{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:41:28Z","timestamp":1776116488107,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T00:00:00Z","timestamp":1716249600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T00:00:00Z","timestamp":1716249600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s11036-024-02336-6","type":"journal-article","created":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T03:32:06Z","timestamp":1716262326000},"page":"2030-2046","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Enhancing Data Security in Mobile Ad-hoc Network (MANETs) Using Trust-Based Approach with RSSI and Fuzzy Logic"],"prefix":"10.1007","volume":"29","author":[{"given":"Adel A.","family":"Alyoubi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,21]]},"reference":[{"issue":"4","key":"2336_CR1","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1049\/IET-IFS.2009.0140\/CITE\/REFWORKS","volume":"4","author":"X Li","year":"2010","unstructured":"Li X, Jia Z, Zhang P, Zhang R, Wang H (2010) Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf Secure 4(4):212\u2013232. https:\/\/doi.org\/10.1049\/IET-IFS.2009.0140\/CITE\/REFWORKS","journal-title":"IET Inf Secure"},{"key":"2336_CR2","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/ICMTMA.2010.602","volume":"1","author":"S Chen","year":"2010","unstructured":"Chen S, Wu M (2010) Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks. 2010 Int Conf Meas Technol Mechatronics Autom ICMTMA 2010 1:582\u2013585. https:\/\/doi.org\/10.1109\/ICMTMA.2010.602","journal-title":"2010 Int Conf Meas Technol Mechatronics Autom ICMTMA 2010"},{"issue":"1","key":"2336_CR3","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/J.AD-HOC.2010.04.007","volume":"9","author":"J Yi","year":"2011","unstructured":"Yi J, Adnane A, David S, Parrein B (2011) Multipath optimized link state routing for mobile ad hoc networks. Ad Hoc Netw 9(1):28\u201347. https:\/\/doi.org\/10.1016\/J.AD-HOC.2010.04.007","journal-title":"Ad Hoc Netw"},{"key":"2336_CR4","doi-asserted-by":"publisher","unstructured":"Venkata Krishna P, Saritha V, Vedha G, Bhiwal A, Chawla AS (2012) Quality-of-service-enabled ant colony-based multipath routing for mobile ad hoc networks. Undefined 6(1):76\u201383. https:\/\/doi.org\/10.1049\/IET-COM.2010.0763","DOI":"10.1049\/IET-COM.2010.0763"},{"key":"2336_CR5","doi-asserted-by":"publisher","unstructured":"Nasehi H, Taheri Javan N, Aghababa AB, Ghanbari Birgani Y (2013) Improving Energy Efficiency in MANETs by Multi-Path Routing. Undefined 5(1):163\u2013176. https:\/\/doi.org\/10.5121\/IJWMN.2013.5113","DOI":"10.5121\/IJWMN.2013.5113"},{"key":"2336_CR6","unstructured":"Gera DP \u201cTrust-based Multi-Path Routing for Enhancing Data Security in MANETs.\u201d Jan. 01, 2014, Accessed: Oct. 07, 2022. [Online]. Available: https:\/\/www.academia.edu\/81952459\/Trust_based_Multi_Path_Routing_for_Enhancing_Data_Security_in_MANETs"},{"key":"2336_CR7","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/J.PISC.2016.06.057","volume":"8","author":"S Aluvala","year":"2016","unstructured":"Aluvala S, Raja Sekhar K, Vodnala D (2016) A novel technique for node authentication in mobile ad hoc networks. Perspect Sci 8:680\u2013682. https:\/\/doi.org\/10.1016\/J.PISC.2016.06.057","journal-title":"Perspect Sci"},{"key":"2336_CR8","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/J.AD-HOC.2015.08.020","volume":"37","author":"S Sarkar","year":"2016","unstructured":"Sarkar S, Datta R (2016) A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks. Ad