{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:43:31Z","timestamp":1759963411794},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,2,3]],"date-time":"2018-02-03T00:00:00Z","timestamp":1517616000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11277-018-5346-9","type":"journal-article","created":{"date-parts":[[2018,2,3]],"date-time":"2018-02-03T09:26:33Z","timestamp":1517649993000},"page":"3205-3224","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Multi Model Mitigation Approach for Network Threats on Cluster Based Linear Chain Routing Protocol in Wireless Sensor Networks at QoS Development"],"prefix":"10.1007","volume":"102","author":[{"given":"R.","family":"Rajamohamed","sequence":"first","affiliation":[]},{"given":"T. Justin","family":"Jose","sequence":"additional","affiliation":[]},{"given":"S.","family":"Sumithra","sequence":"additional","affiliation":[]},{"given":"J.","family":"Vijaya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,3]]},"reference":[{"key":"5346_CR1","doi-asserted-by":"crossref","unstructured":"Yu, F., Park, S., Tian, Y., Jin, M., & Kim, S. (2008). Efficient hole detour scheme for geographic routing in wireless sensor networks. In Proceedings of vehicular technology conference (pp. 153\u2013157). IEEE.","DOI":"10.1109\/VETECS.2008.44"},{"key":"5346_CR2","doi-asserted-by":"crossref","unstructured":"Shin, I., Pham, N., & Choo, H. (2009). Virtual convex polygon based hole boundary detection and time delay based hole detour scheme in WSNs. In Human interface and the management of information. Designing information environments (pp. 619\u2013627).","DOI":"10.1007\/978-3-642-02556-3_70"},{"issue":"4","key":"5346_CR3","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1109\/TPDS.2011.209","volume":"23","author":"C BaqueroP","year":"2012","unstructured":"Baquero, C., Almeida, P. S., Menezes, R., & Jesus, P. (2012). Extrema propagation: Fast distributed estimation of sums and network sizes. IEEE Transactions on Parallel and Distributed Systems, 23(4), 668\u2013675.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"5346_CR4","unstructured":"Villalpando, R, Vargas, C., & Munoz, D. (2008). Network coding for detection and defense of sinkholes in wireless reconfigurable networks. In Proceedings of international conference on systems and networks communications (pp. 286\u2013291)."},{"key":"5346_CR5","unstructured":"Choi, B., Cho, E., Kim, J., Hong, C., & Kim, J. (2009). A sinkhole attack detection mechanism for LQI based mesh routing in WSN. In Proceedings of international conference on information networking (pp. 1\u20135)."},{"key":"5346_CR6","doi-asserted-by":"crossref","unstructured":"Krontiris, I., Dimitriou, T., Giannetsos, T., & Mpasoukos, M. (2008). Intrusion detection of sinkhole attacks in wireless sensor networks. In Algorithmic aspects of wireless sensor networks (pp.150\u2013161).","DOI":"10.1007\/978-3-540-77871-4_14"},{"key":"5346_CR7","doi-asserted-by":"crossref","unstructured":"Teng, L. (2010). SeRA: A secure routing algorithm against sinkhole attacks for mobile wireless sensor networks. In International conference on computer modeling and simulation (Vol. 4, pp. 79\u201382).","DOI":"10.1109\/ICCMS.2010.95"},{"issue":"2","key":"5346_CR8","doi-asserted-by":"publisher","first-page":"32","DOI":"10.5120\/11410-6743","volume":"4","author":"T Singh","year":"2013","unstructured":"Singh, T. (2013). Detection and correction of sinkhole attack with novel method in WSN using NS2 tool. International Journal of Advanced Computer Science and Applications, 4(2), 32\u201335.","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"5346_CR9","unstructured":"Shukla, P. K., Silakari, S., & Bhadoria, S. S. (2009). RGVP Bhopal India \u2018network security scheme for wireless sensor network using efficient CSMA MAC layer protocol\u2019. In Sixth international conference on information technology."},{"key":"5346_CR10","unstructured":"Singh, H., & Malik, G. (2011) Approaches to wireless sensor network: Security protocols. World of Computer Science and Information Technology Journal (WCSIT), 1(7), 302\u2013306. ISSN: 2221-0741."},{"key":"5346_CR11","unstructured":"Salehi, S. A. (2013). Detection of sinkhole attack in wireless sensor networks. In Space science and communication (IconSpace) (pp. 361\u2013365)."},{"key":"5346_CR12","doi-asserted-by":"crossref","unstructured":"Chen, C., Song, M., & Hsieh, G. (2010). Intrusion detection of sinkhole attacks in large-scale wireless sensor networks. In Wireless communications, networking and information security (WCNIS) (pp. 711\u2013716).","DOI":"10.1109\/WCINS.2010.5541872"},{"key":"5346_CR13","doi-asserted-by":"crossref","unstructured":"Rassam, M. A. (2012). A sinkhole attack detection scheme in Mintroute wireless sensor networks. In Telecommunication technologies (ISTT) (pp. 71\u201375).","DOI":"10.1109\/ISTT.2012.6481568"},{"key":"5346_CR14","doi-asserted-by":"crossref","unstructured":"Choi, M., & Choo, H. (2011). Bypassing hole scheme using observer packets for geographic routing in WSNs. In Proceedings of international conference on information networking (pp. 435\u2013440). IEEE.","DOI":"10.1109\/ICOIN.2011.5723124"},{"key":"5346_CR15","unstructured":"Qi, J. (2012). Detection and defence of sinkhole attack in wireless sensor network [13]. In Communication technology ICCT (pp. 809\u2013813)."},{"issue":"11","key":"5346_CR16","doi-asserted-by":"publisher","first-page":"763187","DOI":"10.1155\/2012\/763187","volume":"8","author":"M Garc\u00eda-Otero","year":"2012","unstructured":"Garc\u00eda-Otero, M., & Poblaci\u00f3n-Hern\u00e1ndez, A. (2012). Secure neighbor discovery in wireless sensor networks using range-free localization techniques. International Journal of Distributed Sensor Networks, 8(11), 763187.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"5346_CR17","unstructured":"Sheela, D. (2011). A non cryptographic method of sinkhole attack detection in wireless sensor networks. In Recent trends in information technology (pp. 527\u2013532)."},{"key":"5346_CR18","doi-asserted-by":"crossref","unstructured":"Garcia-Otero, M. (2012). Detection of wormhole attacks in wireless sensor networks using range-free localization. In Computer aided modeling and design of communication links and networks (CAMAD) (pp. 21\u201325).","DOI":"10.1109\/CAMAD.2012.6335337"},{"key":"5346_CR19","doi-asserted-by":"crossref","unstructured":"Krontiris, I., Giannetsos, T., & Dimitriou, T. (2008). Launching a sinkhole attack in wireless sensor networks; the intruder side. In Proceedings of IEEE international conference on wireless and mobile computing (pp. 526\u2013531).","DOI":"10.1109\/WiMob.2008.83"},{"key":"5346_CR20","unstructured":"Sheela, D. (2011). A non cryptographic method of sinkhole attack detection in wireless sensor networks. In Recent trends in information technology (pp. 527\u2013532)."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5346-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5346-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5346-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T06:59:24Z","timestamp":1570690764000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5346-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,3]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["5346"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5346-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,3]]},"assertion":[{"value":"3 February 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}