{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T05:58:55Z","timestamp":1774159135882,"version":"3.50.1"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T00:00:00Z","timestamp":1574640000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T00:00:00Z","timestamp":1574640000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s11277-019-06969-9","type":"journal-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T18:02:37Z","timestamp":1574704957000},"page":"1999-2022","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["A Novel SVM Based IDS for Distributed Denial of Sleep Strike in Wireless Sensor Networks"],"prefix":"10.1007","volume":"111","author":[{"given":"Noor","family":"Mohd","sequence":"first","affiliation":[]},{"given":"Annapurna","family":"Singh","sequence":"additional","affiliation":[]},{"given":"H. S.","family":"Bhadauria","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,25]]},"reference":[{"key":"6969_CR1","doi-asserted-by":"crossref","unstructured":"Manju, V. C., Lekha, S. S., & Kumar, M. S. (2013). Mechanisms for detecting and preventing denial of sleep attacks on wireless sensor networks. In\u00a02013 IEEE conference on information & communication technologies\u00a0(pp. 74\u201377). IEEE.","DOI":"10.1109\/CICT.2013.6558065"},{"issue":"1","key":"6969_CR2","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/TVT.2008.921621","volume":"58","author":"DR Raymond","year":"2008","unstructured":"Raymond, D. R., Marchany, R. C., Brownfield, M. I., & Midkiff, S. F. (2008). Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Transactions on Vehicular Technology,58(1), 367\u2013380.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"6969_CR3","doi-asserted-by":"crossref","unstructured":"Frunza, M., & Scripcariu, L. (2007). Improved RSA encryption algorithm for increased security of wireless networks. In\u00a02007 International symposium on signals, circuits and systems\u00a0(Vol. 2, pp. 1\u20134). IEEE.","DOI":"10.1109\/ISSCS.2007.4292737"},{"key":"6969_CR4","doi-asserted-by":"crossref","unstructured":"Udgata, S. K., Mubeen, A., & Sabat, S. L. (2011). Wireless sensor network security model using zero knowledge protocol. In\u00a02011 IEEE international conference on communications (ICC)\u00a0(pp. 1\u20135). IEEE.","DOI":"10.1109\/icc.2011.5963368"},{"key":"6969_CR5","doi-asserted-by":"crossref","unstructured":"Noroozi, E., & Kadivar, J. (2010). Energy analysis for wireless sensor networks. In\u00a02010 2nd international conference on mechanical and electronics engineering\u00a0(Vol. 2, pp. V2\u2013382). IEEE.","DOI":"10.1109\/ICMEE.2010.5558401"},{"key":"6969_CR6","doi-asserted-by":"crossref","unstructured":"Raymond, D. R., & Midkiff, S. F. (2007). Clustered adaptive rate limiting: Defeating denial-of-sleep attacks in wireless sensor networks. In\u00a0MILCOM 2007-IEEE military communications conference\u00a0(pp. 1\u20137). IEEE.","DOI":"10.1109\/MILCOM.2007.4455251"},{"issue":"2","key":"6969_CR7","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/TMC.2011.274","volume":"12","author":"EY Vasserman","year":"2011","unstructured":"Vasserman, E. Y., & Hopper, N. (2011). Vampire attacks: Draining life from wireless ad hoc sensor networks. IEEE Transactions on Mobile Computing,12(2), 318\u2013332.