{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:27:23Z","timestamp":1761395243363},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T00:00:00Z","timestamp":1525910400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s11277-018-5824-0","type":"journal-article","created":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T06:44:39Z","timestamp":1525934679000},"page":"41-60","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Advanced Secured Routing Algorithm of Vehicular Ad-Hoc Network"],"prefix":"10.1007","volume":"102","author":[{"given":"Parul","family":"Tyagi","sequence":"first","affiliation":[]},{"given":"Deepak","family":"Dembla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,10]]},"reference":[{"key":"5824_CR1","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1049\/iet-ifs.2010.0314","volume":"7","author":"X Lv","year":"2013","unstructured":"Lv, X., & Li, H. (2013). Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks. Information Security, IET, 7, 157.","journal-title":"Information Security, IET"},{"issue":"4","key":"5824_CR2","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s11235-010-9400-5","volume":"50","author":"S Zeadally","year":"2012","unstructured":"Zeadally, S., Hunt, R., Chen, Y., Irwin, A., & Hassan, S. (2012). Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommunication Systems, 50(4), 217\u2013241.","journal-title":"Telecommunication Systems"},{"key":"5824_CR3","doi-asserted-by":"crossref","unstructured":"Azogu, I. K. (2013) A new anti jamming strategy for vanet metrics-direct security defense. In IEEE International Conference on Vehicular Network Evolution (pp. 1344\u20131349).","DOI":"10.1109\/GLOCOMW.2013.6825181"},{"key":"5824_CR4","doi-asserted-by":"publisher","unstructured":"Raya, M., Papadimitratos, P., & Hubaux, J. P. (2006). Securing vehicular communications. IEEE Wireless Communications, 13(5). \n                    https:\/\/doi.org\/10.1109\/WC-M.2006.250352\n                    \n                  .","DOI":"10.1109\/WC-M.2006.250352"},{"issue":"2","key":"5824_CR5","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MVT.2007.912927","volume":"2","author":"F Li","year":"2007","unstructured":"Li, F., & Wang, Y. (2007). Routing in vehicular ad hoc networks: A survey. Vehicular Technology Magazine, IEEE, 2(2), 12\u201322.","journal-title":"Vehicular Technology Magazine, IEEE"},{"key":"5824_CR6","doi-asserted-by":"crossref","unstructured":"Nishiyama, H., Ngo, T., Ansari, N., & Kato N. (2012). On minimizing the impact of mobility on topology control in mobile ad hoc networks. IEEE Transactions on Wireless Communications.","DOI":"10.1109\/TWC.2012.010312.110783"},{"issue":"3","key":"5824_CR7","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2004.1","volume":"2","author":"Hu Yi-Chun","year":"2004","unstructured":"Yi-Chun, Hu, & Perrig, Adrian. (2004). A survey of secure wireless ad hoc routing. IEEE Security and Privacy, 2(3), 28\u201339.","journal-title":"IEEE Security and Privacy"},{"issue":"4","key":"5824_CR8","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1109\/TITS.2015.2492981","volume":"17","author":"P Vijayakumar","year":"2016","unstructured":"Vijayakumar, P., Azores, M., Kannan, A., & Deborah, L. J. (2016). Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Transaction on Intelligent Transportation systems, 17(4), 1015\u20131028.","journal-title":"IEEE Transaction on Intelligent Transportation systems"},{"issue":"3","key":"5824_CR9","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1109\/JSAC.2004.842547","volume":"23","author":"S Kimaya","year":"2005","unstructured":"Kimaya, S., et al. (2005). Authenticated routing for ad hoc networks. Journal on Selected Areas in Communications, 23(3), 598\u2013610.","journal-title":"Journal on Selected Areas in Communications"},{"key":"5824_CR10","doi-asserted-by":"crossref","unstructured":"Zapata, M.G., & Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of the ACM workshop on Wireless security, Atlanta, USA (pp. 1\u201310).","DOI":"10.1145\/570681.570682"},{"issue":"6","key":"5824_CR11","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1109\/TST.2016.7787005","volume":"21","author":"H Zhong","year":"2016","unstructured":"Zhong, H., Wen, J., & Zhang, S. (2016). Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET. Tsinghua Science and Technology, 21(6), 620\u2013629.","journal-title":"Tsinghua Science and Technology"},{"issue":"10","key":"5824_CR12","first-page":"70","volume":"40","author":"Mohamed Hamdy","year":"2015","unstructured":"Hamdy, Mohamed, & Ibrahim, Safi. (2015). A comparison of VANET authentication schemes: Public key vs. symmetric key. IEEE Communications Magazine, 40(10), 70\u201375.","journal-title":"IEEE Communications Magazine"},{"issue":"1","key":"5824_CR13","first-page":"1075","volume":"3","author":"NR Sunitha","year":"2016","unstructured":"Sunitha, N. R., MaheshKumar, K. M., Mardini, W., & BaniYasetn, M. (2016). Secure ad-hoc on-demand distance vector routing using identity based symmetric key management. Conference IEEE WiSPNET, 3(1), 1075\u20131081.","journal-title":"Conference IEEE WiSPNET"},{"key":"5824_CR14","unstructured":"Gupta, V., Stebila, D., Fung, S., Shantz, S. C., Gura, N., & Eberle, H. (2004). Speeding up secure web transactions using elliptic curve cryptography. In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS 2004). The Internet Society (pp. 231\u2013239)."},{"key":"5824_CR15","volume-title":"Theory and problems of discrete mathematics","author":"S Lipschutz","year":"2007","unstructured":"Lipschutz, S. (2007). Theory and problems of discrete mathematics (3rd ed.). New York: McGraw-Hill.","edition":"3"},{"key":"5824_CR16","doi-asserted-by":"crossref","unstructured":"Tyagi, P., & Dembla, D. (2015) Performance analysis and quality-of-service monitoring of protected and unprotected TCP networks using NCTUns simulator. In Proceedings of the IEEE CSNT 2015, April 4\u20136, 2015, Organized by- Machine Intelligence Research Labs, IEEE Madhya Pradesh Subsection, Gwalior.","DOI":"10.1109\/CSNT.2015.17"},{"key":"5824_CR17","unstructured":"Ezreik, A., & Gheryani, A. (2012). Design and simulation of wireless network using NS-2. ICCSIT-2012, Singapore, April 28\u201329."},{"key":"5824_CR18","doi-asserted-by":"crossref","unstructured":"Tyagi, P., Dembla, D. (2014). Investigating the security threats in vehicular Ad hoc networks (VANETs): Towards security engineering for safer on-road transportation. In Proceedings of IEEE ICACCI 2014, Sept 24\u201327.","DOI":"10.1109\/ICACCI.2014.6968313"},{"issue":"2","key":"5824_CR19","first-page":"493-52","volume":"1","author":"HA Esmaili","year":"2011","unstructured":"Esmaili, H. A., Shoji, M. R. K., & Garage, H. (2011). Performance analysis of AODV under black hole attack through use of OPNET simulator. World of Computer Science and Information Technology Journal, 1(2), 493-52.","journal-title":"World of Computer Science and Information Technology Journal"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5824-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5824-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5824-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T11:49:32Z","timestamp":1557488972000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5824-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,10]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["5824"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5824-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,10]]},"assertion":[{"value":"10 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}