{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:48:26Z","timestamp":1762004906421,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,8,14]],"date-time":"2017-08-14T00:00:00Z","timestamp":1502668800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001427","name":"All India Council for Technical Education","doi-asserted-by":"publisher","award":["20\/AICTE\/RIFD\/RPS 67\/2012-13"],"award-info":[{"award-number":["20\/AICTE\/RIFD\/RPS 67\/2012-13"]}],"id":[{"id":"10.13039\/501100001427","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s11277-017-4830-y","type":"journal-article","created":{"date-parts":[[2017,8,14]],"date-time":"2017-08-14T08:19:56Z","timestamp":1502698796000},"page":"6131-6150","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Enhanced Security Using Cluster Based Certificate Management and ECC-CRT Key Agreement Schemes in Mobile Ad hoc Networks"],"prefix":"10.1007","volume":"97","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2076-4150","authenticated-orcid":false,"given":"V. S.","family":"Janani","sequence":"first","affiliation":[]},{"given":"M. S. K.","family":"Manikandan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,14]]},"reference":[{"key":"4830_CR1","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-662-48683-2_12","volume":"557","author":"Y Fan","year":"2015","unstructured":"Fan, Y., Yulan, Z., & Ping, X. (2015). An overview of ad hoc network security. Communications in Computer and Information Science, 557, 129\u2013137.","journal-title":"Communications in Computer and Information Science"},{"doi-asserted-by":"crossref","unstructured":"Cho, J. H., Chan, K. S., & Chen, I. R. (2013). Composite trust-based public key management in mobile ad hoc networks. In ACM 28th Symposium on Applied Computing, Coimbra, Portugal.","key":"4830_CR2","DOI":"10.1145\/2480362.2480725"},{"doi-asserted-by":"crossref","unstructured":"Huang, J., & Nicol, D. (2009). A calculus of trust and its application to PKI and identity management. In Proceedings of 8th Symposium on Identity and Trust on the Internet.","key":"4830_CR3","DOI":"10.1145\/1527017.1527021"},{"doi-asserted-by":"crossref","unstructured":"Ferdous, R., Muthukkumarasamy, V. & Sithirasenan, E. (2011). Trust-based cluster head selection algorithm for mobile ad hoc networks. In Proceedings of International Joint Conference on IEEE Trust Com.","key":"4830_CR4","DOI":"10.1109\/TrustCom.2011.76"},{"doi-asserted-by":"crossref","unstructured":"Wei, Z., Tang, H., Yu, F. R., Wang, M., & Mason, P. (2014). Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Transaction on Vehicular Technology, 63(9), 4647\u20134658.","key":"4830_CR5","DOI":"10.1109\/TVT.2014.2313865"},{"issue":"2","key":"4830_CR6","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.jpdc.2006.08.001","volume":"67","author":"K Liu","year":"2007","unstructured":"Liu, K., Abu-Ghazaleh, N. & Kang, K. (2007).\u00a0Location verification and trust management for resilient geographic routing. Journal of parallel and distributed computing, 67(2), 215\u2013228.","journal-title":"Journal of parallel and distributed computing"},{"doi-asserted-by":"crossref","unstructured":"Hegland, A. M., Winjum, E., Rong, C., & Spilling, P. (2006). A survey of key management in ad hoc networks. In IEEE Communication Surveys and Tutorials (Vol. 8(3), pp. 48\u201366, Third Quarter).","key":"4830_CR7","DOI":"10.1109\/COMST.2006.253271"},{"issue":"6","key":"4830_CR8","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L Zhou","year":"1999","unstructured":"Zhou, L., & Haas, Z. J. (1999). Securing ad hoc networks. IEEE Network Magazine, 13(6), 24\u201330.","journal-title":"IEEE Network Magazine"},{"issue":"4","key":"4830_CR9","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1145\/571637.571638","volume":"20","author":"L Zhou","year":"2002","unstructured":"Zhou, L., Cchneider, B., & Van Renesse, R. (2002). COCA: A secure distributed online certification authority. ACM Transactions on Computer Systems, 20(4), 329\u2013368.","journal-title":"ACM Transactions on Computer Systems"},{"issue":"3","key":"4830_CR10","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1109\/TDSC.2005.37","volume":"2","author":"H Chan","year":"2005","unstructured":"Chan, H., Gligor, V., Perrig, A., & Muralidharan, G. (2005). On the distribution and revocation of cryptographic keys in sensor networks. IEEE Transactions on Dependable and Secure Computing, 2(3), 233\u2013247.