Hoc Netw 37:209\u2013227. https:\/\/doi.org\/10.1016\/J.AD-HOC.2015.08.020","journal-title":"Ad Hoc Netw"},{"issue":"3","key":"2336_CR9","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/J.JKSUCI.2016.03.004","volume":"29","author":"MN Ahmed","year":"2017","unstructured":"Ahmed MN, Abdullah AH, Chizari H, Kaiwartya O (2017) \u201cF3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs. J King Saud Univ - Comput Inf Sci 29(3):269\u2013280. https:\/\/doi.org\/10.1016\/J.JKSUCI.2016.03.004","journal-title":"J King Saud Univ - Comput Inf Sci"},{"issue":"4","key":"2336_CR10","doi-asserted-by":"publisher","first-page":"14","DOI":"10.5815\/IJCNIS.2022.04.02","volume":"14","author":"SM Benakappa","year":"2022","unstructured":"Benakappa SM, Kiran M (2022) Energy Aware Stable Multipath Disjoint Routing Based on Accumulated Trust Value in MANETs. Int J Comput Netw Inf Secur 14(4):14\u201326. https:\/\/doi.org\/10.5815\/IJCNIS.2022.04.02","journal-title":"Int J Comput Netw Inf Secur"},{"key":"2336_CR11","doi-asserted-by":"publisher","unstructured":"Taha A, Alsaqour R, Uddin M, Abdelhaq M, Saba T (2017) Energy Efficient Multipath Routing Protocol for Mobile Ad-Hoc Network Using the Fitness Function. undefined 5:10369\u201310381. https:\/\/doi.org\/10.1109\/ACCESS.2017.2707537","DOI":"10.1109\/ACCESS.2017.2707537"},{"issue":"5","key":"2336_CR12","doi-asserted-by":"publisher","first-page":"56","DOI":"10.3390\/ELECTRONICS7050056","volume":"7","author":"RK Sahu","year":"2018","unstructured":"Sahu RK, Chaudhari NS (2018) Energy reduction multipath routing protocol for MANET using recoil technique. Electron 7(5):56. https:\/\/doi.org\/10.3390\/ELECTRONICS7050056","journal-title":"Electron"},{"key":"2336_CR13","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.future.2019.12.018","volume":"105","author":"SNG Gourisetti","year":"2020","unstructured":"Gourisetti SNG, Mylrea M, Patangia H (2020) Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysis. Futur Gener Comput Syst 105:410\u2013431","journal-title":"Futur Gener Comput Syst"},{"key":"2336_CR14","doi-asserted-by":"crossref","unstructured":"Buzdugan A, C\u0103p\u0103\u021b\u00e2n\u0103 G (2023) The Trends in Cybersecurity Maturity Models. In Education, Research and Business Technologies: Proceedings of 21st International Conference on Informatics in Economy (IE 2022) (pp. 217\u2013228). Singapore: Springer Nature Singapore","DOI":"10.1007\/978-981-19-6755-9_18"},{"issue":"11","key":"2336_CR15","doi-asserted-by":"publisher","first-page":"150","DOI":"10.3390\/computers10110150","volume":"10","author":"N Rawindaran","year":"2021","unstructured":"Rawindaran N, Jayal A, Prakash E (2021) Machine learning cybersecurity adoption in small and medium enterprises in developed countries. Computers 10(11):150","journal-title":"Computers"},{"key":"2336_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109032","volume":"212","author":"M Macas","year":"2022","unstructured":"Macas M, Wu C, Fuertes W (2022) A survey on deep learning for cybersecurity: Progress, challenges, and opportunities. Comput Netw 212:109032","journal-title":"Comput Netw"},{"key":"2336_CR17","doi-asserted-by":"crossref","unstructured":"Mylrea M, Gourisetti SNG (2017) Cybersecurity and optimization in smart \u201cautonomous\u201d buildings. Autonomy and Artificial Intelligence: A Threat or Savior?