{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:26:47Z","timestamp":1768339607686,"version":"3.49.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T00:00:00Z","timestamp":1526515200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s11277-018-5829-8","type":"journal-article","created":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T14:59:48Z","timestamp":1526569188000},"page":"95-124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A Trusted Waterfall Framework Based Peer to Peer Protocol for Reliable and Energy Efficient Data Transmission in MANETs"],"prefix":"10.1007","volume":"102","author":[{"given":"Usha","family":"Mohanakrishnan","sequence":"first","affiliation":[]},{"given":"Ramakrishnan","family":"Bhagavathiperumal","sequence":"additional","affiliation":[]},{"given":"Sathiamoorthy","family":"Jayaraman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,17]]},"reference":[{"issue":"14\/15","key":"5829_CR1","doi-asserted-by":"publisher","first-page":"2826","DOI":"10.1016\/j.comcom.2007.05.024","volume":"30","author":"AA Abbasi","year":"2007","unstructured":"Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer Commnication, 30(14\/15), 2826\u20132841.","journal-title":"Computer Commnication"},{"issue":"5","key":"5829_CR2","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1109\/LCOMM.2012.031912.112484","volume":"16","author":"C Tselikis","year":"2012","unstructured":"Tselikis, C., Mitropoulos, S., Komninos, N., & Douligeris, C. (2012). Degree-based clustering algorithms for wireless ad hoc networks under attack. IEEE Communications Letters, 16(5), 619\u2013621.","journal-title":"IEEE Communications Letters"},{"key":"5829_CR3","doi-asserted-by":"crossref","unstructured":"Zeng, Y., Cao, J., Guo, S., Yang, K., & Xie, L. (2009) SWCA: A secure weighted clustering algorithm in wireless ad hoc networks. In IEEE wireless communications and networking conference WCNC.","DOI":"10.1109\/WCNC.2009.4917979"},{"key":"5829_CR4","doi-asserted-by":"crossref","unstructured":"Nishimura, I., Nagase, T., Takehana, Y., & Yoshioka, Y. (2011). Secure clustering for building certificate management nodes in ad-hoc network. In International conference on network-based information systems, (2011) (pp. 685\u2013689).","DOI":"10.1109\/NBiS.2011.115"},{"issue":"3","key":"5829_CR5","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1007\/s11277-010-9994-7","volume":"56","author":"H Rif\u00e0-Pous","year":"2011","unstructured":"Rif\u00e0-Pous, H., & Herrera-Joancomart\u00ed, J. (2011). A fair and secure cluster formation process for ad hoc networks. Journal Wireless Personal Communications: An International Journal Archive, 56(3), 625.","journal-title":"Journal Wireless Personal Communications: An International Journal Archive"},{"issue":"EICA2012-4","key":"5829_CR6","first-page":"10","volume":"5","author":"V Sivaranjani","year":"2012","unstructured":"Sivaranjani, V., & Rajalakshmi, D. (2012). Secure cluster head election for intrusion detection in MANET. Journal of Computer Applications, 5(EICA2012-4), 10.","journal-title":"Journal of Computer Applications"},{"key":"5829_CR7","doi-asserted-by":"crossref","unstructured":"Bechler, M., Hof, H., Kraft, D., Pahlke, F., & Wolf, L. (2004). A cluster-based security architecture for Ad Hoc networks. In Proceedings of the 23rd annual joint conference of the IEEE computer and communications societies (INFOCOM\u201904) (vol. 4, pp. 2393\u20132403).","DOI":"10.1109\/INFCOM.2004.1354661"},{"key":"5829_CR8","doi-asserted-by":"crossref","unstructured":"Adams, W. J., & Davis, N. J. (2005). Toward a decentralized trust based access control system for dynamic collaboration. In Proceedings of the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop (SMC\u201905) (pp. 317\u2013324).","DOI":"10.1109\/IAW.2005.1495969"},{"key":"5829_CR9","doi-asserted-by":"crossref","unstructured":"Boukerche, A., & Ren, Y. (2008). A security management scheme using a novel computational reputation model for wireless and mobile Ad Hoc networks. In Proceedings of the 5th ACM international symposium on performance evaluation of wireless ad-hoc, sensor, and ubiquitous networks (PE-WASUN\u201908) (pp. 88\u201395).","DOI":"10.1145\/1454609.1454628"},{"key":"5829_CR10","doi-asserted-by":"crossref","unstructured":"Li, R., Li, J., Liu, P., & Chen, H. (2007). An