{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T22:20:02Z","timestamp":1768342802744,"version":"3.49.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2017,5,24]],"date-time":"2017-05-24T00:00:00Z","timestamp":1495584000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s11227-017-2075-x","type":"journal-article","created":{"date-parts":[[2017,5,24]],"date-time":"2017-05-24T05:40:30Z","timestamp":1495604430000},"page":"5173-5196","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system"],"prefix":"10.1007","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2764-6373","authenticated-orcid":false,"given":"Shahram","family":"Jamali","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1848-0220","authenticated-orcid":false,"given":"Reza","family":"Fotohi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,24]]},"reference":[{"key":"2075_CR1","doi-asserted-by":"publisher","unstructured":"Van G, Greeven MJ (2016) Mobile telecommunication standardization in Japan, China, the United States, and Europe: a comparison of regulatory and industrial regimes. Telecommunication Systems, p 1\u201312. doi:\n                        10.1007\/s11235-016-0214-y","DOI":"10.1007\/s11235-016-0214-y"},{"key":"2075_CR2","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.ress.2014.07.004","volume":"131","author":"N Bricha","year":"2014","unstructured":"Bricha N, Nourelfath M (2014) Extra-capacity versus protection for supply networks under attack. Reliab Eng Syst Saf 131:185\u2013196","journal-title":"Reliab Eng Syst Saf"},{"key":"2075_CR3","first-page":"10","volume":"7","author":"R Fotohi","year":"2016","unstructured":"Fotohi R, Ebazadeh Y, Geshlag MS (2016) A new approach for improvement security against DoS attacks in vehicular ad-hoc network. Int J Adv Comput Sci Appl 7:10\u201316","journal-title":"Int J Adv Comput Sci Appl"},{"key":"2075_CR4","first-page":"37","volume":"2","author":"R Fotohi","year":"2014","unstructured":"Fotohi R, Jamali SHA (2014) comprehensive study on defence against wormhole attack methods in mobile Ad hoc Networks. Int J Comput Sci Netw Solut 2:37\u201356","journal-title":"Int J Comput Sci Netw Solut"},{"key":"2075_CR5","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.jnca.2016.11.030","volume":"79","author":"KS Adewole","year":"2016","unstructured":"Adewole KS, Anuar NB, Kamsin A, Varathan KD, Razak SA (2016) Malicious accounts: dark of the social networks. J Netw Comput Appl 79:41\u201367","journal-title":"J Netw Comput Appl"},{"key":"2075_CR6","doi-asserted-by":"crossref","unstructured":"Rana AI, Jennings B (2016) Semantic aware processing of user defined inference rules to manage home networks. J Netw Comput Appl 79:68\u201387","DOI":"10.1016\/j.jnca.2016.11.020"},{"issue":"1","key":"2075_CR7","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.ress.2009.06.002","volume":"95","author":"J Vatn","year":"2010","unstructured":"Vatn J, Aven T (2010) An approach to maintenance optimization where safety issues are important. Reliab Eng Syst Saf 95(1):58\u201363","journal-title":"Reliab Eng Syst Saf"},{"issue":"3","key":"2075_CR8","first-page":"93","volume":"7","author":"R Fotohi","year":"2016","unstructured":"Fotohi R, Heydari R, Jamali SH (2016) A Hybrid routing method for mobile ad-hoc networks. J Adv Comput Res 7(3):93\u2013103","journal-title":"J Adv Comput Res"},{"issue":"9","key":"2075_CR9","first-page":"87","volume":"5","author":"Reza Fotohi","year":"2013","unstructured":"Fotohi Reza et al (2013b) An Improvement over AODV routing protocol by limiting visited hop count. Int J Inf Technol Comput Sci (IJITCS) 5(9):87","journal-title":"Int J Inf Technol Comput Sci (IJITCS)"},{"issue":"2","key":"2075_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/13614576.2016.1247741","volume":"21","author":"SH Jamali","year":"2016","unstructured":"Jamali SH, Fotohi R (2016) Defending against wormhole attack in MANET using an artificial immune system. New Rev Inf Netw 21(2):1\u201322. doi:\n                        10.1080\/13614576.2016.1247741","journal-title":"New Rev Inf Netw"},{"issue":"6","key":"2075_CR11","doi-asserted-by":"crossref","first-page":"2013","DOI":"10.1016\/j.compeleceng.2014.05.012","volume":"40","author":"SH Jamali","year":"2014","unstructured":"Jamali