{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:47:56Z","timestamp":1762004876365,"version":"3.37.3"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,4,26]],"date-time":"2017-04-26T00:00:00Z","timestamp":1493164800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s11277-017-4266-4","type":"journal-article","created":{"date-parts":[[2017,4,26]],"date-time":"2017-04-26T04:39:30Z","timestamp":1493181570000},"page":"1753-1769","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["An Intelligent Secured and Energy Efficient Routing Algorithm for MANETs"],"prefix":"10.1007","volume":"96","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3960-6926","authenticated-orcid":false,"given":"S.","family":"Muthurajkumar","sequence":"first","affiliation":[]},{"given":"S.","family":"Ganapathy","sequence":"additional","affiliation":[]},{"given":"M.","family":"Vijayalakshmi","sequence":"additional","affiliation":[]},{"given":"A.","family":"Kannan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,26]]},"reference":[{"issue":"6","key":"4266_CR1","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1109\/TDSC.2010.47","volume":"8","author":"Z Yan","year":"2011","unstructured":"Yan, Z., & Prehofer, C. (2011). Autonomic trust management for a component-based software system. IEEE Transactions on Dependable and Secure Computing, 8(6), 810\u2013823.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"7","key":"4266_CR2","doi-asserted-by":"crossref","first-page":"1035","DOI":"10.1109\/TMC.2010.44","volume":"9","author":"F Li","year":"2010","unstructured":"Li, F., & Wu, J. (2010). Uncertainty modeling and reduction in MANETs. IEEE Transactions on Mobile Computing, 9(7), 1035\u20131048.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"1","key":"4266_CR3","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s11277-016-3836-1","volume":"92","author":"A Koren","year":"2017","unstructured":"Koren, A., Simunic, D., & Prasad, R. (2017). Energy-efficient and improved eWALL: e2WALL. Wireless Personal Communications, 92(1), 21\u201331.","journal-title":"Wireless Personal Communications"},{"issue":"271","key":"4266_CR4","first-page":"1","volume":"2013","author":"S Ganapathy","year":"2013","unstructured":"Ganapathy, S., Kulothungan, K., Muthurajkumar, S., Vijayalakshmi, M., Yogesh, P., & Kannan, A. (2013). Intelligent feature selection and classification techniques for intrusion detection in networks: A survey. EURASIP-Journal of Wireless Communications and Networking, 2013(271), 1\u201316.","journal-title":"EURASIP-Journal of Wireless Communications and Networking"},{"issue":"4","key":"4266_CR5","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1007\/s11277-010-9967-x","volume":"60","author":"VP Singh","year":"2011","unstructured":"Singh, V. P., & Kumar, K. (2011). Literature survey on power control algorithms for mobile ad-hoc network. Wireless Personal Communications, 60(4), 679\u2013685.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"4266_CR6","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1007\/s11277-011-0244-4","volume":"59","author":"M Sanctis De","year":"2011","unstructured":"De Sanctis, M., Cianca, E., & Joshi, V. (2011). Energy efficient wireless networks towards green communications. Wireless Personal Communications, 59(3), 537\u2013552.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"4266_CR7","doi-asserted-by":"crossref","first-page":"1087","DOI":"10.1007\/s11277-013-1068-1","volume":"69","author":"VM Rohokale","year":"2013","unstructured":"Rohokale, V. M., Inamdar, S., Prasad, N. R., & Prasad, R. (2013). Energy efficient four level cooperative opportunistic communication for wireless personal area networks (WPAN). Wireless Personal Communications, 69(3), 1087\u20131096.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"4266_CR8","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1007\/s11277-016-3602-4","volume":"92","author":"SK Biswash","year":"2017","unstructured":"Biswash, S. K., Nagaraj, S., Sarkar, M., & Narra, N. R. (2017). Bee system based base station cooperation technique for mobile cellular networks. Wireless Personal Communications, 92(3), 1193\u20131220.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"4266_CR9","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/s11277-005-8745-7","volume":"35","author":"T Madsen","year":"2005","unstructured":"Madsen, T., Fitzek, F. H., Prasad, R., & Schulte, G. (2005). Connectivity probability of wireless ad hoc networks: definition, evaluation, comparison. Wireless Personal Communications, 35(1), 135\u2013151.","journal-title":"Wireless Personal Communications"},{"issue":"6","key":"4266_CR10","doi-asserted-by":"crossref","first-page":"1874","DOI":"10.1109\/TWC.2010.06.081216","volume":"9","author":"H Dang","year":"2010","unstructured":"Dang, H., & Wu, H. (2010). Clustering and cluster-based routing protocol for delay-tolerant mobile networks. IEEE Transactions on Wireless Communications, 9(6), 1874\u20131881.