{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T05:59:01Z","timestamp":1649051941265},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T00:00:00Z","timestamp":1542585600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11036-018-1144-6","type":"journal-article","created":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T01:54:49Z","timestamp":1542592489000},"page":"903-912","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Determining Honesty of Accuser Nodes in Key Revocation Procedure for MANETs"],"prefix":"10.1007","volume":"24","author":[{"given":"Maryam","family":"Zarezadeh","sequence":"first","affiliation":[]},{"given":"Hamid","family":"Mala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,19]]},"reference":[{"issue":"2","key":"1144_CR1","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1109\/TPDS.2012.85","volume":"24","author":"W Liu","year":"2013","unstructured":"Liu W, Nishiyama H, Ansari N, Yang J, Kato N (2013) Cluster-based certificate revocation with vindication capability for mobile ad hoc networks. IEEE Trans Parallel Distrib Syst 24(2):239\u2013 249","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"6","key":"1144_CR2","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1109\/TNET.2004.838598","volume":"12","author":"H Luo","year":"2004","unstructured":"Luo H, Kong J, Zerfos P, Lu S, Zhang L (2004) URSA: ubiquitous and robust access control for mobile ad hoc networks. IEEE\/ACM Trans Networking (ToN) 12(6):1049\u20131063","journal-title":"IEEE\/ACM Trans Networking (ToN)"},{"key":"1144_CR3","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1109\/TDSC.2005.49","volume":"2","author":"J Luo","year":"2005","unstructured":"Luo J, Hubaux JP, Eugster PT (2005) Dictate: distributed certification authority with probabilistic freshness for ad hoc networks. IEEE Trans Dependable Secure Comput 2:311\u2013323","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1144_CR4","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/11814764_19","volume-title":"Key revocation for identity-based schemes in mobile ad hoc networks. Ad-Hoc, mobile and wireless networks","author":"K Hoeper","year":"2006","unstructured":"Hoeper K, Gong G (2006) Key revocation for identity-based schemes in mobile ad hoc networks. Ad-Hoc, mobile and wireless networks. Springer, Berlin, pp 224\u2013237"},{"key":"1144_CR5","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/1151374.1151381","volume":"40","author":"J Clulow","year":"2006","unstructured":"Clulow J, Moore T (2006) Suicide for the common good: a new strategy for credential revocation in self-organizing systems. ACM SIGOPS Oper Syst Rev 40:18\u201321","journal-title":"ACM SIGOPS Oper Syst Rev"},{"key":"1144_CR6","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.adhoc.2006.07.003","volume":"6","author":"G Arboit","year":"2008","unstructured":"Arboit G, Crepeau C, Davis CR, Maheswaran MA (2008) Localized certificate revocation scheme for mobile ad hoc networks. Ad Hoc Netw 6:17\u201331","journal-title":"Ad Hoc Netw"},{"issue":"9","key":"1144_CR7","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.1002\/dac.1015","volume":"22","author":"M Ge","year":"2009","unstructured":"Ge M, Lam KY, Gollmann D, Chung SL, Chang CC, Li JB (2009) A robust certification service for highly dynamic MANET in emergency tasks. Int J Commun Syst 22(9):1177\u20131197","journal-title":"Int J Commun Syst"},{"key":"1144_CR8","unstructured":"Chauhan KK, Tapaswi S (2010) A secure key management system in group structured mobile ad hoc networks, in wireless communications. In: IEEE international conference on networking and information security (WCNIS), pp 307\u2013311"},{"key":"1144_CR9","doi-asserted-by":"crossref","unstructured":"PushpaLakshmi R, Kumar AVA, Rahul R (2011) Mobile agent based composite key management scheme for MANET. In: international conference on emerging trends in electrical and computer technology (ICETECT), pp 964\u2013969","DOI":"10.1109\/ICETECT.2011.5760259"},{"issue":"2","key":"1144_CR10","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1002\/wcm.839","volume":"11","author":"S Misra","year":"2011","unstructured":"Misra S, Goswami S, Pathak GP, Shah N (2011) Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks. Wirel Commun Mob Comput 11(2):146\u2013162","journal-title":"Wirel Commun Mob Comput"},{"key":"1144_CR11","doi-asserted-by":"publisher","unstructured":"Zhang J, Xu Y (2013) Privacy-preserving authentication protocols with efficient