SH, Shaker V (2014) Defense against SYN flooding attacks: a particle swarm optimization approach. Comput Electr Eng 40(6):2013\u20132025","journal-title":"Comput Electr Eng"},{"key":"2075_CR12","doi-asserted-by":"crossref","unstructured":"Maulik R, Chaki N, A comprehensive review on wormhole attacks in MANET. In: 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), IEEE, 1010, pp 233\u2013238","DOI":"10.1109\/CISIM.2010.5643657"},{"issue":"10","key":"2075_CR13","first-page":"21","volume":"5","author":"R Fotohi","year":"2013","unstructured":"Fotohi R, Jamali SH, Sarkohaki F (2013a) Performance evaluation of AODV, LHC-AODV, OLSR, UL-OLSR, DSDV routing protocols. Int J Inf Technol Comput Sci (IJITCS) 5(10):21","journal-title":"Int J Inf Technol Comput Sci (IJITCS)"},{"key":"2075_CR14","doi-asserted-by":"crossref","unstructured":"Drozda M, Schaust S, Szczerbicka H (2007) AIS for misbehavior detection in wireless sensor networks: performance and design principles. In: 2007 IEEE Congress on Evolutionary Computation, IEEE, pp 3719\u20133726","DOI":"10.1109\/CEC.2007.4424955"},{"issue":"1","key":"2075_CR15","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/0167-2789(86)90240-X","volume":"22","author":"JD Farmer","year":"1986","unstructured":"Farmer JD, Packard NH, Perelson AS (1986) The immune system, adaptation, and machine learning. Phys D: Nonlinear Phenom 22(1):187\u2013204","journal-title":"Phys D: Nonlinear Phenom"},{"issue":"1","key":"2075_CR16","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1111\/j.1600-065X.1989.tb00025.x","volume":"110","author":"AS Perelson","year":"1989","unstructured":"Perelson AS (1989) Immune network theory. Immunol Rev 110(1):5\u201336. doi:\n                        10.1111\/j.1600-065X.1989.tb00025.x","journal-title":"Immunol Rev"},{"key":"2075_CR17","unstructured":"Varela F, Coutinho A, Dupire B, Nelson N (1988) Cognitive networks: immune, neural and otherwise. In: Perelson AS (ed) Theoretical immunology, part two. SFI studies in the sciences of complexity, vol 3. Addison-Wesley, MA, pp 377\u2013401"},{"issue":"1","key":"2075_CR18","doi-asserted-by":"publisher","first-page":"41","DOI":"10.4236\/cn.2012.41006","volume":"4","author":"J Shen","year":"2012","unstructured":"Shen J, Wang J, Ai H (2012) An improved artificial immune system-based network intrusion detection by using rough set. Commun Netw 4(1):41\u201347. doi:\n                        10.4236\/cn.2012.41006","journal-title":"Commun Netw"},{"issue":"3","key":"2075_CR19","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh LA (1965) Fuzzy sets. Inf Control 8(3):338\u2013353","journal-title":"Inf Control"},{"key":"2075_CR20","doi-asserted-by":"crossref","unstructured":"Teotia V, Dhurandher SK, Woungang I, Obaidat MS (2015) Wormhole prevention using COTA mechanism in position based environment over MANETs. In: 2015 IEEE International Conference on Communications (ICC), IEEE, pp 7036\u20137040","DOI":"10.1109\/ICC.2015.7249448"},{"key":"2075_CR21","doi-asserted-by":"crossref","unstructured":"Lu X, Dong D, Liao X (2013) WormPlanar: Topological planarization based wormhole detection in wireless networks. In: 2013 42nd International Conference on Parallel Processing, IEEE, pp 498\u2013503","DOI":"10.1109\/ICPP.2013.61"},{"key":"2075_CR22","doi-asserted-by":"crossref","unstructured":"Amish P, Vaghela VB (2016) Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. 7th International Conference on Communication, Elsevier, pp 700\u2013707","DOI":"10.1016\/j.procs.2016.03.092"},{"key":"2075_CR23","doi-asserted-by":"crossref","unstructured":"Raju VK, Kumar KV (2012) A simple and efficient mechanism to detect and avoid wormhole attacks in mobile ad hoc networks. In: 2012 International Conference on Computing Sciences (ICCS), IEEE, pp 271\u2013275","DOI":"10.1109\/ICCS.2012.4"},{"key":"2075_CR24","doi-asserted-by":"crossref","unstructured":"Patel A, Patel N, Patel R (2015). Defending against wormhole attack in MANET. In: 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT), IEEE, pp 674\u2013678","DOI":"10.1109\/CSNT.2015.253"},{"key":"2075_CR25","doi-asserted-by":"crossref","unstructured":"Ji S, Chen T, Zhong S, Kak S (2014) Dawn: defending against wormhole attacks in wireless network coding systems. In: 2014 