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"6969_CR8","doi-asserted-by":"crossref","unstructured":"Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: a defense against wormhole attacks in wireless networks. In\u00a0IEEE INFOCOM 2003. Twenty-second annual joint conference of the ieee computer and communications societies (IEEE Cat. No. 03CH37428)\u00a0(Vol. 3, pp. 1976\u20131986). IEEE.","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"6969_CR9","doi-asserted-by":"crossref","unstructured":"Peres, M., Chalouf, M. A., & Krief, F. (2011). On optimizing energy consumption: An adaptative authentication level in wireless sensor networks. In\u00a0Global information infrastructure symposium-GIIS 2011 (pp. 1\u20138). IEEE.","DOI":"10.1109\/GIIS.2011.6026718"},{"issue":"6","key":"6969_CR10","doi-asserted-by":"publisher","first-page":"3590","DOI":"10.1109\/JSEN.2015.2395442","volume":"15","author":"CT Hsueh","year":"2015","unstructured":"Hsueh, C. T., Wen, C. Y., & Ouyang, Y. C. (2015). A secure scheme against power exhausting attacks in hierarchical wireless sensor networks. IEEE Sensors Journal,15(6), 3590\u20133602.","journal-title":"IEEE Sensors Journal"},{"key":"6969_CR11","doi-asserted-by":"crossref","unstructured":"Ebinger, P., & Bi\u00dfmeyer, N. (2009). TEREC: Trust evaluation and reputation exchange for cooperative intrusion detection in MANETs. In 2009 seventh annual communication networks and services research conference (pp. 378\u2013385). IEEE.","DOI":"10.1109\/CNSR.2009.65"},{"key":"6969_CR12","doi-asserted-by":"crossref","unstructured":"Zheng, S., & Baras, J. S. (2011). Trust-assisted anomaly detection and localization in wireless sensor networks. In 2011 8th annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (pp. 386\u2013394). IEEE.","DOI":"10.1109\/SAHCN.2011.5984922"},{"key":"6969_CR13","unstructured":"Mao, Y. (2010). A semantic-based intrusion detection framework for wireless sensor network. In\u00a0INC2010: 6th international conference on networked computing (pp. 1\u20135). IEEE."},{"key":"6969_CR14","doi-asserted-by":"crossref","unstructured":"Misra, S., Krishna, P. V., & Abraham, K. I. (2010). Energy efficient learning solution for intrusion detection in wireless sensor networks. In\u00a02010 2nd international conference on communication systems and networks (COMSNETS 2010)\u00a0(pp. 1\u20136). IEEE.","DOI":"10.1109\/COMSNETS.2010.5431976"},{"issue":"2","key":"6969_CR15","first-page":"107","volume":"12","author":"GV Crosby","year":"2011","unstructured":"Crosby, G. V., Hester, L., & Pissinou, N. (2011). Location-aware, trust-based detection and isolation of compromised nodes in wireless sensor networks. IJ Network Security,12(2), 107\u2013117.","journal-title":"IJ Network Security"},{"issue":"3","key":"6969_CR16","first-page":"335","volume":"5","author":"RC Chen","year":"2010","unstructured":"Chen, R. C., Hsieh, C. F., & Huang, Y. F. (2010). An isolation intrusion detection system for hierarchical wireless sensor networks. JNW,5(3), 335\u2013342.","journal-title":"JNW"},{"key":"6969_CR17","unstructured":"Chen, R. C., Haung, Y. F., & Hsieh, C. F. (2010). Ranger intrusion detection system for wireless sensor networks with Sybil attack based on ontology. In\u00a0New aspects of applied informatics, biomedical electronics and informatics and communications."},{"issue":"3","key":"6969_CR18","doi-asserted-by":"publisher","first-page":"102","DOI":"10.5121\/ijnsa.2010.2307","volume":"2","author":"MSI Mamun","year":"2010","unstructured":"Mamun, M. S. I., & Kabir, A. S. (2010). Hierarchical design based intrusion detection system for wireless ad hoc sensor network. International Journal of Network Security & Its Applications (IJNSA),2(3), 102\u2013117.","journal-title":"International Journal of Network Security & Its Applications (IJNSA)"},{"key":"6969_CR19","unstructured":"Yan, K. Q., Wang, S. C., & Liu, C. W. (2009). A hybrid intrusion detection system of cluster-based wireless sensor networks. In\u00a0Proceedings of the international multiconference of engineers and computer scientists\u00a0(Vol. 1, pp. 18\u201320)."