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"unstructured":"Yi, P., Dai, Z., Zhong, Y., & Zhang, S. (2005). Resisting flooding attacks in ad hoc networks. In Proceedings of International Conference Information Technology: Coding and Computing (Vol. 2, pp. 657\u2013662).","key":"4830_CR11"},{"issue":"5","key":"4830_CR12","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1109\/MWC.2007.4396947","volume":"14","author":"B Kannhavong","year":"2007","unstructured":"Kannhavong, B., Nakayama, H., Jamalipour, A., Nemoto, Y., & Kato, N. (2007). A survey of routing attacks in MANET. IEEE Wireless Communication Magazine, 14(5), 85\u201391.","journal-title":"IEEE Wireless Communication Magazine"},{"issue":"1","key":"4830_CR13","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.adhoc.2006.07.003","volume":"6","author":"G Arboit","year":"2008","unstructured":"Arboit, G., Crepeau, C., Davis, C. R., & Maheswaran, M. (2008). A localized certificate revocation scheme for mobile ad hoc networks. Ad Hoc Network, 6(1), 17\u201331.","journal-title":"Ad Hoc Network"},{"issue":"3","key":"4830_CR14","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/1151374.1151381","volume":"40","author":"J Clulow","year":"2006","unstructured":"Clulow, J., & Moore, T. (2006). Suicide for the common good: A new strategy for credential revocation in self-organizing systems. ACMSIGOPS Operating Systems Rev., 40(3), 18\u201321.","journal-title":"ACMSIGOPS Operating Systems Rev."},{"doi-asserted-by":"crossref","unstructured":"Park, K., Nishiyama, H., Ansari, N., & Kato, N. (2010). Certificate revocation to cope with false accusations in mobile ad hoc networks. In Proceedings of IEEE 71st Vehicular Technology Conference (VTC\u201910).","key":"4830_CR15","DOI":"10.1109\/VETECS.2010.5494213"},{"issue":"4","key":"4830_CR16","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1049\/iet-ifs.2015.0047","volume":"10","author":"S Kim","year":"2016","unstructured":"Kim, S. (2016). Effective certificate revocation scheme based on weighted voting game approach. IET Information Security, 10(4), 180\u2013187.","journal-title":"IET Information Security"},{"doi-asserted-by":"crossref","unstructured":"Liu, W., Nishiyama, H., Ansari, N., & Kato, N. (2011). A study on certificate revocation in mobile ad hoc network. In Proceedings of IEEE International Conference on Communications (ICC).","key":"4830_CR17","DOI":"10.1109\/icc.2011.5962925"},{"doi-asserted-by":"crossref","unstructured":"Liu, W., Nishiyama, H., Ansari, N., Yang, J., & Kato, N. (2013). Cluster-based certificate revocation with vindication capability for mobile ad hoc networks. In IEEE Transactions on parallel and distributed systems (Vol. 24(2)).","key":"4830_CR18","DOI":"10.1109\/TPDS.2012.85"},{"issue":"6","key":"4830_CR19","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1109\/TNET.2004.838598","volume":"12","author":"H Luo","year":"2004","unstructured":"Luo, H., Kong, J., Zerfos, P., Lu, S., & Zhang, L. (2004). URSA: Ubiquitous and robust access control for mobile ad hoc networks. IEEE\/ACM Transactions on Networking, 12(6), 1049\u20131063.","journal-title":"IEEE\/ACM Transactions on Networking"},{"doi-asserted-by":"crossref","unstructured":"Joux, A. (2000). A one round protocol for tripartite Diffie\u2013Hellman. In Proceedings ANTS IV, LNCS 1838 (pp. 38594). Springer, Berlin.","key":"4830_CR20","DOI":"10.1007\/10722028_23"},{"doi-asserted-by":"crossref","unstructured":"Barua, R., Dutta, R., & Sarkar, P. (2003). Extending Joux\u2019s protocol to multi party key agreement. In Indocrypt3, LNCS 2904 (pp. 20517).","key":"4830_CR21","DOI":"10.1007\/978-3-540-24582-7_15"},{"unstructured":"Anton E., & Duarte, O. (2002). Group key establishment in wireless ad hoc networks. In Workshop on Quality of Service and Mobility.","key":"4830_CR22"},{"unstructured":"Li, X. Y., Wang, Y., & Frieder, O. (2002). Efficient hybrid key agreement protocol for wireless ad-hoc networks. In IEEE International Conference on Computer Communications and Networks.","key":"4830_CR23"},{"unstructured":"Yasinsac, A., Thakur, V., Carter, S., & Cubukcu, I. (2002). A family of protocols for group key generation in ad hoc networks. In IASTED Conference on Communication and Computer