{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:46:29Z","timestamp":1761896789804},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,5,15]],"date-time":"2018-05-15T00:00:00Z","timestamp":1526342400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s11277-018-5835-x","type":"journal-article","created":{"date-parts":[[2018,5,15]],"date-time":"2018-05-15T07:55:11Z","timestamp":1526370911000},"page":"201-227","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["A Three Layered Peer-to-Peer Energy Efficient Protocol for Reliable and Secure Data Transmission in EAACK MANETs"],"prefix":"10.1007","volume":"102","author":[{"given":"Sathiamoorthy","family":"Jayaraman","sequence":"first","affiliation":[]},{"given":"Ramakrishnan","family":"Bhagavathiperumal","sequence":"additional","affiliation":[]},{"given":"Usha","family":"Mohanakrishnan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,15]]},"reference":[{"issue":"14\/15","key":"5835_CR1","doi-asserted-by":"publisher","first-page":"2826","DOI":"10.1016\/j.comcom.2007.05.024","volume":"30","author":"AA Abbasi","year":"2007","unstructured":"Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer Communication, 30(14\/15), 2826\u20132841.","journal-title":"Computer Communication"},{"issue":"5","key":"5835_CR2","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1109\/LCOMM.2012.031912.112484","volume":"16","author":"C Tselikis","year":"2012","unstructured":"Tselikis, C., Mitropoulos, S., Komninos, N., & Douligeris, C. (2012). Degree-based clustering algorithms for wireless Ad Hoc networks under attack. IEEE Communications Letters, 16(5), 619\u2013621.","journal-title":"IEEE Communications Letters"},{"key":"5835_CR3","doi-asserted-by":"crossref","unstructured":"Zeng, Y., Cao, J., Guo, S., Yang, K., & Xie, L. (2009). SWCA: A secure weighted clustering algorithm in wireless ad hoc networks. In IEEE wireless communications and networking conference WCNC.","DOI":"10.1109\/WCNC.2009.4917979"},{"key":"5835_CR4","doi-asserted-by":"crossref","unstructured":"Nishimura, I., Nagase, T., Takehana, Y., & Yoshioka, Y. (2011). Secure clustering for building certificate management nodes in ad-hoc network. In International conference on network-based information systems (pp. 685\u2013689).","DOI":"10.1109\/NBiS.2011.115"},{"issue":"3","key":"5835_CR5","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1007\/s11277-010-9994-7","volume":"56","author":"H Rif\u00e0-Pous","year":"2011","unstructured":"Rif\u00e0-Pous, H., & Herrera-Joancomart\u00ed, J. (2011). A fair and secure cluster formation process for ad hoc networks. Journal Wireless Personal Communications: An International Journal archive, 56(3), 625\u2013636.","journal-title":"Journal Wireless Personal Communications: An International Journal archive"},{"issue":"EICA2012-4","key":"5835_CR6","first-page":"10","volume":"5","author":"V Sivaranjani","year":"2012","unstructured":"Sivaranjani, V., & Rajalakshmi, D. (2012). Secure cluster head election for intrusion detection in MANET. Journal of Computer Applications, 5(EICA2012-4), 10.","journal-title":"Journal of Computer Applications"},{"key":"5835_CR7","doi-asserted-by":"crossref","unstructured":"Adams, W. J., & Davis, N. J. (2005). Toward a decentralized trust based access control system for dynamic collaboration. In Proceedings of the 6th annual IEEE system, man and cybernetics information assurance workshop (SMC\u201905) (pp. 317\u2013324).","DOI":"10.1109\/IAW.2005.1495969"},{"key":"5835_CR8","doi-asserted-by":"crossref","unstructured":"Boukerche, A. & Ren, Y. (2008). A security management scheme using a novel computational reputation model for wireless and mobile Ad Hoc networks. In Proceedings of the 5th ACM international symposium on performance evaluation of wireless ad-hoc, sensor, and ubiquitous networks (PE-WASUN\u201908) (pp. 88\u201395).","DOI":"10.1145\/1454609.1454628"},{"key":"5835_CR9","doi-asserted-by":"crossref","unstructured":"Li, R., Li, J., Liu, P., & Chen, H. (2007). An objective trust management framework for mobile Ad Hoc networks. In Proceedings of the IEEE 65th vehicular technology conference (VTC\u201907) (pp. 56\u2013 60).","DOI":"10.1109\/VETECS.2007.24"},{"key":"5835_CR10","doi-asserted-by":"crossref","unstructured":"Theodorakopoulos, G., & Baras, J. S. (2004). Trust evaluation in adhoc networks. In Proceedings of the ACM workshop on wireless security (WiSe\u201904) (pp. 1\u201310).","DOI":"10.1145\/1023646.1023648"},{"key":"5835_CR11","doi-asserted-by":"crossref","unstructured":"Jiang, T., & Baras, J. S. (2004). Ant-based adaptive trust evidence distribution in MANET. In Proceedings of the 24th international conference on distributed computing systems workshops (pp. 588\u2013593).","DOI":"10.1109\/ICDCSW.2004.1284092"},{"key":"5835_CR12","unstructured":"Yan, Z., Zhang, P., & Virtan, T. (2003). Trust evaluation based security solution in Ad Hoc networks. In Proceedings of 7th nordic workshop on secure IT systems."