{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T22:49:50Z","timestamp":1684882190107},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,5,25]],"date-time":"2016-05-25T00:00:00Z","timestamp":1464134400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s11277-016-3366-x","type":"journal-article","created":{"date-parts":[[2016,5,25]],"date-time":"2016-05-25T10:58:30Z","timestamp":1464173910000},"page":"2149-2162","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["An Efficient Secure Group Communication in MANET Using Fuzzy Trust Based Clustering and Hierarchical Distributed Group Key Management"],"prefix":"10.1007","volume":"94","author":[{"given":"K.","family":"Gomathi","sequence":"first","affiliation":[]},{"given":"B.","family":"Parvathavarthini","sequence":"additional","affiliation":[]},{"given":"C.","family":"Saravanakumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,25]]},"reference":[{"issue":"3","key":"3366_CR1","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S Rafaeli","year":"2003","unstructured":"Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys, 35(3), 309\u2013329.","journal-title":"ACM Computing Surveys"},{"key":"3366_CR2","doi-asserted-by":"crossref","first-page":"8","DOI":"10.4236\/cn.2013.52B002","volume":"5","author":"A Bentaleb","year":"2013","unstructured":"Bentaleb, A., Boubetra, A., & Harous, S. (2013). Survey of clustering schemes in mobile ad hoc networks. Communications and Network, Scientific Research, 5, 8\u201314.","journal-title":"Communications and Network, Scientific Research"},{"key":"3366_CR3","doi-asserted-by":"publisher","unstructured":"Chen, G., Nocetti, F., Gonzalez J., & Stojmenovic, I. (2002). Connectivity based k-hop clustering in wireless networks. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp. 2450\u20132459. doi: 10.1109\/HICSS.2002.994183 .","DOI":"10.1109\/HICSS.2002.994183"},{"key":"3366_CR4","first-page":"2359","volume":"4","author":"I Er","year":"2004","unstructured":"Er, I., & Seah, W. (2004). Mobility-based d-hop clustering algorithm for mobile ad hoc networks. IEEE Wireless Communications and Networking Conference, 4, 2359\u20132364.","journal-title":"IEEE Wireless Communications and Networking Conference"},{"key":"3366_CR5","unstructured":"Choi W., & Woo, M. (2006). A distributed Weighted Clustering Algorithm for Mobile Ad hoc Network. In Proceedings of International Conference on Telecommunications (AICT-ICIW), p 73."},{"key":"3366_CR6","doi-asserted-by":"crossref","first-page":"54","DOI":"10.4236\/wsn.2011.32006","volume":"3","author":"N Chauhan","year":"2011","unstructured":"Chauhan, N., Awasthi, L. K., Chand, N., Katiyar, V., & Chugh, A. (2011). A distributed weighted cluster based routing protocol for MANETs. Wireless Sensor Network, 3, 54\u201360.","journal-title":"Wireless Sensor Network"},{"key":"3366_CR7","doi-asserted-by":"crossref","unstructured":"Amis A. D., Prakash, R., Vuong, T. H. P, Huynh, D. T. (2000). Max\u2013Min D-cluster formation in wireless ad hoc networks. In Proceedings of IEEE Conference on Computer Communications (INFOCOM), Vol. 1, pp. 32\u201341.","DOI":"10.1109\/INFCOM.2000.832171"},{"issue":"12","key":"3366_CR8","doi-asserted-by":"crossref","first-page":"285","DOI":"10.5121\/ijdps.2012.3124","volume":"3","author":"V Manoj","year":"2012","unstructured":"Manoj, V., et al. (2012). A novel security framework using trust and fuzzy logic in MANET. International Journal of Distributed and Parallel Systems, 3(12), 285\u2013299.","journal-title":"International Journal of Distributed and Parallel Systems"},{"issue":"3","key":"3366_CR9","doi-asserted-by":"crossref","first-page":"30","DOI":"10.5120\/21684-4786","volume":"122","author":"JR Gandhi","year":"2015","unstructured":"Gandhi, J. R., & Jhaveri, R. H. (2015). Packet forwarding misbehaviour isolation using fuzzy trust based secure routing in MANET. International Journal of Computer Applications, 122(3), 30\u201335.","journal-title":"International Journal of Computer Applications"},{"issue":"8","key":"3366_CR10","first-page":"1855","volume":"9","author":"K Geetha","year":"2015","unstructured":"Geetha, K., & Thangaraj, P. (2015). An enhanced associativity based routing with fuzzy based trust to mitigate network attacks. International Journal of Computer, Electrical Automation, Control and Information Engineering, 9(8), 1855\u20131863.","journal-title":"International Journal of Computer, Electrical Automation, Control and Information Engineering"},{"key":"3366_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2014\/480202","volume":"2014","author":"X Anita","year":"2014","unstructured":"Anita, X., Bhagyaveni, M. A., & Manickam, J. M. L. (2014). Fuzzy-based trust prediction model for routing in WSNs. The Scientific World Journal, 2014, 1\u201311.","journal-title":"The Scientific World Journal"},{"issue":"12","key":"3366_CR12","doi-asserted-by":"crossref","first-page":"28","DOI":"10.5120\/14629-2985","volume":"84","author":"TT Mapoka","year":"2013","unstructured":"Mapoka, T. T. (2013). Group key management protocols for secure mobile multicast communication: A comprehensive survey. International Journal of Computer Applications, 84(12), 28\u201338.","journal-title":"International Journal of Computer Applications"},{"key":"3366_CR13","unstructured":"Rafaeli, S., & Hutchison. D. (2002) Hydra-decentralized group key management. IEEE sponsored Conference, In Proceedings of WCT ICE, pp. 62\u201369."