{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,22]],"date-time":"2024-06-22T01:38:00Z","timestamp":1719020280533},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2016,3,19]],"date-time":"2016-03-19T00:00:00Z","timestamp":1458345600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s11276-016-1240-0","type":"journal-article","created":{"date-parts":[[2016,3,19]],"date-time":"2016-03-19T10:54:48Z","timestamp":1458384888000},"page":"1709-1718","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks"],"prefix":"10.1007","volume":"23","author":[{"given":"G.","family":"Akilarasu","sequence":"first","affiliation":[]},{"given":"S. Mercy","family":"Shalinie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,19]]},"reference":[{"key":"1240_CR1","unstructured":"Jayanthi, M., & Mukunthan, M. A. (2012). A security architecture for implementing anonymity and traceability in wireless mesh network using clustering concept. International Journal of Soft Computing and Engineering (IJSCE). ISSN: 2231-2307, vol 1, Issue-ETIC-2011."},{"issue":"2","key":"1240_CR2","first-page":"109","volume":"13","author":"C Li","year":"2011","unstructured":"Li, C., Wang, Z., & Yang, C. (2011). Secure routing for wireless mesh networks. International Journal of Network Security, 13(2), 109\u2013120.","journal-title":"International Journal of Network Security"},{"key":"1240_CR3","doi-asserted-by":"crossref","unstructured":"Oliviero, F., & Romano, S. P. (2008). A reputation-based metric for secure routing in wireless mesh networks. In IEEE \u201cGLOBECOM\u201d, 978-1-4244-2324-8\/08\/$25.00 \u00a9. IEEE.","DOI":"10.1109\/GLOCOM.2008.ECP.374"},{"key":"1240_CR4","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2012-69","author":"H Lin","year":"2012","unstructured":"Lin, H., Ma, J., Hu, J., & Yang, K. (2012). PA-SHWMP: A privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks. EURASIP Journal on Wireless Communications and Networking. doi: 10.1186\/1687-1499-2012-69 .","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"1240_CR5","unstructured":"Khan, K., & Akbar, M. (2008). Authentication in multi-hop wireless mesh networks. World Academy of Science, Engineering and Technology, 2(10)."},{"issue":"2","key":"1240_CR6","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s11276-012-0457-9","volume":"19","author":"Y Zeng","year":"2013","unstructured":"Zeng, Y., et al. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161\u2013173.","journal-title":"Wireless Networks"},{"issue":"8","key":"1240_CR7","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing, Q., et al. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481\u20132501.","journal-title":"Wireless Networks"},{"issue":"1","key":"1240_CR8","first-page":"4","volume":"17","author":"X Wang","year":"2012","unstructured":"Wang, X., et al. (2012). A survey of green mobile networks: Opportunities and challenges. MONET, 17(1), 4\u201320.","journal-title":"MONET"},{"key":"1240_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1133-7","author":"X Li","year":"2015","unstructured":"Li, X., et al. (2015). A review of industrial wireless networks in the context of industry 4.0. Wireless Networks. doi: 10.1007\/s11276-015-1133-7 .","journal-title":"Wireless Networks"},{"key":"1240_CR10","unstructured":"Li, P. et al. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In INFOCOM (pp. 100\u2013108)."},{"issue":"3","key":"1240_CR11","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1109\/TNSM.2014.2346080","volume":"11","author":"Y Song","year":"2014","unstructured":"Song, Y., et al. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11(3), 417\u2013430.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"3","key":"1240_CR12","first-page":"819","volume":"64","author":"L Liu","year":"2015","unstructured":"Liu, L., et al. (2015). Physarum optimization: A biology-inspired algorithm for the steiner tree problem in networks. IEEE Transactions on Computers, 64(3), 819\u2013832.","journal-title":"IEEE Transactions on Computers"},{"issue":"7","key":"1240_CR13","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1049\/iet-com.2009.0164","volume":"4","author":"Y Liu","year":"2010","unstructured":"Liu, Y., et al. (2010). Multi-layer clustering routing algorithm for wireless vehicular sensor networks. IET Communications, 4(7), 810\u2013816.","journal-title":"IET Communications"},{"issue":"9","key":"1240_CR14","doi-asserted-by":"crossref","first-page":"1270","DOI":"10.1109\/TC.2011.145","volume":"61","author":"C Busch","year":"2012","unstructured":"Busch, C., et al. (2012). Approximating congestion\u00a0+\u00a0dilation in networks via \u201cquality of routing\u201d games. IEEE Transactions on Computers, 61(9), 1270\u20131283.","journal-title":"IEEE Transactions on Computers"},{"issue":"12","key":"1240_CR15","doi-asserted-by":"crossref","first-page":"3264","DOI":"10.1109\/TPDS.2013.2297105","volume":"25","author":"P Li","year":"2014","unstructured":"Li, P., et al. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264\u20133273.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"1240_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2417543","author":"T Meng","year":"2015","unstructured":"Meng, T., et al. (2015). Spatial reusability-aware routing in multi-hop wireless networks. IEEE Transactions on Computers. doi: 10.1109\/TC.2015.2417543 .","journal-title":"IEEE Transactions on Computers"},{"issue":"4","key":"1240_CR17","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1145\/1851275.1851233","volume":"41","author":"A Dvir","year":"2011","unstructured":"Dvir, A., et al. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405\u2013406.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"11\u201312","key":"1240_CR18","doi-asserted-by":"crossref","first-page":"2238","DOI":"10.1016\/j.mcm.2010.10.008","volume":"53","author":"Y-S Yen","year":"2011","unstructured":"Yen, Y.-S., et al. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53(11\u201312), 2238\u20132250.","journal-title":"Mathematical and Computer Modelling"},{"key":"1240_CR19","doi-asserted-by":"publisher","unstructured":"Sen, J. (2013). Secure and privacy-preserving authentication protocols for wireless mesh networks. Innovation Lab, Tata Consultancy Services Ltd. eprint arXiv: 1209.1803, Publication Date: 09\/2012. doi: 10.5772\/39176 . www.intechopen.com .","DOI":"10.5772\/39176"},{"key":"1240_CR20","doi-asserted-by":"publisher","unstructured":"Redwan, H., & Kim, K.-H. (2008). Survey of security requirements, attacks and network integration in wireless mesh networks. 978-0-7695-3540-1\/08 $25.00 \u00a9 2008 IEEE. doi: 10.1109\/FCST.2008 .","DOI":"10.1109\/FCST.2008"},{"issue":"8","key":"1240_CR21","doi-asserted-by":"crossref","first-page":"2349","DOI":"10.1007\/s11276-010-0276-9","volume":"16","author":"T Spyropoulos","year":"2010","unstructured":"Spyropoulos, T., et al. (2010). Routing for disruption tolerant networks: Taxonomy and design. Wireless Networks, 16(8), 2349\u20132370.","journal-title":"Wireless Networks"},{"key":"1240_CR22","volume-title":"Delay tolerant networks: Protocols and applications","author":"A Vasilakos","year":"2012","unstructured":"Vasilakos, A., et al. (2012). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press."},{"issue":"1","key":"1240_CR23","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/SURV.2013.082713.00184","volume":"16","author":"M Youssef","year":"2014","unstructured":"Youssef, M., et al. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 92\u2013109.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"1240_CR24","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-3514-3","volume-title":"Routing in opportunistic networks","author":"I Woungang","year":"2013","unstructured":"Woungang, I., et al. (2013). Routing in opportunistic networks. Berlin: Springer."},{"issue":"4","key":"1240_CR25","doi-asserted-by":"crossref","first-page":"742","DOI":"10.1109\/TMC.2014.2331966","volume":"14","author":"XM Zhang","year":"2015","unstructured":"Zhang, X. M., et al. (2015). Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742\u2013754.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"1","key":"1240_CR26","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1109\/JSAC.2012.120111","volume":"30","author":"PBF Duarte","year":"2012","unstructured":"Duarte, P. B. F., et al. (2012). On the partially overlapped channel assignment on wireless mesh network backbone: A game theoretic approach. IEEE Journal on Selected Areas in Communications, 30(1), 119\u2013127.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"12","key":"1240_CR27","doi-asserted-by":"crossref","first-page":"3172","DOI":"10.1109\/JPROC.2012.2208211","volume":"100","author":"A Attar","year":"2012","unstructured":"Attar, A., et al. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172\u20133186.","journal-title":"Proceedings of the IEEE"},{"key":"1240_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2015.02.001","volume":"52","author":"AV Vasilakos","year":"2015","unstructured":"Vasilakos, A. V., et al. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1\u201310.","journal-title":"Journal of Network and Computer Applications"},{"key":"1240_CR29","doi-asserted-by":"crossref","unstructured":"Yao, Y. et al. (2013) EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. In MASS 1(pp. 82\u2013190).","DOI":"10.1109\/MASS.2013.44"},{"key":"1240_CR30","doi-asserted-by":"crossref","unstructured":"Marwaha, S. et al. (2004). Evolutionary fuzzy multi-objective routing for wireless mobile ad hoc networks. In Evolutionary Computation, 2004. CEC2004. Congress on. (Vol. 2, pp. 1964\u20131971).","DOI":"10.1109\/CEC.2004.1331137"},{"key":"1240_CR31","unstructured":"Vasilakos, A. et al. (2003). Optimizing QoS routing in hierarchical ATM networks using computational intelligence techniques. IEEE Systems, Man, and Cybernetics, Part C: Applications and Reviews."