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"4266_CR11","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1109\/TCOMM.2012.031912.110179","volume":"9","author":"F Bao","year":"2012","unstructured":"Bao, F., Chen, I. R., Chang, M., & Cho, J.-H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions Network and Service Management, 9(2), 169\u2013183.","journal-title":"IEEE Transactions Network and Service Management"},{"issue":"4","key":"4266_CR12","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/TSC.2010.39","volume":"4","author":"Y Wang","year":"2011","unstructured":"Wang, Y., & Li, L. (2011). Two-dimensional trust rating aggregations in service-oriented applications. IEEE Transactions on Services Computing, 4(4), 257\u2013271.","journal-title":"IEEE Transactions on Services Computing"},{"issue":"1","key":"4266_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1142\/S1469026806001770","volume":"6","author":"V Nikulin","year":"2006","unstructured":"Nikulin, V. (2006). Weighted threshold-based clustering for intrusion detection systems. International Journal of Computational Intelligence and Applications, 6(1), 1\u201319.","journal-title":"International Journal of Computational Intelligence and Applications"},{"key":"4266_CR14","doi-asserted-by":"crossref","unstructured":"Luo, M., Li, X., & Xie, S., (2008). An intrusion detection research based on spectral clustering. In Proceedings of 4th international conference on wireless communications, networking and mobile computing WiCOM\u2019 08 2008 (pp. 1\u20134).","DOI":"10.1109\/WiCom.2008.1100"},{"key":"4266_CR15","doi-asserted-by":"crossref","unstructured":"Jianliang, M., Haikun, S., & Ling, B. (2009). The application on intrusion detection based on K-means cluster algorithm. In Proceedings of international forum on information technology and applications, IFITA\u201909 2009 (vol 1, pp. 150\u2013152).","DOI":"10.1109\/IFITA.2009.34"},{"key":"4266_CR16","doi-asserted-by":"crossref","unstructured":"Jemili, I., Chaabouni, N., Belghith, A., & Mosbah, M. (2012). A multipath layered cluster based routing for ad hoc networks. In 2012 5th international conference on new technologies, mobility and security (NTMS) 2012 (pp. 1\u20135).","DOI":"10.1109\/NTMS.2012.6208730"},{"key":"4266_CR17","doi-asserted-by":"crossref","unstructured":"Chen, A., Xu, G., & Yang, Y. (2008). A cluster-based trust model for mobile ad hoc networks. In 4th International conference on wireless communications, networking and mobile computing 2008 (pp. 1\u20134).","DOI":"10.1109\/WiCom.2008.1095"},{"issue":"4","key":"4266_CR18","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1049\/iet-ifs.2009.0140","volume":"4","author":"X Li","year":"2010","unstructured":"Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212\u2013232.","journal-title":"IET Information Security"},{"issue":"2","key":"4266_CR19","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1109\/TDSC.2011.57","volume":"9","author":"A Das","year":"2012","unstructured":"Das, A., & Islam, M. M. (2012). Secured trust: A dynamic trust computation model for secured communication in multiagent systems. IEEE Transactions on Dependable and Secure Computing, 9(2), 261\u2013274.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"1","key":"4266_CR20","doi-asserted-by":"crossref","first-page":"1332","DOI":"10.1109\/TLA.2012.6142481","volume":"10","author":"LFS Serique","year":"2012","unstructured":"Serique, L. F. S., & De Sousa, R. T. (2012). Evaluating trust in Ad Hoc network routing by induction of decision trees. IEEE Latin America Transactions, 10(1), 1332\u20131343.","journal-title":"IEEE Latin America Transactions"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4266-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4266-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4266-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,29]],"date-time":"2017-08-29T05:44:04Z","timestamp":1503985444000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4266-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,26]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["4266"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4266-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2017,4,26]]}}}