{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T11:13:17Z","timestamp":1713179597540},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T00:00:00Z","timestamp":1590451200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T00:00:00Z","timestamp":1590451200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s11276-020-02358-4","type":"journal-article","created":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T17:02:45Z","timestamp":1590512565000},"page":"4999-5012","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A novel node authentication protocol connected with ECC for heterogeneous network"],"prefix":"10.1007","volume":"26","author":[{"given":"Purushottam G.","family":"Chilveri","sequence":"first","affiliation":[]},{"given":"Manoj S.","family":"Nagmode","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,26]]},"reference":[{"key":"2358_CR1","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.comcom.2015.02.009","volume":"63","author":"K Hamouid","year":"2015","unstructured":"Hamouid, K., & Adi, K. (2015). Efficient certificateless web-of-trust model for public-key authentication in MANET. Computer Communications, 63, 24\u201339.","journal-title":"Computer Communications"},{"issue":"3","key":"2358_CR2","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.istr.2008.10.002","volume":"13","author":"CY Yeun","year":"2008","unstructured":"Yeun, C. Y., Han, K., Vo, D. L., & Kim, K. (2008). Secure authenticated group key agreement protocol in the MANET environment. Information Security Technical Report, 13(3), 158\u2013164.","journal-title":"Information Security Technical Report"},{"key":"2358_CR3","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.jnca.2017.07.001","volume":"103","author":"X Li","year":"2017","unstructured":"Li, X., Niu, J., Kumari, S., Wu, F., & Choo, K. K. R. (2017). A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. Journal of Network and Computer Applications, 103, 194\u2013204.","journal-title":"Journal of Network and Computer Applications"},{"key":"2358_CR4","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.adhoc.2016.11.002","volume":"54","author":"J Srinivas","year":"2017","unstructured":"Srinivas, J., Mukhopadhyay, S., & Mishra, D. (2017). Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Ad Hoc Networks, 54, 147\u2013169.","journal-title":"Ad Hoc Networks"},{"key":"2358_CR5","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.compeleceng.2016.12.009","volume":"59","author":"S Ramachandran","year":"2017","unstructured":"Ramachandran, S., & Shanmugam, V. (2017). A two way authentication using bilinear mapping function for wireless sensor networks. Computers & Electrical Engineering, 59, 242\u2013249.","journal-title":"Computers & Electrical Engineering"},{"key":"2358_CR6","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.jnca.2016.12.008","volume":"89","author":"F Wu","year":"2017","unstructured":"Wu, F., Xu, L., Kumari, S., Li, X., & Das, A. K. (2017). An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. Journal of Network and Computer Applications, 89, 72\u201385.","journal-title":"Journal of Network and Computer Applications"},{"key":"2358_CR7","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.future.2017.08.042","volume":"82","author":"F Wu","year":"2018","unstructured":"Wu, F., Li, X., Sangaiah, A. K., Xu, L., & Shen, J. (2018). A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems, 82, 727\u2013737.","journal-title":"Future Generation Computer Systems"},{"key":"2358_CR8","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.adhoc.2015.05.020","volume":"36","author":"R Amin","year":"2016","unstructured":"Amin, R., & Biswa, G. P. (2016). A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks, 36, 58\u201380.","journal-title":"Ad Hoc Networks"},{"key":"2358_CR9","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.comnet.2017.08.001","volume":"127","author":"C-C Hu","year":"2017","unstructured":"Hu, C.-C., Lai, C.-F., Hou, J.-G., & Huang, Y.-M. (2017). Timely scheduling algorithm for P2P streaming over MANETs. Computer Networks, 127, 56\u201367.","journal-title":"Computer Networks"},{"key":"2358_CR10","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.compeleceng.2016.12.013","volume":"57","author":"N Shah","year":"2017","unstructured":"Shah, N., Abid, S. A., Qian, D., & Mehmood, W. (2017). A survey of P2P content sharing in MANETs. Computers & Electrical Engineering, 57, 55\u201368.","journal-title":"Computers & Electrical Engineering"},{"key":"2358_CR11","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.pmcj.2016.09.008","volume":"39","author":"S Sarkar","year":"2017","unstructured":"Sarkar, S., & Datta, R. (2017). A game theoretic framework for stochastic