algorithm based on collaborative monitor nodes in VANETS. Int. J. Secur. Appl. 9(6), 89\u2013100 (2015)","journal-title":"Int. J. Secur. Appl."},{"issue":"3","key":"2020_CR9","first-page":"30","volume":"122","author":"JR Gandhi","year":"2015","unstructured":"Gandhi, J.R., Jhaveri, R.H.: Packet forwarding misbehaviour isolation using fuzzy trust-based secure routing in MANET. Int. J. Comput. Appl. 122(3), 30\u201335 (2015)","journal-title":"Int. J. Comput. Appl."},{"issue":"10","key":"2020_CR10","first-page":"14717","volume":"4","author":"C Sethulekshmi","year":"2015","unstructured":"Sethulekshmi, C., Kumar, M.: Energy efficient secure routing in MANETs based on multipath erasure coding. Int. J. Eng. Comput. Sci. 4(10), 14717\u201314724 (2015)","journal-title":"Int. J. Eng. Comput. Sci."},{"key":"2020_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2015\/284276","volume":"2015","author":"Y. Harold Robinson","year":"2015","unstructured":"Robinson, H., Rajaram, M.: Energy-aware multipath routing scheme based on particle swarm optimization in mobile ad hoc networks. Sci. World J. (2015). \nhttps:\/\/doi.org\/10.1155\/2015\/284276","journal-title":"The Scientific World Journal"},{"issue":"6","key":"2020_CR12","first-page":"6183","volume":"3","author":"K Khedkar","year":"2015","unstructured":"Khedkar, K.: Secure and optimizing routing technique for MANETs. Int. J. Innov. Res. Comput. Commun. Eng. 3(6), 6183\u20136189 (2015)","journal-title":"Int. J. Innov. Res. Comput. Commun. Eng."},{"issue":"1","key":"2020_CR13","first-page":"64","volume":"3","author":"S Sridhar","year":"2015","unstructured":"Sridhar, S., Baskaran, R.: Ant based trustworthy routing in mobile ad hoc networks spotlighting quality of service. Am. J. Comput. Sci. Inf. Technol. 3(1), 64\u201373 (2015)","journal-title":"Am. J. Comput. Sci. Inf. Technol."},{"issue":"4","key":"2020_CR14","first-page":"16","volume":"4","author":"M Shyma","year":"2015","unstructured":"Shyma, M., Nishanth, N.: Secure routing in mobile ad-hoc networks using evidence theory. Int. J. Adv. Trends Comput. Sci. Eng. 4(4), 16\u201321 (2015)","journal-title":"Int. J. Adv. Trends Comput. Sci. Eng."},{"issue":"2","key":"2020_CR15","first-page":"103","volume":"14","author":"S Pal","year":"2015","unstructured":"Pal, S., Sethi, S.: A secure on-demand routing protocol in cognitive radio ad hoc network. Int. J. Emerg. Technol. Comput. Appl. Sci. 14(2), 103\u2013109 (2015)","journal-title":"Int. J. Emerg. Technol. Comput. Appl. Sci."},{"issue":"3","key":"2020_CR16","doi-asserted-by":"publisher","first-page":"237","DOI":"10.20532\/cit.2016.1002835","volume":"24","author":"R Shah","year":"2016","unstructured":"Shah, R., Subramaniam, S., Dasarathan, D.B.L.: Mitigating malicious attacks using trust based secure-BEFORE routing strategy in mobile ad hoc networks, CIT. J. Comput. Inf. Technol. 24(3), 237\u2013252 (2016)","journal-title":"J. Comput. Inf. Technol."},{"issue":"12","key":"2020_CR17","first-page":"11","volume":"4","author":"U Kumuda","year":"2015","unstructured":"Kumuda, U., Venkatraman, P.: An approach for energy based secure routing protocol. Int. J. Comput. Math. Sci. 4(12), 11\u201314 (2015)","journal-title":"Int. J. Comput. Math. Sci."},{"issue":"08","key":"2020_CR18","first-page":"2731","volume":"2","author":"NP Bobade","year":"2010","unstructured":"Bobade, N.P., Mhala, N.N.: Performance evaluation of ad hoc on demand distance vector in MANETs with varying network size using NS-2 simulation. Int. J. Comput. Sci. Eng. 2(08), 2731\u20132735 (2010)","journal-title":"Int. J. Comput. Sci. Eng."},{"issue":"2","key":"2020_CR19","doi-asserted-by":"publisher","first-page":"84","DOI":"10.7763\/IJFCC.2014.V3.273","volume":"3","author":"MS Chaudhary","year":"2014","unstructured":"Chaudhary, M.S., Singh, V.: Simulation and study of AODV routing protocol under CBR and TCP traffic source. Int. J. Future Comput. Commun. 3(2), 84 (2014)","journal-title":"Int. J. Future Comput. Commun."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2020-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-018-2020-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2020-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T22:09:09Z","timestamp":1574806149000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-018-2020-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,5]]},"references-count":19,"journal-issue":{"issue":"S6","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["2020"],"URL":"https:\/\/doi.org\/10.1007\/s10586-018-2020-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,5]]},"assertion":[{"value":"3 January 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}