Networks.","key":"4830_CR24"},{"doi-asserted-by":"crossref","unstructured":"Balachandran, R., Ramamurthy, B., Zou, X., & Vinodchandran, N. (2005). CRTDH: An efficient key agreement scheme for secure group communications in wireless ad hoc networks. In Proceedings of lCC 2005 (Vol. 2, pp. 1123\u20131127).","key":"4830_CR25","DOI":"10.1109\/ICC.2005.1494522"},{"issue":"6","key":"4830_CR26","doi-asserted-by":"crossref","first-page":"1972","DOI":"10.1016\/j.compeleceng.2013.12.018","volume":"40","author":"L Harn","year":"2014","unstructured":"Harn, L., & Lin, C. (2014). Efficient group Diffie\u2013Hellman key agreement protocols. Computers & Electrical Engineering, 40(6), 1972\u20131980.","journal-title":"Computers & Electrical Engineering"},{"issue":"3","key":"4830_CR27","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1145\/357369.357372","volume":"1","author":"SG Akl","year":"1983","unstructured":"Akl, S. G., & Taylor, P. D. (1983). Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer System, 1(3), 239\u2013248.","journal-title":"ACM Transactions on Computer System"},{"key":"4830_CR28","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2012.04.036","volume":"209","author":"AK Das","year":"2012","unstructured":"Das, A. K., Paul, N. R., & Tripathy, L. (2012). Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Information Sciences, 209, 80\u201392.","journal-title":"Information Sciences"},{"key":"4830_CR29","doi-asserted-by":"crossref","first-page":"917","DOI":"10.1016\/j.ins.2010.09.033","volume":"181","author":"J-W Lo","year":"2011","unstructured":"Lo, J.-W., Hwang, M.-S., & Liu, C.-H. (2011). An efficient key assignment scheme for access control in a large leaf class hierarchy. Information Sciences, 181, 917\u2013925.","journal-title":"Information Sciences"},{"issue":"3","key":"4830_CR30","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1109\/WCL.2013.032013.130164","volume":"2","author":"Y Zhuang","year":"2013","unstructured":"Zhuang, Y., Gulliver, T. A. & Coady, Y. (2013). On planar tessellations and interference estimation in wireless ad-hoc networks. IEEE Wireless Communication Letters, 2(3), 331\u2013334.","journal-title":"IEEE Wireless Communication Letters"},{"issue":"4","key":"4830_CR31","doi-asserted-by":"crossref","first-page":"1256","DOI":"10.1109\/TWC.2007.348322","volume":"6","author":"P Fan","year":"2007","unstructured":"Fan, P., Li, G., Cai, K., & Letaief, K. B. (2007). On the geometrical characteristic of wireless ad-hoc networks and its application in network performance analysis. IEEE Transaction on Wireless Communications, 6(4), 1256\u20131265.","journal-title":"IEEE Transaction on Wireless Communications"},{"doi-asserted-by":"crossref","unstructured":"Ko, Y. B., & Vaidya, N. H. (1999). Geocasting in mobile ad hoc networks: Location-based multicast algorithms. In Proceedings of IEEE WMCSA.","key":"4830_CR32","DOI":"10.1109\/MCSA.1999.749282"},{"doi-asserted-by":"crossref","unstructured":"Janani, V. S., & Manikandan, M. S. K. (2015). CRT-KM: Chinese remainder theorem based key management scheme for securing ad-hoc networks. In IEEE International Conference on SPICES\u201915 (pp 1\u20135).","key":"4830_CR33","DOI":"10.1109\/SPICES.2015.7091501"},{"doi-asserted-by":"crossref","unstructured":"Magliveras, S., Wei, W. & Zou, X. (2008). Notes on the CRTDH group key agreement protocol. In The 28th International Conference on Distributed Computing Systems Workshops.","key":"4830_CR34","DOI":"10.1109\/ICDCS.Workshops.2008.36"},{"doi-asserted-by":"crossref","unstructured":"Barua, R., Dutta, R. & Sarkar, P. (2003). Extending Joux\u2019s protocol to multi party key agreement. In Indocrypt\u201903, LNCS 2904 (pp.205\u2013217). Springer, Berlin.","key":"4830_CR35","DOI":"10.1007\/978-3-540-24582-7_15"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4830-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4830-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4830-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T07:08:12Z","timestamp":1719385692000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4830-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,14]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["4830"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4830-y","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2017,8,14]]}}}