multipath routing in self-organized MANETs. Pervasive and Mobile Computing, 39, 117\u2013134.","journal-title":"Pervasive and Mobile Computing"},{"key":"2358_CR12","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.compeleceng.2016.12.002","volume":"59","author":"G Usha","year":"2017","unstructured":"Usha, G., RajeshBabu, M., & SaravanaKumar, S. (2017). Dynamic anomaly detection using cross layer security in MANET. Computers & Electrical Engineering, 59, 231\u2013241.","journal-title":"Computers & Electrical Engineering"},{"key":"2358_CR13","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.comnet.2015.12.007","volume":"96","author":"M AlMojamed","year":"2016","unstructured":"AlMojamed, M., & Kolberg, M. (2016). Structured peer-to-peer overlay deployment on MANET: a survey. Computer Networks, 96, 29\u201347.","journal-title":"Computer Networks"},{"key":"2358_CR14","first-page":"90","volume":"18","author":"YM Khamayseh","year":"2018","unstructured":"Khamayseh, Y. M., Aljawarneh, S. A., & Asaad, A. E. (2018). Ensuring survivability against Black Hole Attacks in MANETS for preserving energy efficiency. Sustainable Computing: Informatics and Systems, 18, 90\u2013100.","journal-title":"Sustainable Computing: Informatics and Systems"},{"key":"2358_CR15","doi-asserted-by":"publisher","first-page":"1872","DOI":"10.1016\/j.sbspro.2015.06.424","volume":"195","author":"AH Azni","year":"2015","unstructured":"Azni, A. H., Ahmad, R., Noh, Z. A. M., Hazwani, F., & Hayaati, N. (2015). Systematic review for network survivability analysis in MANETS. Procedia - Social and Behavioral Sciences, 195, 1872\u20131881.","journal-title":"Procedia - Social and Behavioral Sciences"},{"key":"2358_CR16","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.adhoc.2016.11.001","volume":"55","author":"T Qiu","year":"2017","unstructured":"Qiu, T., Chen, N., Li, K., Qiao, D., & Fu, Z. (2017). Heterogeneous ad hoc networks: Architectures, advances and challenges. Ad Hoc Networks, 55, 143\u2013152.","journal-title":"Ad Hoc Networks"},{"key":"2358_CR17","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.comnet.2017.05.012","volume":"123","author":"Y Xu","year":"2017","unstructured":"Xu, Y., Liu, J., Shen, Y., Jiang, X., & Shiratori, N. (2017). Physical layer security-aware routing and performance tradeoffs in ad hoc networks. Computer Networks, 123, 77\u201387.","journal-title":"Computer Networks"},{"key":"2358_CR18","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.adhoc.2017.08.007","volume":"66","author":"A Banerjee","year":"2017","unstructured":"Banerjee, A., King, C.-T., & Hsiao, H.-C. (2017). On state maintenance in cluster-based mobile ad-hoc networks. Ad Hoc Networks, 66, 95\u2013109.","journal-title":"Ad Hoc Networks"},{"key":"2358_CR19","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/j.pmcj.2017.06.017","volume":"40","author":"K Halunen","year":"2017","unstructured":"Halunen, K., H\u00e4iki\u00f6, J., & Vallivaara, V. (2017). Evaluation of user authentication methods in the gadget-free world. Pervasive and Mobile Computing, 40, 220\u2013241.","journal-title":"Pervasive and Mobile Computing"},{"key":"2358_CR20","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.jnca.2017.05.007","volume":"91","author":"V Kumar","year":"2017","unstructured":"Kumar, V., Park, J. M., & Bian, K. (2017). Transmitter authentication using hierarchical modulation in dynamic spectrum sharing. Journal of Network and Computer Applications, 91, 52\u201360.","journal-title":"Journal of Network and Computer Applications"},{"key":"2358_CR21","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.pmcj.2015.12.003","volume":"38","author":"C-C Chang","year":"2017","unstructured":"Chang, C.-C., Wu, H.-L., & Sun, C.-Y. (2017). Notes on \u201cSecure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing, 38, 275\u2013278.","journal-title":"Pervasive and Mobile Computing"},{"key":"2358_CR22","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.trac.2017.07.008","volume":"94","author":"G P\u00e9rez-Caballero","year":"2017","unstructured":"P\u00e9rez-Caballero, G., Andrade, J. M., Olmos, P., Molina, Y., & Miguel-Cruz, F. (2017). Authentication of tequilas using pattern recognition and supervised classification. TrAC Trends in Analytical Chemistry, 94, 117\u2013129.","journal-title":"TrAC Trends in Analytical Chemistry"},{"key":"2358_CR23","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1016\/j.pisc.2016.06.009","volume":"8","author":"V Shankar","year":"2016","unstructured":"Shankar, V., Singh, K., & Kumar, A. (2016). IPCT: A scheme for mobile authentication. Perspectives in Science, 8, 522\u2013524.","journal-title":"Perspectives in