},{"key":"3366_CR14","doi-asserted-by":"crossref","first-page":"48","DOI":"10.5815\/ijcnis.2013.04.07","volume":"4","author":"V Raghavendran","year":"2013","unstructured":"Raghavendran, V., Naga Satish, G., & Suresh Varma, P. (2013). A study on contributory group key agreements for mobile ad hoc networks. International Journal of Computer Network and Information Security, 4, 48\u201356.","journal-title":"International Journal of Computer Network and Information Security"},{"issue":"6","key":"3366_CR15","first-page":"401","volume":"16","author":"WT Li","year":"2014","unstructured":"Li, W. T., Ling, C.-H., & Hwang, M.-S. (2014). Group rekeying in wireless sensor networks: A survey. International Journal of Network Security, 16(6), 401\u2013410.","journal-title":"International Journal of Network Security"},{"issue":"8","key":"3366_CR16","first-page":"85","volume":"5","author":"M El-Bashary","year":"2015","unstructured":"El-Bashary, M., Abdelhafez, A., & Anis, W. (2015). A comparative study of group key management in MANET. International Journal of Engineering research and Applications, 5(8), 85\u201394.","journal-title":"International Journal of Engineering research and Applications"},{"key":"3366_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-1499-2014-161","volume":"1","author":"X Wang","year":"2014","unstructured":"Wang, X., Yang, J., Li, Z., & Li, H. (2014). The energy-efficient group key management protocol for strategic mobile scenario of MANETs. EURASIP Journal on Wireless Communications and Networking, 1, 1\u201322. doi: 10.1186\/1687-1499-2014-161 .","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"3366_CR18","doi-asserted-by":"crossref","first-page":"1094","DOI":"10.1016\/j.comcom.2010.02.007","volume":"33","author":"K Drira","year":"2010","unstructured":"Drira, K., Seba, H., & Kheddouci, H. (2010). ECGK: An efficient clustering scheme for group key management in MANETs. Computer Communications, 33, 1094\u20131107.","journal-title":"Computer Communications"},{"issue":"4","key":"3366_CR19","doi-asserted-by":"crossref","first-page":"342","DOI":"10.17485\/ijst\/2015\/v8i4\/60435","volume":"8","author":"K Gomathi","year":"2015","unstructured":"Gomathi, K., & Parvathavarthini, B. (2015). An enhanced distributed weighted clustering routing protocol for key management. Indian Journal of Science and Technology, 8(4), 342\u2013348.","journal-title":"Indian Journal of Science and Technology"},{"issue":"12","key":"3366_CR20","doi-asserted-by":"publisher","first-page":"7566","DOI":"10.15680\/ijircce.2014.0212072","volume":"2","author":"K Gomathi","year":"2014","unstructured":"Gomathi, K., & Parvathavarthini, B. (2014). An enhanced distributed weighted clustering algorithm for intra and inter cluster routing in MANET. International Journal of Innovative Research in Compute and Communication Engineering, 2(12), 7566\u20137572. doi: 10.15680\/ijircce.2014.0212072 .","journal-title":"International Journal of Innovative Research in Compute and Communication Engineering"},{"key":"3366_CR21","doi-asserted-by":"crossref","unstructured":"K. Gomathi, B. Parvathavarthini (2015) A secure clustering in MANET through direct trust evaluation technique. ICCC15, IEEE Explore, PNU, Riyadh Saudi Arabia, pp. 1\u20136.","DOI":"10.1109\/CLOUDCOMP.2015.7149624"},{"issue":"4","key":"3366_CR22","first-page":"208","volume":"5","author":"EL-SAYED Ayman","year":"2014","unstructured":"Ayman, E. L.-S. A. Y. E. D. (2014). A new hierarchical group key management based on clustering scheme for mobile ad hoc networks. IJACSA, 5(4), 208\u2013219.","journal-title":"IJACSA"},{"key":"3366_CR23","unstructured":"Network Simulator NS2 available online: http:\/\/www.isi.edu\/nsnam\/ns ."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-016-3366-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3366-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3366-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3366-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T20:54:16Z","timestamp":1567976056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-016-3366-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,25]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["3366"],"URL":"https:\/\/doi.org\/10.1007\/s11277-016-3366-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,25]]}}}