},{"key":"1240_CR32","doi-asserted-by":"crossref","unstructured":"Quan, W. et al. (2014). TB2F: Tree-bitmap and bloom-filter for a scalable and efficient name lookup in content-centric networking. In IFIP Networking.","DOI":"10.1109\/IFIPNetworking.2014.6857122"},{"key":"1240_CR33","unstructured":"Aswal, M. S., Rawat, P., & Kumar, T. (2009). Threats and vulnerabilities in wireless mesh networks. International Journal of Recent Trends in Engineering, 2(4)."},{"issue":"3","key":"1240_CR34","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1109\/TIFS.2014.2381873","volume":"10","author":"G Yao","year":"2015","unstructured":"Yao, G., et al. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10(3), 471\u2013484.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1240_CR35","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.comnet.2013.08.020","volume":"58","author":"H Yang","year":"2014","unstructured":"Yang, H., et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29\u201338.","journal-title":"Computer Networks"},{"issue":"3","key":"1240_CR36","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1109\/TIFS.2013.2296437","volume":"9","author":"B Liu","year":"2014","unstructured":"Liu, B., et al. (2014). Toward incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9(3), 436\u2013450.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"6","key":"1240_CR37","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1109\/TIFS.2015.2407326","volume":"10","author":"J Zhou","year":"2015","unstructured":"Zhou, J., et al. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299\u20131314.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1240_CR38","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1016\/j.ins.2015.08.019","volume":"327","author":"J Liu","year":"2016","unstructured":"Liu, J., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288\u2013299.","journal-title":"Information Sciences"},{"key":"1240_CR39","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1016\/j.phpro.2012.05.074","volume":"33","author":"L Luan","year":"2012","unstructured":"Luan, L., Fu, Y., & Xiao, P. (2012). An effective denial of service attack detection method in wireless mesh networks. Physics Procedia, 33, 354\u2013360.","journal-title":"Physics Procedia"},{"key":"1240_CR40","unstructured":"Bansal, D., Sofat, S., & Singh, G. (2010). Secure routing protocol for hybrid wireless mesh network (HWMN). In Computer and Communication Technology (ICCCT), 2010 International Conference (pp. 837\u2013843). Print ISBN: 978-1-4244-9033-2, 978-1-4244-9034\/10\/$26.00\u00a92010 IEEE, 17\u201319 Sept. 2010."},{"issue":"8","key":"1240_CR41","doi-asserted-by":"crossref","first-page":"596","DOI":"10.4304\/jcm.7.8.596-605","volume":"7","author":"F Kandah","year":"2012","unstructured":"Kandah, F., Singh, Y., & Zhang, W. (2012). Mitigating eavesdropping attack using secure key management scheme in wireless mesh networks. Journal of Communications, 7(8), 596\u2013605.","journal-title":"Journal of Communications"},{"key":"1240_CR42","doi-asserted-by":"crossref","unstructured":"Matam, R., & Tripathy, S. (2013). WRSR: Wormhole-resistant secure routing for wireless mesh networks. EURASIP Journal on Wireless Communications and Networking.","DOI":"10.1186\/1687-1499-2013-180"},{"key":"1240_CR43","doi-asserted-by":"crossref","unstructured":"Sen, J. (2010). Efficient routing anomaly detection in wireless mesh networks. In First International Conference on Integrated Intelligent Computing, 978-0-7695-4152-5\/10 $26.00 \u00a9 2010 IEEE.","DOI":"10.1109\/ICIIC.2010.22"},{"key":"1240_CR44","unstructured":"Network Simulator: http:\/\/www.isi.edu\/nsnam\/ns ."}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-016-1240-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1240-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1240-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1240-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T15:20:56Z","timestamp":1567696856000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-016-1240-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,19]]},"references-count":44,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["1240"],"URL":"https:\/\/doi.org\/10.1007\/s11276-016-1240-0","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,19]]}}}