Science"},{"key":"2358_CR24","doi-asserted-by":"crossref","unstructured":"Ugrovatov, A., Bakhtin, A., Volkov, A., Galenko, V., & Muratchaev, S. (2016). Using scenarios for performance analysis of MANET protocols in space operations. In 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (pp. 374\u2013376), Kumaracoil.","DOI":"10.1109\/ICCICCT.2016.7987976"},{"key":"2358_CR25","doi-asserted-by":"crossref","unstructured":"Alam Siddiquee, K. N. E., Khan, F. F., Andersson, K., & Hossain, M. S. (2017). Optimal dynamic routing protocols for agro-sensor communication in MANETs. In 2017 14th IEEE annual consumer communications & networking conference (CCNC) (pp. 1\u20135), Las Vegas, NV.","DOI":"10.1109\/CCNC.2017.8013436"},{"key":"2358_CR26","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.jnca.2016.10.001","volume":"76","author":"Q Jiang","year":"2016","unstructured":"Jiang, Q., Ma, J., Wei, F., Tian, Y., Shen, J., & Yang, Y. (2016). An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. Journal of Network and Computer Applications, 76, 37\u201348.","journal-title":"Journal of Network and Computer Applications"},{"key":"2358_CR27","doi-asserted-by":"publisher","first-page":"3527","DOI":"10.1002\/sec.1558","volume":"9","author":"F Wu","year":"2016","unstructured":"Wu, F., Xu, L., Kumari, S., Li, X., Das, A. K., Khan, M. K., et al. (2016). A novel and provablysecure authentication and key agreement scheme with user anonymity for global mobility networks. Security and Communication Networks, 9, 3527\u20133542.","journal-title":"Security and Communication Networks"},{"key":"2358_CR28","doi-asserted-by":"publisher","first-page":"10081","DOI":"10.3390\/s140610081","volume":"14","author":"Y Choi","year":"2014","unstructured":"Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., & Won, D. (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 14, 10081\u201310106.","journal-title":"Sensors"},{"key":"2358_CR29","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.ins.2015.02.010","volume":"321","author":"D He","year":"2015","unstructured":"He, D., Kumar, N., & Chilamkurti, N. (2015). A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 321, 263\u2013277.","journal-title":"Information Sciences"},{"key":"2358_CR30","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.procs.2016.06.022","volume":"89","author":"A Shankar","year":"2016","unstructured":"Shankar, A., & Jaisankar, N. (2016). A novel energy efficient clustering mechanism in wireless sensor network. Procedia Computer Science, 89, 134\u2013141.","journal-title":"Procedia Computer Science"},{"issue":"6","key":"2358_CR31","first-page":"37","volume":"3","author":"I Sherifi","year":"2018","unstructured":"Sherifi, I., & Senja, E. (2018). Internet usage on mobile devices and their impact on evolution of informative websites in Albania. European Journal of Business, 3(6), 37\u201343.","journal-title":"European Journal of Business"},{"key":"2358_CR32","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3701","author":"R Madhusudhan","year":"2018","unstructured":"Madhusudhan, R., Hegde, M., & Memon, I. (2018). A secure and enhanced elliptic curve cryptography-based dynamic authentication scheme using smart card. International Journal of Communication Systems. https:\/\/doi.org\/10.1002\/dac.3701.","journal-title":"International Journal of Communication Systems"},{"key":"2358_CR33","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1186\/s13638-019-1458-5","volume":"1","author":"R Akhtar","year":"2019","unstructured":"Akhtar, R., Shengua, Y., Zhiyu, Z., Khan, Z. A., Memon, I., Ur Rehman, S., et al. (2019). Content distribution and protocol design issue for mobile social networks: a survey. EURASIP Journal on Wireless Communications and Networking, 1, 128.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"1","key":"2358_CR34","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1007\/s11277-014-1879-8","volume":"79","author":"I Memon","year":"2014","unstructured":"Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79(1), 661\u2013686.","journal-title":"Wireless Personal Communications"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02358-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-020-02358-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02358-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T23:54:13Z","timestamp":1621986853000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-020-02358-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,26]]},"references-count":34,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["2358"],"URL":"https:\/\/doi.org\/10.1007\/s11276-020-02358-4","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,26]]},"assertion":[{"value":"26 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}