verification in VANETs. International Journal of Communication Systems. \n                    https:\/\/doi.org\/10.1002\/dac.2566","DOI":"10.1002\/dac.2566"},{"key":"1144_CR12","unstructured":"Munoz JL, Esparza O, Gann C, Parra-Arnau J (2009) Pkix certificate status in hybrid manets. In: IFIP international workshop on information security theory and practices. Springer, Berlin, pp 153\u2013166"},{"key":"1144_CR13","doi-asserted-by":"crossref","unstructured":"Sun B, Guan Y, Chen J, Pooch UW (2003) Detecting black-hole attack in mobile ad hoc networks. In: 5th European personal mobile communications conference 2003. IET, pp 490\u2013495","DOI":"10.1049\/cp:20030303"},{"key":"1144_CR14","first-page":"657","volume":"2","author":"P Yi","year":"2005","unstructured":"Yi P, Dai Z, Zhong Y, Zhang S (2005) Resisting flooding attacks in ad hoc networks. Int Conf Inf Technol Coding Comput 2:657\u2013662","journal-title":"Int Conf Inf Technol Coding Comput"},{"key":"1144_CR15","doi-asserted-by":"crossref","unstructured":"Choi S, Kim DY, Lee DH, Jung JI (2008) Wormhole attack prevention algorithm in mobile ad hoc networks. In: Sensor networks, ubiquitous and trustworthy computing, SUTC\u201908. IEEE international conference, pp 343\u2013348","DOI":"10.1109\/SUTC.2008.49"},{"key":"1144_CR16","doi-asserted-by":"crossref","unstructured":"Park K, Nishiyama H, Ansari N, Kato N (2010) Certificate revocation to cope with false accusations in mobile ad hoc networks. In: IEEE 71st vehicular technology conference (VTC 2010-Spring), pp 1\u20135","DOI":"10.1109\/VETECS.2010.5494213"},{"key":"1144_CR17","doi-asserted-by":"crossref","unstructured":"Ferdous R, Muthukkumarasamy V, Sithirasenan E (2011) Trust-based cluster head selection algorithm for mobile ad hoc networks. In: IEEE 10th international conference in trust, security and privacy in computing and communications (TrustCom), pp 589\u2013596","DOI":"10.1109\/TrustCom.2011.76"},{"key":"1144_CR18","doi-asserted-by":"crossref","unstructured":"Crosby GV, Pissinou N, Gadze J (2006) A framework for trust-based cluster head election in wireless sensor networks. In: Dependability and security in sensor networks and systems (DSSNS), Second IEEE Workshop, p 10","DOI":"10.1109\/DSSNS.2006.1"},{"key":"1144_CR19","volume-title":"Stochastic processes","author":"S Ross","year":"2008","unstructured":"Ross S (2008) Stochastic processes, 2nd edn. Wiley, New York","edition":"2nd edn."},{"key":"1144_CR20","unstructured":"Haibing M, Changlun Z (2010). In: 2nd international conference on computer engineering and technology (ICCET), vol 4, pp 209\u2013213"},{"issue":"1","key":"1144_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1216370.1216371","volume":"39","author":"JVD Merwe","year":"2007","unstructured":"Merwe JVD, Dawoud D, McDonald S (2007) A survey on peer-to-peer key management for mobile ad hoc networks. ACM Comput Surv (CSUR) 39(1):1","journal-title":"ACM Comput Surv (CSUR)"},{"key":"1144_CR22","unstructured":"Object-oriented Modular discrete event NETwork. Available from: \n                    http:\/\/www.omnetpp.org\/"},{"key":"1144_CR23","unstructured":"Liang B, Haas ZJ (1999) Predictive distance-based mobility management for PCS networks. In: Eighteenth annual joint conference of the IEEE computer and communications societies. INFOCOM\u201999, vol 3, pp 1377\u20131384"},{"key":"1144_CR24","unstructured":"Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector routing. In: Second IEEE workshop on mobile computing systems and applications, proceedings. WMCSA\u201999, pp 90\u2013100"},{"key":"1144_CR25","unstructured":"Kaaniche M, Alata E, Nicomette V, Deswarte Y, Dacierm M (2006) Empirical analysis and statistical modeling of attack processes based on honeypots. In: International conference on dependable systems and networks. IEEE, Philadelphia, USA"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1144-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1144-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1144-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,18]],"date-time":"2019-11-18T19:29:11Z","timestamp":1574105351000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1144-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,19]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["1144"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1144-6","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,19]]},"assertion":[{"value":"19 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}