{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T15:41:32Z","timestamp":1765294892281,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T00:00:00Z","timestamp":1502409600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s11277-017-4770-6","type":"journal-article","created":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T07:28:26Z","timestamp":1502436506000},"page":"5099-5114","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["Mitigation and Performance Analysis of Routing Protocols Under Black-Hole Attack in Vehicular Ad-hoc Network (VANET)"],"prefix":"10.1007","volume":"97","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3188-529X","authenticated-orcid":false,"given":"Kamlesh Chandra","family":"Purohit","sequence":"first","affiliation":[]},{"given":"Sushil Chandra","family":"Dimri","sequence":"additional","affiliation":[]},{"given":"Sanjay","family":"Jasola","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,11]]},"reference":[{"key":"4770_CR1","unstructured":"Purohit, K. C, Dimri, S.C, & Jasola, S. (2016). Performance evaluation of various MANET routing protocols for adaptability in VANET environment. Accepted in IJSA http:\/\/link.springer.com\/article\/10.1007\/s13198-016-0507-2 ."},{"issue":"1","key":"4770_CR2","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.vehcom.2014.01.001","volume":"1","author":"A Dua","year":"2014","unstructured":"Dua, A., Kumar, N., & Bawa, S. (2014). A systematicre view on routing protocols for vehicular ad hoc networks. Vehicular Communications, 1(1), 33\u201352.","journal-title":"Vehicular Communications"},{"issue":"4","key":"4770_CR3","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/s11235-010-9400-5","volume":"50","author":"S Zeadally","year":"2012","unstructured":"Zeadally, S., et al. (2012). Vehicular ad hoc networks (VANETS): Status, results, and challenges. Telecommunication Systems, 50(4), 217\u2013241.","journal-title":"Telecommunication Systems"},{"issue":"4","key":"4770_CR4","first-page":"210","volume":"3","author":"P Sirola","year":"2014","unstructured":"Sirola, P., Joshi, A., & Purohit, K. C. (2014). An analytical study of routing attacks in vehicular ad-hoc networks (VANETs). International Journal of Computer Science Engineering (IJCSE), 3(4), 210\u2013218.","journal-title":"International Journal of Computer Science Engineering (IJCSE)"},{"key":"4770_CR5","doi-asserted-by":"crossref","unstructured":"Perkins, C. E., & Royer, E. M. (1999). Ad-hoc on-demand distance vector routing. In Second IEEE Workshop on WMCSA \u201899 Mobile Computing Systems and Applications Proceedings.","DOI":"10.1109\/MCSA.1999.749281"},{"key":"4770_CR6","doi-asserted-by":"crossref","unstructured":"Gandhewar, N., & Patel, R. (2012). Detection and prevention of sinkhole attack on AODV protocol in mobile adhoc network. In IEEE: Fourth International Conference on Computational Intelligence and Communication Networks (CICN).","DOI":"10.1109\/CICN.2012.96"},{"issue":"5","key":"4770_CR7","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1109\/MWC.2007.4396947","volume":"14","author":"B Kannhavong","year":"2007","unstructured":"Kannhavong, B., et al. (2007). A survey of routing attacks in mobile ad hoc networks. Wireless communications IEEE, 14(5), 85\u201391.","journal-title":"Wireless communications IEEE"},{"key":"4770_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/ijans.2014.4201","volume":"4","author":"H LA Vinh","year":"2014","unstructured":"LA Vinh, H., & Cavalli, A. (2014). Security attacks and solutions in vehicular adhoc network: A survey. International Journal on AdHoc Networking Systems (IJANS), 4, 1\u201320.","journal-title":"International Journal on AdHoc Networking Systems (IJANS)"},{"key":"4770_CR9","doi-asserted-by":"crossref","unstructured":"RoselinMary, S., Maheshwari, M., & Thamaraiselvan, M. (2013). Early detection of dos attacks in VANET using attacked packet detection algorithm (apda). In International Conference on Information Communication and Embedded Systems (ICICES), pp. 237\u2013240.","DOI":"10.1109\/ICICES.2013.6508250"},{"key":"4770_CR10","unstructured":"Raj, P. N., & Swadas, P. B. (2009). Dpraodv: A dyanamic learning system against blackhole attack in aodv based manet. arXiv preprint arXiv:0909.2371 ."