{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:17:30Z","timestamp":1761621450563,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s11277-019-06512-w","type":"journal-article","created":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T02:35:56Z","timestamp":1557801356000},"page":"2117-2135","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Malicious Cluster Head Detection Mechanism in Wireless Sensor Networks"],"prefix":"10.1007","volume":"108","author":[{"given":"Asima","family":"Ismail","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3143-689X","authenticated-orcid":false,"given":"Rashid","family":"Amin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"issue":"1","key":"6512_CR1","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/TMC.2012.227","volume":"13","author":"J Tang","year":"2014","unstructured":"Tang, J., Cheng, Y., & Zhuang, W. (2014). Real-time misbehavior detection in IEEE 802.11-based wireless networks: An analytical approach. IEEE Transactions on Mobile Computing,\n                           13(1), 146\u2013158.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"12","key":"6512_CR2","doi-asserted-by":"publisher","first-page":"4103","DOI":"10.1002\/dac.2601","volume":"27","author":"N Tcholtcheu","year":"2014","unstructured":"Tcholtcheu, N., & Schieferdecker, I. (2014). Framework for distributed autonomic self-healing in fixed IPv6 networks. International Journal of Communication Systems,\n                           27(12), 4103\u20134125.","journal-title":"International Journal of Communication Systems"},{"key":"6512_CR3","unstructured":"Lu, S. et al. (2006). Robust rate adaptation for 802.11 wireless networks. In Proceedings of the 12th annual international conference on mobile computing and networking (pp. 146\u2013157). Los Angeles, CA."},{"key":"6512_CR4","unstructured":"Vishnu Balan, E., Priyan, M. K., Gokulnath, C., & Usha Devi, G. (2015). Hybrid architecture with misuse and anomaly detection techniques for wireless networl. In: This full-text paper was peer-reviewed and accepted to be presented at the IEEE ICCSP 2015 conference."},{"key":"6512_CR5","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1883612.1883615","volume":"43","author":"G Urdaneta","year":"2011","unstructured":"Urdaneta, G., Pierre, G., & van Steen, M. (2011). A survey of DHT security techniques. ACM Computing Surveys,\n                           43, 2. \n                    https:\/\/doi.org\/10.1145\/1883612.1883615\n                    \n                  .","journal-title":"ACM Computing Surveys"},{"key":"6512_CR6","unstructured":"Li, G. Y. (2015). Adaptive and opportunistic QoS-based routing protocol in VANETs. Networking and Internet Architecture [cs.NI]. Universit\u00e9 Paris Sud - Paris XI, English."},{"issue":"5","key":"6512_CR7","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/65.730751","volume":"12","author":"K.A. Bradley","year":"1998","unstructured":"Bradley, K. A.et. al. (1998). Detecting disruptive routers: A distributed network monitoring approach. In Proc. 1998 symposium on security and privacy (pp. 115\u2013124).","journal-title":"IEEE Network"},{"key":"6512_CR8","doi-asserted-by":"crossref","unstructured":"Hadjiantonis, A. M., & Ellinas, G. (2010). In 2010 Fourth IEEE international conference on towards autonomic wireless networking for the future internet self-adaptive and self-organizing systems workshop (SASOW).","DOI":"10.1109\/SASOW.2010.15"},{"issue":"1","key":"6512_CR9","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/JSYST.2013.2296197","volume":"9","author":"JM Chang","year":"2015","unstructured":"Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C. & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Systems Journal, 9(1), 65\u201375.","journal-title":"IEEE Systems Journal"},{"issue":"1","key":"6512_CR10","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","volume":"16","author":"I Butun","year":"2014","unstructured":"Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials,\n                           16(1), 266\u2013282.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"6512_CR11","doi-asserted-by":"crossref","unstructured":"Doumit, S., et.al. (2003). Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks. In MILCOM 2003 (pp. 609\u2013614).","DOI":"10.1109\/MILCOM.2003.1290173"},{"key":"6512_CR12","doi-asserted-by":"crossref","unstructured":"Karlof, C., et.al. (2004). TinySec: A link layer security architecture for wireless sensor networks. In ACM Sensys 2004 Proceedings. (pp.162\u2013175). Baltimore, USA.","DOI":"10.1145\/1031495.1031515"},{"key":"6512_CR13","unstructured":"Buchegger, S. (2004). Coping with misbehavior in mobile ad hoc networks. PhD Thesis EPFL No. 2935. Accepted Feb 2004."},{"key":"6512_CR14","unstructured":"Kalambe, K. B., & Apte, S. M. (2017). An exhaustive survey on security solutions in MANETS (pp. 124\u2013131)."},{"issue":"6","key":"6512_CR15","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1109\/TIFS.2015.2407326","volume":"10","author":"J Zhou","year":"2015","unstructured":"Zhou, J., Dong, X., Cao, Z., & Vasilakos, A. V. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security,\n                           10(6), 1299\u20131314.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"6512_CR16","doi-asserted-by":"crossref","unstructured":"Albouq, S. S., & Fredericks, E. M. (2017). Lightweight detection and isolation of black hole attacks in connected vehicles. In 2017 IEEE 37th international conference on distributed computing systems workshops (ICDCSW). IEEE.","DOI":"10.1109\/ICDCSW.2017.23"},{"key":"6512_CR17","doi-asserted-by":"crossref","unstructured":"Kasra-Kermanshahi, S., & Salleh, M. (2015). A novel authentication scheme for mobile environments in the context of elliptic curve cryptography. In Computer, communications, and control technology (I4CT), 2015","DOI":"10.1109\/I4CT.2015.7219630"},{"key":"6512_CR18","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-319-40367-0_22","volume-title":"Information Security and Privacy","author":"Kazuhiko Minematsu","year":"2016","unstructured":"Minematsu, K. (2016). Authenticated encryption with small stretch (or, how to accelerate aero). In Australasian Conference on Information Security and Privacy (pp. 347\u2013362). Springer, Cham."},{"issue":"1","key":"6512_CR19","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/JSYST.2012.2188689","volume":"7","author":"K Cho","year":"2013","unstructured":"Cho, K., Jo, M., Kwon, T., & Chen, H. H. (2013). Classification and experimental analysis for clone detection approaches in wireless sensor networks. IEEE Systems Journal,\n                           7(1), 26\u201335.","journal-title":"IEEE Systems Journal"},{"key":"6512_CR20","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.vehcom.2014.05.001","volume":"1","author":"MN Mejri","year":"2014","unstructured":"Mejri, M. N., Ben-Othman, J., & Hamdi, M. (2014). Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications,\n                           1, 53\u201366.","journal-title":"Vehicular Communications"},{"key":"6512_CR21","unstructured":"Du, W. et al. (2005). LAD: Localization anomaly detection for wireless sensor networks. In the 19th international parallel and distributed processing symposium (IPDPS\u201905), April 3\u20138, 2005, Denver, Colorado, USA"},{"issue":"14","key":"6512_CR22","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.comnet.2014.07.016","volume":"73","author":"A Baadache","year":"2014","unstructured":"Baadache, A., & Belmehdi, A. (2014). Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks. Computer Networks,\n                           73(14), 173\u2013184.","journal-title":"Computer Networks"},{"key":"6512_CR23","doi-asserted-by":"crossref","unstructured":"Biagioni, E. (2016). Distributed anonymous computation of social distance. Department of Information and Computer Sciences, University of Hawaii at M\u00afanoa, Honolulu, Hawaii, USA 2016.","DOI":"10.1109\/CCNC.2016.7444741"},{"issue":"Part B","key":"6512_CR24","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.adhoc.2013.08.017","volume":"13","author":"A Nadeem","year":"2014","unstructured":"Nadeem, A., & Howarth, M. P. (2014). An intrusion detection & adaptive response mechanism for MANETs. Ad Hoc Networks,\n                           13(Part B), 368\u2013380.","journal-title":"Ad Hoc Networks"},{"issue":"3","key":"6512_CR25","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1007\/s11277-014-2165-5","volume":"81","author":"U Venkanna","year":"2015","unstructured":"Venkanna, U., Agarwal, J. K., & Velusamy, R. L. (2015). A cooperative routing for MANET based on distributed trust and energy management. Wireless Personal Communications,\n                           81(3), 961\u2013979.","journal-title":"Wireless Personal Communications"},{"key":"6512_CR26","unstructured":"Maheswara Rao, A., Varadarajan, S., & Giri Prasad, M. N. (2012) Cross-Layer Based QoS Routing (CLBQR) Protocol analysis based on data flow for 802.16 WiMAX Networks Communication and Computing (ARTCom2012). In Fourth international conference on advances in recent technologies in 2012."},{"key":"6512_CR27","doi-asserted-by":"crossref","unstructured":"Krishna, S. R. M., Prasad, P. V. K., Ramanath, M. N. S., & Kumari, B. M. (2015) Security in MANET routing tables with FMNK cryptography model. In 2015 International electrical, electronics, signals, communication and optimization (EESCO).","DOI":"10.1109\/EESCO.2015.7254021"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06512-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-019-06512-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06512-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,11]],"date-time":"2020-05-11T23:31:59Z","timestamp":1589239919000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-019-06512-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["6512"],"URL":"https:\/\/doi.org\/10.1007\/s11277-019-06512-w","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"13 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}