IEEE Conference on Computer Communications, IEEE INFOCOM, IEEE, pp 664\u2013672","DOI":"10.1109\/INFOCOM.2014.6847992"},{"key":"2075_CR26","unstructured":"Patidar K, Dubey V (2014) Modification in routing mechanism of AODV for defending black hole and wormhole attacks. In: 2014 Conference on IT in Business, Industry and Government (CSIBIG), IEEE, pp 1\u20136"},{"issue":"4","key":"2075_CR27","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s10660-012-9103-y","volume":"12","author":"Z Tan","year":"2012","unstructured":"Tan Z (2012) An efficient identity-based tripartite authenticated key agreement protocol. Electron Commer Res 12(4):505\u2013518. doi:\n                        10.1007\/s10660-012-9103-y","journal-title":"Electron Commer Res"},{"issue":"1","key":"2075_CR28","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10660-010-9068-7","volume":"11","author":"K Petrova","year":"2011","unstructured":"Petrova K, Wang B (2011) Location-based services deployment, and demand: a roadmap model. Electron Commer Res 11(1):5\u201329. doi:\n                        10.1007\/s10660-010-9068-7","journal-title":"Electron Commer Res"},{"issue":"1","key":"2075_CR29","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10660-010-9070-0","volume":"11","author":"A Aloudat","year":"2011","unstructured":"Aloudat A, Michael K (2011) Toward the regulation of ubiquitous mobile government: a case study on location-based emergency services in Australia. Electron Commer Res 11(1):31\u201374. doi:\n                        10.1007\/s10660-010-9070-0","journal-title":"Electron Commer Res"},{"issue":"1","key":"2075_CR30","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s10660-013-9106-3","volume":"13","author":"T Zhou","year":"2013","unstructured":"Zhou T (2013) An empirical examination of user adoption of location-based services. Electron Commer Res 13(1):25\u201339. doi:\n                        10.1007\/s10660-013-9106-3","journal-title":"Electron Commer Res"},{"key":"2075_CR31","unstructured":"Chiu HS, Lui KS (2006) Delphi: wormhole detection mechanism for ad hoc wireless networks. In: 2006 1st International Symposium on Wireless Pervasive Computing, IEEE, p 6"},{"key":"2075_CR32","unstructured":"Qian L, Song N, Li X (2005) Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path. In: IEEE Wireless Communications and Networking Conference, IEEE, vol 4. pp 2106\u20132111"},{"issue":"2","key":"2075_CR33","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.cose.2009.09.005","volume":"29","author":"MY Su","year":"2010","unstructured":"Su MY (2010) WARP: a wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. Comput Secur 29(2):208\u2013224. doi:\n                        10.1016\/j.cose.2009.09.005","journal-title":"Comput Secur"},{"key":"2075_CR34","doi-asserted-by":"crossref","unstructured":"Su X, Boppana RV (2007) On mitigating in-band wormhole attacks in mobile ad hoc networks. In: 2007 IEEE International Conference on Communications, IEEE, pp 1136\u20131141","DOI":"10.1109\/ICC.2007.193"},{"issue":"1","key":"2075_CR35","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/S1570-8705(03)00019-2","volume":"1","author":"YC Hu","year":"2003","unstructured":"Hu YC, Johnson DB, Perrig A (2003) SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad hoc Netw 1(1):175\u2013192. doi:\n                        10.1016\/S1570-8705(03)00019-2","journal-title":"Ad hoc Netw"},{"key":"2075_CR36","doi-asserted-by":"crossref","unstructured":"Maulik R, Chaki N, A comprehensive review on wormhole attacks in MANET. In: 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), IEEE, 1010, pp 233\u2013238","DOI":"10.1109\/CISIM.2010.5643657"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-017-2075-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-017-2075-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-017-2075-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T10:05:17Z","timestamp":1509098717000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-017-2075-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,24]]},"references-count":36,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["2075"],"URL":"https:\/\/doi.org\/10.1007\/s11227-017-2075-x","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,24]]}}}