\u00a0pp 263\u2013294","DOI":"10.1007\/978-3-319-59719-5_12"},{"key":"2336_CR18","doi-asserted-by":"crossref","unstructured":"Gao B, Maekawa T, Amagata D, Hara T (2018) Environment-adaptive malicious node detection in MANETs with ensemble learning. In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) (pp. 556\u2013566). IEEE","DOI":"10.1109\/ICDCS.2018.00061"},{"issue":"06","key":"2336_CR19","doi-asserted-by":"publisher","first-page":"748","DOI":"10.4236\/cs.2016.76064","volume":"7","author":"S Gopalakrishnan","year":"2016","unstructured":"Gopalakrishnan S (2016) Performance analysis of malicious node detection and elimination using clustering approach on MANET. Circuits and Systems 7(06):748","journal-title":"Circuits and Systems"},{"key":"2336_CR20","doi-asserted-by":"publisher","first-page":"13445","DOI":"10.1007\/s10586-018-1955-z","volume":"22","author":"A Kumaravel","year":"2019","unstructured":"Kumaravel A, Chandrasekaran M (2019) Performance analysis of malicious node detection in MANET using ANFIS classification approach. Clust Comput 22:13445\u201313452","journal-title":"Clust Comput"},{"key":"2336_CR21","doi-asserted-by":"crossref","unstructured":"Patel M, Sharma S (2013) Detection of malicious attack in MANET a behavioral approach. In 2013 3rd IEEE International Advance Computing Conference (IACC) (pp. 388\u2013393). IEEE","DOI":"10.1109\/IAdCC.2013.6514256"},{"key":"2336_CR22","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/s11704-014-4212-5","volume":"9","author":"A Ahmed","year":"2015","unstructured":"Ahmed A, Abu Bakar K, Channa MI, Haseeb K, Khan AW (2015) A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. Front Comp Sci 9:280\u2013296","journal-title":"Front Comp Sci"},{"key":"2336_CR23","doi-asserted-by":"crossref","unstructured":"Mayadunna H, De Silva SL, Wedage I, Pabasara S, Rupasinghe L, Liyanapathirana C, Kesavan K, Nawarathna C, Sampath KK (2017) Improving trusted routing by identifying malicious nodes in a MANET using reinforcement learning. In 2017 Seventeenth International Conference on Advances in ICT for Emerging Regions (ICTer)\u00a0(pp. 1\u20138). IEEE","DOI":"10.1109\/ICTER.2017.8257821"},{"key":"2336_CR24","doi-asserted-by":"publisher","first-page":"4995","DOI":"10.1007\/s12652-020-01797-3","volume":"11","author":"V Gomathy","year":"2020","unstructured":"Gomathy V, Padhy N, Samanta D, Sivaram M, Jain V, Amiri IS (2020) Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless ad-hoc sensor networks. J Ambient Intell Humaniz Comput 11:4995\u20135001","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"2336_CR25","doi-asserted-by":"crossref","unstructured":"Chethana, C, Pareek PK, de Albuquerque VHC, Khanna A, Gupta D (2022) Deep learning technique based intrusion detection in cyber-security networks. In 2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon) (pp. 1\u20137). IEEE","DOI":"10.1109\/MysuruCon55714.2022.9972350"},{"issue":"2","key":"2336_CR26","doi-asserted-by":"publisher","first-page":"999","DOI":"10.1007\/S11277-017-5163-6","volume":"99","author":"M Sedrati","year":"2017","unstructured":"Sedrati M, Benyahia A (2017) \u201cMultipath Routing to Improve Quality of Service for Video Streaming Over Mobile Ad Hoc Networks. Wirel Pers Commun 99(2):999\u20131013. https:\/\/doi.org\/10.1007\/S11277-017-5163-6","journal-title":"Wirel Pers Commun"},{"key":"2336_CR27","doi-asserted-by":"publisher","first-page":"4455","DOI":"10.1007\/s12652-018-1126-3","volume":"10","author":"YH Robinson","year":"2019","unstructured":"Robinson YH, Julie EG, Saravanan K, Kumar R, Son LH (2019) FD-AOMDV: fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks. J Ambient Intell Humaniz Comput 