{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:27:53Z","timestamp":1762522073187},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,9,2]],"date-time":"2017-09-02T00:00:00Z","timestamp":1504310400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11036-017-0912-z","type":"journal-article","created":{"date-parts":[[2017,9,2]],"date-time":"2017-09-02T11:48:23Z","timestamp":1504352903000},"page":"386-393","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Fuzzy Trust Approach for Detecting Black Hole Attack in Mobile Adhoc Network"],"prefix":"10.1007","volume":"24","author":[{"given":"G.","family":"Arulkumaran","sequence":"first","affiliation":[]},{"given":"R. K.","family":"Gnanamurthy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,2]]},"reference":[{"key":"912_CR1","doi-asserted-by":"publisher","unstructured":"Aliahmadipour L, Torra V, Eslami E (2017) On hesitant fuzzy clustering and clustering of hesitant fuzzy data. In: Torra V, Dahlbom A, Narukawa Y (eds) Fuzzy sets, rough sets, multisets and clustering. Studies in Computational Intelligence, vol 671. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-47557-8_10","DOI":"10.1007\/978-3-319-47557-8_10"},{"key":"912_CR2","doi-asserted-by":"crossref","unstructured":"Zhang S, Wang H, Huang W (2017) Two-stage plant species recognition by local mean clustering and weighted sparse representation classification. Cluster computing 20(2):1517\u20131525","DOI":"10.1007\/s10586-017-0859-7"},{"key":"912_CR3","doi-asserted-by":"crossref","unstructured":"Wang Y, Chen L (2017) Multi-view fuzzy clustering with minimax optimization for effective clustering of data from multiple sources. Expert Syst Appl 72:457\u2013466","DOI":"10.1016\/j.eswa.2016.10.006"},{"key":"912_CR4","unstructured":"Valarmozhi A, Subala M, Muthu V (2012) Survey of wireless mesh network. International Journal of Engineering and Innovative Technology (IJEIT) 2(6)"},{"key":"912_CR5","doi-asserted-by":"publisher","unstructured":"Tamilselvan L, Sankaranarayanan V (2008) Prevention of co-operative black hole attack in MANET. J Networks 3(5). https:\/\/doi.org\/10.4304\/jnw.3.5.13-20","DOI":"10.4304\/jnw.3.5.13-20"},{"key":"912_CR6","unstructured":"Sahu P, Bisoy SK, Sahoo S (2013) Detecting and isolating malicious node in AODV routing algorithm. Int J Comput Appl 66(16):0975\u20138887"},{"key":"912_CR7","unstructured":"Sheela D, Srividhya VR, Anjali AB, Chidanand GM (2012) Detecting black hole attacks in wireless sensor networks using mobile agent. International conference on artificial intelligence and embedded systems (ICAIES'2012), Singapore"},{"key":"912_CR8","doi-asserted-by":"crossref","unstructured":"Sethi S, Udgata SK (2011) Fuzzy-based trusted ant routing (FTAR) protocol in mobile ad hoc networks. In: Sombattheera C, Agarwal A, Udgata SK, Lavangnananda K (eds) Multi-disciplinary trends in artificial intelligence. MIWAI 2011. Lecture Notes in Computer Science, vol 7080. Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-25725-4_10"},{"key":"912_CR9","doi-asserted-by":"crossref","unstructured":"Marchang N, Datta R (2012) Light-weight trust-based routing protocol for mobile ad hoc networks. Information Security, IET 6, no. 2, Pp. 77\u201383","DOI":"10.1049\/iet-ifs.2010.0160"},{"issue":"7","key":"912_CR10","doi-asserted-by":"publisher","first-page":"2096","DOI":"10.1016\/j.adhoc.2012.02.009","volume":"11","author":"H Xia","year":"2013","unstructured":"Xia H, Jia Z, Li X, Lei J, Sha EH-M (2013) Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw 11(7):2096\u20132114","journal-title":"Ad Hoc Netw"},{"key":"912_CR11","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1016\/j.protcy.2013.12.392","volume":"10","author":"R Krishna","year":"2013","unstructured":"Krishna R, Mandal JK, Singh MM (2013) QoS of MANet through trust based AODV routing protocol by exclusion of black hole attack. Procedia Technol 10:530\u2013537","journal-title":"Procedia Technol"},{"key":"912_CR12","doi-asserted-by":"publisher","unstructured":"Biswas, S, Nag T, Neogy S (2014) Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET. Conference: 2014 Applications and Innovations in Mobile Computing (AIMoC). https:\/\/doi.org\/10.1109\/AIMOC.2014.6785535","DOI":"10.1109\/AIMOC.2014.6785535"},{"key":"912_CR13","unstructured":"Khamayseh Y, Bader A, Mardini W, Bani Yasein M (2011) A New Protocol for Detecting Black Hole Nodes in Ad Hoc Networks. International Journal of Communication Networks and Information Security 3(1):36"},{"key":"912_CR14","unstructured":"Raj PN, Swadesh PB (2009) DPRAODV: a dynamic learning system against Blackhole attack in AODV based MANET. Int J Comput Sci 2:54\u201359."},{"key":"912_CR15","unstructured":"Gayatri V, Gomathi C (2012) Electing monitoring node through fuzzy theory in wireless mesh network for defense against selective forwarding attack. Int J Comput Eng volume 02\u2013 no. 2, issue: 02"},{"key":"912_CR16","doi-asserted-by":"crossref","unstructured":"Gnanamurthy RK, Malathi L (2012) A novel routing protocol with lifetime maximizing clustering algorithm for WSN India conference (INDICON), (2012) annual IEEE925-930","DOI":"10.1109\/INDCON.2012.6420749"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-017-0912-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-017-0912-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-017-0912-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T02:47:55Z","timestamp":1570070875000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-017-0912-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,2]]},"references-count":16,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["912"],"URL":"https:\/\/doi.org\/10.1007\/s11036-017-0912-z","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,2]]},"assertion":[{"value":"2 September 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}