objective trust management framework for mobile Ad Hoc networks. In Proceedings of the IEEE 65th vehicular technology conference (VTC\u201907) (pp. 56\u2013 60).","DOI":"10.1109\/VETECS.2007.24"},{"key":"5829_CR11","doi-asserted-by":"crossref","unstructured":"Theodorakopoulos, G., & Baras, J. S. (2004). Trust evaluation in adhoc networks. In Proceedings of the ACM workshop on wireless security (WiSe\u201904) (pp. 1\u201310).","DOI":"10.1145\/1023646.1023648"},{"key":"5829_CR12","doi-asserted-by":"crossref","unstructured":"Jiang, T., & Baras, J. S. (2004). Ant-based adaptive trust evidence distribution in MANET. In Proceedings of the 24th international conference on distributed computing systems workshops (pp. 588\u2013593).","DOI":"10.1109\/ICDCSW.2004.1284092"},{"key":"5829_CR13","unstructured":"Yan, Z., Zhang, P., & Virtan, T. (2003). Trust evaluation based security solution in Ad Hoc networks. In Proceedings of 7th Nordic workshop on secure IT systems."},{"key":"5829_CR14","unstructured":"Pirzada, A. A., & McDonald, C. (2004). Establishing trust in pure ad-hoc networks. In Proceedings of the 27th Australasian conference on computer science (ACSC\u201904) (vol. 26, pp. 47\u201354)."},{"key":"5829_CR15","unstructured":"Ghosh, T., Pissinou, N., & Makki, K. (2004). Collaborative trust based secure routing in multihop Ad Hoc networks. In Proceedings of the 3rd international IFIP-TC6 networking conference on networking technologies, services, and protocols; performance of computer and communication networks; mobile and wireless communications of Lecture Notes in Computer Science, Athens, Greece, May 9\u201314, 2004 (vol. 3042, pp. 1446\u20131451)."},{"issue":"6","key":"5829_CR16","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1007\/s11036-005-4454-4","volume":"10","author":"T Ghosh","year":"2005","unstructured":"Ghosh, T., Pissinou, N., & Makki, K. (2005). Towards designing a trusted routing solution in mobile Ad Hoc networks. Mobile Networks and Applications, 10(6), 985\u2013995.","journal-title":"Mobile Networks and Applications"},{"key":"5829_CR17","doi-asserted-by":"crossref","unstructured":"Milan, F., Jaramillo,J. J., & Srikant, R. (2006). Achieving cooperation in multihop wireless networks of selfish nodes. In Proceedings of the workshop on game theory for communications and networks (GameNets\u201906).","DOI":"10.1145\/1190195.1190197"},{"issue":"4","key":"5829_CR18","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1007\/s11276-009-0182-1","volume":"16","author":"H Safa","year":"2010","unstructured":"Safa, H., Artail, H., & Tabet, D. (2010). A cluster-based trust-aware routing protocol for mobile Ad Hoc networks. Wireless Networks, 16(4), 969\u2013984.","journal-title":"Wireless Networks"},{"issue":"2","key":"5829_CR19","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1023\/A:1013941929408","volume":"5","author":"M Chatterjee","year":"2002","unstructured":"Chatterjee, M., Das, S. K., & Turgut, D. (2002). WCA: A weighted clustering algorithm for mobile Ad Hoc networks. Journal of Cluster Computing, 5(2), 193\u2013204.","journal-title":"Journal of Cluster Computing"},{"key":"5829_CR20","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s10586-012-0198-7","volume":"15","author":"P Chatterjee","year":"2012","unstructured":"Chatterjee, P., Sengupta, I., & Ghosh, S. K. (2012). STACRP: a secure trusted auction oriented clustering based routing protocol for MANET. Cluster Computing, 15, 303\u2013320.","journal-title":"Cluster Computing"},{"key":"5829_CR21","doi-asserted-by":"crossref","unstructured":"Sathiamoorthy, J., Ramakrishnan, B., & Usha. M. (2015). A reliable and secure data transmission in CEAACK MANETs using Distinct Dynamic Key with classified Digital Signature Cryptographic Algorithm. In IEEE international conference on computing and communications technologies (ICCCT).","DOI":"10.1109\/ICCCT2.2015.7292735"},{"key":"5829_CR22","doi-asserted-by":"publisher","first-page":"64","DOI":"10.5815\/ijcnis.2016.02.08","volume":"2","author":"J Sathiamoorthy","year":"2016","unstructured":"Sathiamoorthy, J., & Ramakrishnan, B. (2016). CEAACK\u2014a reduced acknowledgment for better data transmission for MANETs. International Journal of Computer Network and Information Security, 2, 64\u201371.","journal-title":"International Journal of Computer Network