},{"key":"4770_CR11","doi-asserted-by":"crossref","unstructured":"Misra, S., Bhattarai, K., & Xue, G. (2011). BAMBi: Blackhole attacks mitigation with multiple base stations in wireless sensor networks. In IEEE International Conference on Communications (ICC), pp. 1\u20135.","DOI":"10.1109\/icc.2011.5962856"},{"key":"4770_CR12","first-page":"1","volume":"28","author":"E Fonseca","year":"2006","unstructured":"Fonseca, E., & Festag, A. (2006). A survey of existing approaches for secure ad hoc routing and their applicability to VANETS. NEC Network Laboratories, 28, 1\u201328.","journal-title":"NEC Network Laboratories"},{"key":"4770_CR13","doi-asserted-by":"crossref","unstructured":"He, L., & Zhu, W. T. (2012). Mitigating DoS attacks against signature-based authentication in VANETs. In IEEE International Conference on Computer Science and Automation Engineering (CSAE) (Vol. 3, pp. 261\u2013265).","DOI":"10.1109\/CSAE.2012.6272951"},{"key":"4770_CR14","unstructured":"Sun, B., et al. (2003). Detecting black-hole attack in mobile ad hoc networks. In Personal Mobile Communications Conference, 5th European (Conf. Publ. No. 492). IET, pp. 490\u2013495."},{"key":"4770_CR15","volume-title":"Simulation of black hole attack in wireless ad-hoc networks","author":"S Dokurer","year":"2006","unstructured":"Dokurer, S. (2006). Simulation of black hole attack in wireless ad-hoc networks. Ankara: At\u0131l\u0131m University."},{"key":"4770_CR16","unstructured":"Mistry, N., Jinwala, D. C., & Zaveri, M. (2010). Improving AODV protocol against blackhole attacks. In Proceedings of the International Multi Conference of Engineers and Computer Scientists, Vol. 2."},{"key":"4770_CR17","doi-asserted-by":"crossref","unstructured":"Ahmad, Z., Jalil, K. A., & Ab Manan, J. L. (2011). Black hole effect mitigation method in AODV routing protocol. In IEEE 7th International Conference on Information Assurance and Security (IAS).","DOI":"10.1109\/ISIAS.2011.6122811"},{"issue":"10","key":"4770_CR18","first-page":"446","volume":"3","author":"A Chaturvedi","year":"2014","unstructured":"Chaturvedi, A., & Sharma, S. (2014). A new technique for preventing black hole attack in mobile ad-hoc networks. International Journal of Advances in Computer Science and Technology, 3(10), 446\u2013451.","journal-title":"International Journal of Advances in Computer Science and Technology"},{"issue":"4","key":"4770_CR19","first-page":"90","volume":"3","author":"SA Senbel","year":"2015","unstructured":"Senbel, S. A., Ibrahim, A., & Zaki, N. E. (2015). Solution to black hole attack in ad hoc on demand distance vector routing protocol. Journal of Computer Sciences and Applications, 3(4), 90\u201393.","journal-title":"Journal of Computer Sciences and Applications"},{"issue":"7","key":"4770_CR20","first-page":"894","volume":"4","author":"JT Isaac","year":"2010","unstructured":"Isaac, J. T., Zeadally, S., & Camara, J. S. (2010). Security attacks and solutions for vehicular ad hoc networks. IET\u00a0Communication, 4(7), 894\u2013903.","journal-title":"IET\u00a0Communication"},{"key":"4770_CR21","doi-asserted-by":"crossref","unstructured":"Gillani, S., et al. (2013) A survey on security in vehicular ad hoc networks. In Communication Technologies for Vehicles (pp. 59\u201374). Berlin: Springer.","DOI":"10.1007\/978-3-642-37974-1_5"},{"issue":"6","key":"4770_CR22","first-page":"277","volume":"11","author":"H Simaremare","year":"2011","unstructured":"Simaremare, H., & Sari, R. F. (2011). Performance evaluation of AODV variants on DDoS, Blackhole and malicious attacks. IJCSNS, 11(6), 277\u2013287.","journal-title":"IJCSNS"},{"key":"4770_CR23","doi-asserted-by":"crossref","unstructured":"Shrivastava, L., Bhadauria, S. S., & Tomar, G. S. (2011). Performance evaluation of routing protocols in MANET with different traffic loads. In IEEE: International Conference on Communication Systems and Network Technologies (CSNT).","DOI":"10.1109\/CSNT.2011.10"},{"key":"4770_CR24","unstructured":"Shah, S., et al. (2008). Performance evaluation of ad hoc routing protocols using NS2 simulation.In Mobile and Pervasive Computing (CoMPC), pp. 167\u2013171."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4770-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4770-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4770-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T04:14:26Z","timestamp":1569989666000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4770-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,11]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["4770"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4770-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2017,8,11]]}}}