{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T08:44:12Z","timestamp":1762073052952,"version":"build-2065373602"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11276-022-03174-8","type":"journal-article","created":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T19:03:21Z","timestamp":1666811001000},"page":"4875-4902","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["FAPDRP: a flooding attacks prevention and detection routing protocol in vehicular ad hoc network using behavior history and nonlinear median filter transformation"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5314-1291","authenticated-orcid":false,"given":"Ngoc T.","family":"Luong","sequence":"first","affiliation":[]},{"given":"Anh Q.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Doan","family":"Hoang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"issue":"3","key":"3174_CR1","first-page":"29","volume":"3","author":"SU Rehman","year":"2013","unstructured":"Rehman, S. U., Khan, M. A., Zia, T. A., & Zheng, L. (2013). Vehicular ad-hoc networks (VANETs)-an overview and challenges. Journal of Wireless Networking and Communications, 3(3), 29\u201338.","journal-title":"Journal of Wireless Networking and Communications"},{"issue":"3","key":"3174_CR2","first-page":"60","volume":"3","author":"J Hoebeke","year":"2004","unstructured":"Hoebeke, J., Moerman, I., Dhoedt, B., & Demeester, P. (2004). An overview of mobile ad hoc networks: Applications and challenges. Journal-Communications Network, 3(3), 60\u201366.","journal-title":"Journal-Communications Network"},{"doi-asserted-by":"crossref","unstructured":"Ahmad, S. A., & Shcherbakov, M. (2018). A survey on routing protocols in vehicular ad hoc networks. In 2018 9th International conference on information, intelligence, systems and applications (IISA) (pp. 1\u20138). IEEE.","key":"3174_CR3","DOI":"10.1109\/IISA.2018.8633700"},{"doi-asserted-by":"crossref","unstructured":"Bilgin, B. E., & Gungor, V. C. (2013). Performance comparison of IEEE 802.11 p and IEEE 802.11 b for vehicle-to-vehicle communications in highway, rural, and urban areas. International Journal of Vehicular Technology.","key":"3174_CR4","DOI":"10.1155\/2013\/971684"},{"issue":"2","key":"3174_CR5","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1016\/j.comnet.2011.10.011","volume":"56","author":"E Alotaibi","year":"2012","unstructured":"Alotaibi, E., & Mukherjee, B. (2012). A survey on routing algorithms for wireless ad-hoc and mesh networks. Computer Networks, 56(2), 940\u2013965.","journal-title":"Computer Networks"},{"key":"3174_CR6","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.adhoc.2017.03.006","volume":"61","author":"F Sakiz","year":"2017","unstructured":"Sakiz, F., & Sen, S. (2017). A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Networks, 61, 33\u201350.","journal-title":"Ad Hoc Networks"},{"issue":"1","key":"3174_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2192-1962-1-4","volume":"1","author":"FH Tseng","year":"2011","unstructured":"Tseng, F. H., Chou, L. D., & Chao, H. C. (2011). A survey of black hole attacks in wireless mobile ad hoc networks. Human-centric Computing and Information Sciences, 1(1), 1\u201316.","journal-title":"Human-centric Computing and Information Sciences"},{"key":"3174_CR8","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.jnca.2015.04.008","volume":"54","author":"L S\u00e1nchez-Casado","year":"2015","unstructured":"S\u00e1nchez-Casado, L., Macia-Fernandez, G., Garcia-Teodoro, P., & Aschenbruck, N. (2015). Identification of contamination zones for sinkhole detection in MANETs. Journal of Network and Computer Applications, 54, 62\u201377.","journal-title":"Journal of Network and Computer Applications"},{"doi-asserted-by":"crossref","unstructured":"Xiaopeng, G., & Wei, C. (2007). A novel gray hole attack detection scheme for mobile ad-hoc networks. In 2007 IFIP international conference on network and parallel computing workshops (NPC 2007) (pp. 209\u2013214). IEEE.","key":"3174_CR9","DOI":"10.1109\/ICNPCW.2007.4351486"},{"issue":"7","key":"3174_CR10","doi-asserted-by":"publisher","first-page":"4115","DOI":"10.1007\/s11276-018-1734-z","volume":"25","author":"TT Vo","year":"2019","unstructured":"Vo, T. T., Luong, N. T., & Hoang, D. (2019). MLAMAN: a novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc network. Wireless Networks, 25(7), 4115\u20134132.","journal-title":"Wireless Networks"},{"issue":"5","key":"3174_CR11","first-page":"832","volume":"19","author":"NT Luong","year":"2017","unstructured":"Luong, N. T., & Vo, T. T. (2017). Whirlwind: A new method to attack routing protocol in mobile ad hoc network. International Journal of Network Security, 19(5), 832\u2013838.","journal-title":"International Journal of Network Security"},{"doi-asserted-by":"crossref","unstructured":"Fiade, A., Triadi, A. Y., Sulhi, A., Masruroh, S. U., Handayani, V., & Suseno, H. B. (2020). Performance analysis of black hole attack and flooding attack AODV routing protocol on VANET (vehicular ad-hoc network). In 2020 8th International conference on cyber and IT service management (CITSM) (pp. 1\u20135). IEEE.","key":"3174_CR12","DOI":"10.1109\/CITSM50537.2020.9268789"},{"unstructured":"McCanne, S., Floyd, S., Fall, K., & Varadhan, K. (1995). The network simulator ns2 (1995) The VINT project. http:\/\/www.isi.edu\/nsnam\/ns.","key":"3174_CR13"},{"issue":"3","key":"3174_CR14","first-page":"104","volume":"16","author":"HD Le","year":"2021","unstructured":"Le, H. D., Luong, N. T., & Nguyen, T. V. (2021). AOMDV-OAM: A security routing protocol using OAM on mobile ad hoc network. Journal of Communications, 16(3), 104\u2013110.","journal-title":"Journal of Communications"},{"doi-asserted-by":"crossref","unstructured":"Yi, P., Fei Hou, Y., Zhong, Y., Zhang, S., & Dai, Z. (2006). Flooding attack and defence in ad hoc networks. Journal of Systems Engineering and Electronics, 17(2), 410\u2013416.","key":"3174_CR15","DOI":"10.1016\/S1004-4132(06)60070-4"},{"doi-asserted-by":"crossref","unstructured":"Song, J. H., Hong, F., & Zhang, Y. (2006). Effective filtering scheme against RREQ flooding attack in mobile ad hoc networks. In Proceedings of the seventh international conference on parallel and distributed computing, applications and technologies (pp. 497\u2013502).","key":"3174_CR16","DOI":"10.1109\/PDCAT.2006.59"},{"doi-asserted-by":"crossref","unstructured":"Li, S., Liu, Q., Chen, H., & Tan, M. (2006). A new method to resist flooding attacks in ad hoc networks. In 2006 International conference on wireless communications, networking and mobile computing (pp. 1\u20134). IEEE.","key":"3174_CR17","DOI":"10.1109\/WiCOM.2006.229"},{"key":"3174_CR18","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.adhoc.2014.05.002","volume":"21","author":"FC Jiang","year":"2014","unstructured":"Jiang, F. C., Lin, C. H., & Wu, H. W. (2014). Lifetime elongation of ad hoc networks under flooding attack using power-saving technique. Ad Hoc Networks, 21, 84\u201396.","journal-title":"Ad Hoc Networks"},{"issue":"6","key":"3174_CR19","doi-asserted-by":"publisher","first-page":"1863","DOI":"10.1007\/s11276-016-1259-2","volume":"23","author":"MJ Faghihniya","year":"2017","unstructured":"Faghihniya, M. J., Hosseini, S. M., & Tahmasebi, M. (2017). Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network. Wireless Networks, 23(6), 1863\u20131874.","journal-title":"Wireless Networks"},{"issue":"8","key":"3174_CR20","doi-asserted-by":"publisher","first-page":"2899","DOI":"10.1007\/s11276-017-1515-0","volume":"24","author":"S Gurung","year":"2018","unstructured":"Gurung, S., & Chauhan, S. (2018). A novel approach for mitigating route request flooding attack in MANET. Wireless Networks, 24(8), 2899\u20132914.","journal-title":"Wireless Networks"},{"doi-asserted-by":"crossref","unstructured":"Vimal, V., & Nigam, M. J. (2017). Plummeting flood based distributed-DoS attack to upsurge networks performance in ad-hoc networks using neighborhood table technique. In TENCON 2017\u20142017 IEEE region 10 conference (pp. 139\u2013144). IEEE.","key":"3174_CR21","DOI":"10.1109\/TENCON.2017.8227851"},{"issue":"7","key":"3174_CR22","first-page":"371","volume":"12","author":"TT Vo","year":"2017","unstructured":"Vo, T. T., & Luong, N. T. (2017). $$\\text{ SMA}_2$$AODV: Routing protocol reduces the harm of flooding attacks in mobile ad hoc network. Journal of Communications, 12(7), 371\u2013378.","journal-title":"Journal of Communications"},{"doi-asserted-by":"crossref","unstructured":"Abu Zant, M., & Yasin, A. (2019). Avoiding and isolating flooding attack by enhancing AODV MANET protocol (AIF_AODV). Security and Communication Networks.","key":"3174_CR23","DOI":"10.1155\/2019\/8249108"},{"doi-asserted-by":"crossref","unstructured":"Mohammadi, P., & Ghaffari, A. (2019). Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Personal Communications, 106(2).","key":"3174_CR24","DOI":"10.1007\/s11277-019-06166-8"},{"doi-asserted-by":"crossref","unstructured":"Patel, M., Sharma, S., & Sharan, D. (2013). Detection and prevention of flooding attack using SVM. In 2013 International conference on communication systems and network technologies (pp. 533\u2013537). IEEE.","key":"3174_CR25","DOI":"10.1109\/CSNT.2013.116"},{"doi-asserted-by":"crossref","unstructured":"Li, W., Yi, P., Wu, Y., Pan, L., & Li, J. (2014). A new intrusion detection system based on KNN classification algorithm in wireless sensor network. Journal of Electrical and Computer Engineering.","key":"3174_CR26","DOI":"10.1155\/2014\/240217"},{"doi-asserted-by":"crossref","unstructured":"Luong, N. T., Vo, T. T., & Hoang, D. (2019). FAPRP: A machine learning approach to flooding attacks prevention routing protocol in mobile ad hoc networks. Wireless Communications and Mobile Computing.","key":"3174_CR27","DOI":"10.1155\/2019\/6869307"},{"key":"3174_CR28","volume-title":"An introduction to statistical learning: With applications in R","author":"J Gareth","year":"2013","unstructured":"Gareth, J., Daniela, W., Trevor, H., & Robert, T. (2013). An introduction to statistical learning: With applications in R. Springer."},{"key":"3174_CR29","first-page":"821","volume":"25","author":"MA Aizerman","year":"1964","unstructured":"Aizerman, M. A. (1964). Theoretical foundations of the potential function method in pattern recognition learning. Automation and Remote Control, 25, 821\u2013837.","journal-title":"Automation and Remote Control"},{"key":"3174_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2010\/690218","volume":"2010","author":"V Jayaraj","year":"2010","unstructured":"Jayaraj, V., & Ebenezer, D. (2010). A new switching-based median filtering scheme and algorithm for removal of high-density salt and pepper noise in images. EURASIP Journal on Advances in Signal Processing, 2010, 1\u201311.","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"doi-asserted-by":"crossref","unstructured":"Rahim, M., & Maitheen, R. (2018). Error detection technique for a median filter using denoising algorithm. In International conference on ISMAC in computational vision and bio-engineering (pp. 1261\u20131270). Springer.","key":"3174_CR31","DOI":"10.1007\/978-3-030-00665-5_119"},{"issue":"1","key":"3174_CR32","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/s10851-016-0694-0","volume":"58","author":"SA Villar","year":"2017","unstructured":"Villar, S. A., Torcida, S., & Acosta, G. G. (2017). Median filtering: A new insight. Journal of Mathematical Imaging and Vision, 58(1), 130\u2013146.","journal-title":"Journal of Mathematical Imaging and Vision"},{"key":"3174_CR33","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1007\/978-3-642-04898-2_353","volume-title":"International encyclopedia of statistical science","author":"SN Gupta","year":"2011","unstructured":"Gupta, S. N. (2011). Mean, median, mode: An introduction. In M. Lovric (Ed.), International encyclopedia of statistical science (pp. 788\u2013791). Springer."},{"doi-asserted-by":"crossref","unstructured":"Pitas, I., & Venetsanopoulos, A. N. (1990). Median filters. In Nonlinear digital filters (pp. 63\u2013116). Springer.","key":"3174_CR34","DOI":"10.1007\/978-1-4757-6017-0_4"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-03174-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-022-03174-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-03174-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T16:19:39Z","timestamp":1722615579000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-022-03174-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":34,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["3174"],"URL":"https:\/\/doi.org\/10.1007\/s11276-022-03174-8","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2022,10,26]]},"assertion":[{"value":"17 October 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}