},{"key":"5835_CR13","unstructured":"Pirzada, A. A., & McDonald, C. (2004). Establishing trust in pure ad-hoc networks. In Proceedings of the 27th Australasian conference on computer science (ACSC\u201904) (vol. 26, pp. 47\u201354)."},{"key":"5835_CR14","unstructured":"Ghosh, T., Pissinou, N., & Makki, K. (2004). Collaborative trust based secure routing in multihop ad hoc networks. In Proceedings of the 3rd international IFIP-TC6 networking conference on NETWORKING 2004. Networking technologies, services, and protocols; performance of computer and communication networks; mobile and wireless communications, Athens, Greece, May 9\u201314, 2004, Lecture Notes in Computer Science (vol. 3042, pp. 1446\u20131451)."},{"issue":"6","key":"5835_CR15","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1007\/s11036-005-4454-4","volume":"10","author":"T Ghosh","year":"2005","unstructured":"Ghosh, T., Pissinou, N., & Makki, K. (2005). Towards designing a trusted routing solution in mobile ad hoc networks. Mobile Networks and Applications, 10(6), 985\u2013995.","journal-title":"Mobile Networks and Applications"},{"key":"5835_CR16","doi-asserted-by":"crossref","unstructured":"Milan, F., Jaramillo, J. J., & Srikant, R. (2006). Achieving cooperation in multihop wireless networks of selfish nodes. In Proceedings of the workshop on game theory for communications and networks (GameNets\u201906).","DOI":"10.1145\/1190195.1190197"},{"issue":"4","key":"5835_CR17","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1007\/s11276-009-0182-1","volume":"16","author":"H Safa","year":"2010","unstructured":"Safa, H., Artail, H., & Tabet, D. (2010). A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Networks, 16(4), 969\u2013984.","journal-title":"Wireless Networks"},{"issue":"2","key":"5835_CR18","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1023\/A:1013941929408","volume":"5","author":"M Chatterjee","year":"2002","unstructured":"Chatterjee, M., Das, S. K., & Turgut, D. (2002). WCA: A weighted clustering algorithm for mobile ad hoc networks. Journal of Cluster Computing, 5(2), 193\u2013204.","journal-title":"Journal of Cluster Computing"},{"key":"5835_CR19","doi-asserted-by":"crossref","unstructured":"Bechler, M., Hof, H., Kraft, D., Pahlke, F., & Wolf, L. (2004). A cluster-based security architecture for ad hoc networks. In Proceedings of the 23rd annual joint conference of the IEEE computer and communications societies (INFOCOM\u201904) (vol. 4, pp. 2393\u20132403).","DOI":"10.1109\/INFCOM.2004.1354661"},{"key":"5835_CR20","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s10586-012-0198-7","volume":"15","author":"P Chatterjee","year":"2012","unstructured":"Chatterjee, P., Sengupta, I., & Ghosh, S. K. (2012). STACRP: A secure trusted auction oriented clustering based routing protocol for MANET. Cluster Computing, 15, 303\u2013320.","journal-title":"Cluster Computing"},{"issue":"4","key":"5835_CR21","doi-asserted-by":"publisher","first-page":"5817","DOI":"10.1007\/s11277-017-4812-0","volume":"97","author":"J Sathiamoorthy","year":"2017","unstructured":"Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2017). STFDR: Architecture of competent protocol for efficient route discovery and reliable transmission in CEAACK MANETs. Wireless Personal Communications, 97(4), 5817\u20135839.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"5835_CR22","doi-asserted-by":"publisher","first-page":"5897","DOI":"10.1007\/s11277-017-4817-8","volume":"97","author":"J Sathiamoorthy","year":"2017","unstructured":"Sathiamoorthy, J., & Ramakrishnan, B. (2017). A reliable data transmission in EAACK MANETs using hybrid three-tier competent fuzzy cluster algorithm. Springer Journal of Wireless Personal Communication, 97(4), 5897\u20135916.","journal-title":"pringer Journal of Wireless Personal Communication"},{"issue":"3","key":"5835_CR23","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.1109\/TIE.2012.2196010","volume":"60","author":"EM Shakshuki","year":"2013","unstructured":"Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK\u2014A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics, 60(3), 