and Information Security"},{"issue":"1","key":"5829_CR23","first-page":"144","volume":"5","author":"J Sathiamoorthy","year":"2015","unstructured":"Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). Design of a competent broadcast algorithm for reliable transmission in CEAACK MANETs. Journal of Network Communications and Emerging Technologies, 5(1), 144\u2013151.","journal-title":"Journal of Network Communications and Emerging Technologies"},{"key":"5829_CR24","unstructured":"Sathiamoorthy, J., & Ramakrishnan, B. (2017). A competent three-tier fuzzy cluster algorithm for enhanced data transmission in cluster EAACK MANETs. Springer Soft Computing 11 July 2017 (Online) (pp. 1\u201321)."},{"key":"5829_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-017-4102-x","volume":"94","author":"J Sathiamoorthy","year":"2017","unstructured":"Sathiamoorthy, J., & Ramakrishnan, B. (2017). A reliable data transmission in EAACK MANETs using hybrid three-tier competent fuzzy cluster algorithm. Wireless Personal Communication, 94, 1\u201320.","journal-title":"Wireless Personal Communication"},{"key":"5829_CR26","first-page":"1","volume":"95","author":"J Sathiamoorthy","year":"2016","unstructured":"Sathiamoorthy, J., & Ramakrishnan, B. (2016). Energy and delay efficient dynamic cluster formation using improved ant colony optimization algorithm in EAACK MANETs. Wireless Personal Communication, 95, 1\u2013122.","journal-title":"Wireless Personal Communication"},{"key":"5829_CR27","first-page":"1","volume":"23","author":"J Sathiamoorthy","year":"2015","unstructured":"Sathiamoorthy, J., & Ramakrishnan, B. (2015). Energy and delay efficient dynamic cluster formation using hybrid AGA with FACO in EAACK. Journal of Wireless Networks, 23, 1\u201315.","journal-title":"Journal of Wireless Networks"},{"key":"5829_CR28","doi-asserted-by":"publisher","first-page":"1913","DOI":"10.1016\/j.asoc.2011.05.036","volume":"12","author":"H Ali","year":"2012","unstructured":"Ali, H., Shahzad, W., & Khan, F. A. (2012). Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization. Applied Soft Computing, 12, 1913\u20131928.","journal-title":"Applied Soft Computing"},{"issue":"3","key":"5829_CR29","first-page":"273","volume":"1","author":"S Yadav","year":"2012","unstructured":"Yadav, S., & Jain, R. (2012). Attacks in MANET. International Journal of Latest Trends in Engineering and Technology (IJLTET), 1(3), 273.","journal-title":"International Journal of Latest Trends in Engineering and Technology (IJLTET)"},{"key":"5829_CR30","first-page":"62","volume":"2","author":"S Lalar","year":"2014","unstructured":"Lalar, S. (2014). Security in MANET: Vulnerabilities, attacks & solutions. International Journal of Multidisciplinary and Current Research, 2, 62.","journal-title":"International Journal of Multidisciplinary and Current Research"},{"key":"5829_CR31","unstructured":"Buchegger, S., & Boudec, J. (2002). Performance analysis of the confidant protocol cooperation of nodes fairness in dynamic ad-hoc networks. In Proceedings of international symposium on mobile ad hoc networking and computing mobihoc and 2002 (pp. 226\u2013236)."},{"key":"5829_CR32","doi-asserted-by":"crossref","unstructured":"Liu, J., & Issarny, V. (2004). Enhanced reputation mechanism for mobile ad hoc networks. In Proceedings of 2nd international conference on trust management.","DOI":"10.1007\/978-3-540-24747-0_5"},{"key":"5829_CR33","doi-asserted-by":"crossref","unstructured":"Anderegg, L., & Eidenbenz, S. (2003). Ad hoc-VCG: A truthful and cost efficient routing protocol for mobile ad hoc networks with selfish agents. In Proceedings of mobile computing network, 2003 (pp. 245\u2013259).","DOI":"10.1145\/938985.939011"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5829-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5829-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5829-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T21:15:10Z","timestamp":1661289310000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5829-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,17]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["5829"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5829-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,17]]},"assertion":[{"value":"17 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}