10:4455\u20134472. https:\/\/doi.org\/10.1007\/s12652-018-1126-3","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"4","key":"2336_CR28","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1007\/S41870-018-0107-2","volume":"11","author":"A Banerjee","year":"2019","unstructured":"Banerjee A, Chowdhury S (2019) Expected residual lifetime based ad hoc on-demand multipath routing protocol (ERL-AOMDV) in mobile ad hoc networks. Int J Inf Technol 11(4):727\u2013733. https:\/\/doi.org\/10.1007\/S41870-018-0107-2","journal-title":"Int J Inf Technol"},{"key":"2336_CR29","doi-asserted-by":"publisher","first-page":"2349","DOI":"10.1007\/S11277-018-5820-4","volume":"101","author":"PT Kasthuribai","year":"2018","unstructured":"Kasthuribai PT, Sundararajan M (2018) Secured and QoS based energy-aware multipath routing in MANET. Wirel Pers Commun 101:2349\u20132364. https:\/\/doi.org\/10.1007\/S11277-018-5820-4","journal-title":"Wirel Pers Commun"},{"key":"2336_CR30","doi-asserted-by":"publisher","DOI":"10.1145\/3440749.3442621","author":"IU Khan","year":"2020","unstructured":"Khan IU et al (2020) Reinforce based optimization in wireless communication technologies and routing techniques using internet of flying vehicles. ACM Int Conf Proceeding Ser. https:\/\/doi.org\/10.1145\/3440749.3442621","journal-title":"ACM Int Conf Proceeding Ser"},{"key":"2336_CR31","doi-asserted-by":"publisher","unstructured":"Khan IU, Shah SBH, Wang L, Aziz MA, Stephan T, Kumar N (2021) Routing protocols & unmanned aerial vehicles autonomous localization in flying networks. Int J Commun Syst e4885. https:\/\/doi.org\/10.1002\/DAC.4885","DOI":"10.1002\/DAC.4885"},{"issue":"2","key":"2336_CR32","doi-asserted-by":"publisher","first-page":"3653","DOI":"10.32604\/CMC.2022.020697","volume":"70","author":"IU Khan","year":"2021","unstructured":"Khan IU, Hassan MA, Fayaz M, Gwak J, Aziz MA (2021) Improved Sequencing Heuristic DSDV Protocol Using Nomadic Mobility Model for FANETS. Comput Mater Contin 70(2):3653\u20133666. https:\/\/doi.org\/10.32604\/CMC.2022.020697","journal-title":"Comput Mater Contin"},{"key":"2336_CR33","doi-asserted-by":"publisher","unstructured":"Koohathongsumrit N, Meethom W (2021) An integrated approach of fuzzy risk assessment model and data envelopment analysis for route selection in multimodal transportation networks.\u00a0Expert Syst Appl 171:114342. https:\/\/doi.org\/10.1016\/j.eswa.2020.114342","DOI":"10.1016\/j.eswa.2020.114342"},{"key":"2336_CR34","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.psep.2021.09.028","volume":"155","author":"CH Han","year":"2021","unstructured":"Han CH, Han C (2021) Semi-quantitative cybersecurity risk assessment by blockade and defense level analysis. Process Saf Environ Prot 155:306\u2013316. https:\/\/doi.org\/10.1016\/j.psep.2021.09.028","journal-title":"Process Saf Environ Prot"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-024-02336-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-024-02336-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-024-02336-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T08:29:45Z","timestamp":1748420985000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-024-02336-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,21]]},"references-count":34,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["2336"],"URL":"https:\/\/doi.org\/10.1007\/s11036-024-02336-6","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,21]]},"assertion":[{"value":"25 April 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 May 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}