1089\u20131098.","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"5835_CR24","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2011.020119","author":"CK Nayak","year":"2011","unstructured":"Nayak, C. K., Abani Kumar, G. K., Parida, K., & Das, S. (2011). Detection of routing misbehavior in MANET with 2ACK scheme. International Journal of Advanced Computer Science and Applications. https:\/\/doi.org\/10.14569\/IJACSA.2011.020119 .","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"5835_CR25","unstructured":"Balakrishna, R., Reddy, M. M., Rao, U. R., & Ramachanndra, G. A. (2009). Detection of routing minbehavior in MANET using 2ACK. In IEEE international advance computing conference (IACC 2009), Patiala, India, 6\u20137 March."},{"key":"5835_CR26","doi-asserted-by":"crossref","unstructured":"Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). A reliable and secure data transmission in CEAACK MANETs using distinct dynamic key with classified digital signature cryptographic algorithm. In IEEE international conference on computing and communications technologies (ICCCT).","DOI":"10.1109\/ICCCT2.2015.7292735"},{"key":"5835_CR27","doi-asserted-by":"publisher","first-page":"64","DOI":"10.5815\/ijcnis.2016.02.08","volume":"2","author":"J Sathiamoorthy","year":"2016","unstructured":"Sathiamoorthy, J., & Ramakrishnan, B. (2016). CEAACK\u2014A reduced acknowledgment for better data transmission for MANETs. International Journal of Computer Network and Information Security, 2, 64\u201371.","journal-title":"International Journal of Computer Network and Information Security"},{"issue":"1","key":"5835_CR28","first-page":"144","volume":"5","author":"J Sathiamoorthy","year":"2015","unstructured":"Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). Design of a competent broadcast algorithm for reliable transmission in CEAACK MANETs. Journal of Network Communications and Emerging Technologies, 5(1), 144\u2013151.","journal-title":"Journal of Network Communications and Emerging Technologies"},{"issue":"7","key":"5835_CR29","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1016\/j.adhoc.2012.04.004","volume":"10","author":"H Taheri","year":"2012","unstructured":"Taheri, H., Neamatollahi, P., Younis, O. M., Naghibzadeh, S., & Yaghmaee, M. H. (2012). An energy-aware distributed clustering protocol in wireless sensor networks using fuzzy logic. Journal of Ad Hoc Networks, 10(7), 1469\u20131481.","journal-title":"Journal of Ad Hoc Networks"},{"issue":"4","key":"5835_CR30","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1016\/j.asoc.2012.12.029","volume":"13","author":"H Bagci","year":"2010","unstructured":"Bagci, H., & Yazici, A. (2010). An energy aware fuzzy unequal clustering algorithm for wireless sensor networks. Applied Soft Computing, 13(4), 1741\u20131749.","journal-title":"Applied Soft Computing"},{"key":"5835_CR31","unstructured":"Sathiamoorthy, J., & Ramakrishnan, B. (2017). A competent three-tier fuzzy cluster algorithm for enhanced data transmission in cluster EAACK MANETs. Springer Soft Computing, 11 July 2017 (Online)."},{"key":"5835_CR32","unstructured":"Sathiamoorthy, J., & Ramakrishnan, B. (2016). Energy and delay efficient dynamic cluster formation using improved ant colony optimization algorithm in EAACK MANETs. Springer Journal of Wireless Personal Communication, 1\u2013122."},{"key":"5835_CR33","unstructured":"Sathiamoorthy, J., & Ramakrishnan, B. (2015). Energy and delay efficient dynamic cluster formation using hybrid AGA with FACO in EAACK. Springer Journal of Wireless Networks, 1\u201315."},{"issue":"9","key":"5835_CR34","doi-asserted-by":"publisher","first-page":"2891","DOI":"10.1109\/JSEN.2012.2204737","volume":"12","author":"JS Lee","year":"2012","unstructured":"Lee, J. S., & Cheng, W. L. (2012). Fuzzy-logic-based clustering approach for wireless sensor networks using energy predication. IEEE Sensors Journal, 12(9), 2891\u20132897.","journal-title":"IEEE Sensors Journal"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5835-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5835-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5835-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T18:16:58Z","timestamp":1661278618000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5835-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,15]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["5835"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5835-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,15]]},"assertion":[{"value":"15 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}