},{"key":"6969_CR20","unstructured":"Atakli, I. M., Hu, H., Chen, Y., Ku, W. S., & Su, Z. (2008). Malicious node detection in wireless sensor networks using weighted trust evaluation. In\u00a0Proceedings of the 2008 Spring simulation multiconference\u00a0(pp. 836\u2013843). Society for Computer Simulation International."},{"key":"6969_CR21","unstructured":"Huo, G., & Wang, X. (2008). DIDS: A dynamic model of intrusion detection system in wireless sensor networks. In\u00a02008 international conference on information and automation\u00a0(pp. 374\u2013378). IEEE."},{"key":"6969_CR22","doi-asserted-by":"crossref","unstructured":"Techateerawat, P., & Jennings, A. (2006). Energy efficiency of intrusion detection systems in wireless sensor networks. In\u00a02006 IEEE\/WIC\/ACM international conference on web intelligence and intelligent agent technology workshops (pp. 227\u2013230). IEEE.","DOI":"10.1109\/WI-IATW.2006.65"},{"key":"6969_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, Y., & Lee, W. (2000). Intrusion detection in wireless ad-hoc networks. In\u00a0Proceedings of the 6th annual international conference on mobile computing and networking\u00a0(pp. 275\u2013283). ACM.","DOI":"10.1145\/345910.345958"},{"key":"6969_CR24","doi-asserted-by":"crossref","unstructured":"Bhargava, S., & Agrawal, D. P. (2001). Security enhancements in AODV protocol for wireless ad hoc networks. In\u00a0IEEE 54th vehicular technology conference. VTC Fall 2001. Proceedings (Cat. No. 01CH37211)\u00a0(Vol. 4, pp. 2143\u20132147). IEEE.","DOI":"10.1109\/VTC.2001.957123"},{"key":"6969_CR25","doi-asserted-by":"crossref","unstructured":"Huang, Y. A., & Lee, W. (2003). A cooperative intrusion detection system for ad hoc networks. In\u00a0Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks\u00a0(pp. 135\u2013147). ACM.","DOI":"10.1145\/986858.986877"},{"issue":"2","key":"6969_CR26","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s41870-018-0225-x","volume":"11","author":"Y Hamid","year":"2019","unstructured":"Hamid, Y., Shah, F. A., & Sugumaran, M. (2019). Wavelet neural network model for network intrusion detection system. International Journal of Information Technology,11(2), 251\u2013263.","journal-title":"International Journal of Information Technology"},{"issue":"2","key":"6969_CR27","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/s11036-008-0145-2","volume":"14","author":"C Song","year":"2009","unstructured":"Song, C., & Zhang, Q. (2009). OMH\u2013suppressing selfish behavior in ad hoc networks with one more hop. Mobile Networks and Applications,14(2), 178\u2013187.","journal-title":"Mobile Networks and Applications"},{"key":"6969_CR28","unstructured":"Yan, Z., Zhang, P., & Virtanen, T. (2003). Trust evaluation based security solution in ad hoc networks. In\u00a0Proceedings of the 7th Nordic workshop on secure IT systems\u00a0(Vol. 14)."},{"key":"6969_CR29","doi-asserted-by":"crossref","unstructured":"Razak, S. A., Furnell, S., Clarke, N., & Brooke, P. (2006). A two-tier intrusion detection system for mobile ad hoc networks\u2013a friend approach. In\u00a0International conference on intelligence and security informatics\u00a0(pp. 590\u2013595). Springer, Berlin.","DOI":"10.1007\/11760146_62"},{"key":"6969_CR30","doi-asserted-by":"crossref","unstructured":"Rebahi, Y., Mujica-V, V. E., & Sisalem, D. (2005). A reputation-based trust mechanism for ad hoc networks. In\u00a010th IEEE symposium on computers and communications (ISCC\u201905)\u00a0(pp. 37\u201342). IEEE.","DOI":"10.1109\/ISCC.2005.17"},{"issue":"7","key":"6969_CR31","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.1016\/j.adhoc.2007.11.004","volume":"6","author":"SA Razak","year":"2008","unstructured":"Razak, S. A., Furnell, S. M., Clarke, N. L., & Brooke, P. J. (2008). Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Networks,6(7), 1151\u20131167.","journal-title":"Ad Hoc Networks"},{"key":"6969_CR32","unstructured":"Eschenauer, L., Gligor, V. D., & Baras, J. (2002). On trust establishment in mobile ad-hoc networks. In\u00a0International workshop on security protocols\u00a0(pp. 47\u201366). Springer, Berlin."},{"key":"6969_CR33","doi-asserted-by":"crossref","unstructured":"Razak, S. A., Samian, N., & Maarof, M. A. (2008). A friend mechanism for mobile ad hoc networks. In\u00a02008 The 4th international conference on information assurance and security\u00a0(pp. 243\u2013248). IEEE.","DOI":"10.1109\/IAS.2008.27"},{"issue":"3\u20134","key":"6969_CR34","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.peva.2007.05.004","volume":"65","author":"J Mundinger","year":"2008","unstructured":"Mundinger, J., & Le Boudec, J. Y. (2008). Analysis of a reputation system for mobile ad-hoc networks with liars. Performance Evaluation,65(3\u20134), 212\u2013226.","journal-title":"Performance Evaluation"},{"issue":"4","key":"6969_CR35","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1109\/JAS.2016.7510178","volume":"4","author":"M Agarwal","year":"2016","unstructured":"Agarwal, M., Purwar, S., Biswas, S., & Nandi, S. (2016). Intrusion detection system for PS-Poll DoS attack in 802.11 networks using real time discrete event system. IEEE\/CAA Journal of Automatica Sinica,4(4), 792\u2013808.","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"issue":"2","key":"6969_CR36","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1109\/JIOT.2016.2557487","volume":"4","author":"L Shen","year":"2016","unstructured":"Shen, L., Ma, J., Liu, X., Wei, F., & Miao, M. (2016). A secure and efficient id-based aggregate signature scheme for wireless sensor networks. IEEE Internet of Things Journal,4(2), 546\u2013554.","journal-title":"IEEE Internet of Things Journal"},{"key":"6969_CR37","volume-title":"Machine learning and data mining; methods and applications","author":"RS Michalski","year":"1998","unstructured":"Michalski, R. S., Bratko, I., & Bratko, A. (1998). Machine learning and data mining; methods and applications. New York: Wiley."},{"issue":"10","key":"6969_CR38","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"CF Tsai","year":"2009","unstructured":"Tsai, C. F., Hsu, Y. F., Lin, C. Y., & Lin, W. Y. (2009). Intrusion detection by machine learning: A review. Expert Systems with Applications,36(10), 11994\u201312000.","journal-title":"Expert Systems with Applications"},{"key":"6969_CR39","volume-title":"Pattern recognition","author":"S Theodoridis","year":"2006","unstructured":"Theodoridis, S., & Koutroumbas, K. (2006). Pattern recognition (3rd ed.). Orlando, FL: Academic Press Inc.","edition":"3"},{"issue":"3","key":"6969_CR40","first-page":"11","volume":"18","author":"TM Mitchell","year":"1997","unstructured":"Mitchell, T. M. (1997). Does machine learning really work? AI Magazine,18(3), 11.","journal-title":"AI Magazine"},{"issue":"13","key":"6969_CR41","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1016\/j.patrec.2007.05.018","volume":"28","author":"S Manocha","year":"2007","unstructured":"Manocha, S., & Girolami, M. A. (2007). An empirical analysis of the probabilistic K-nearest neighbour classifier. Pattern Recognition Letters,28(13), 1818\u20131824.","journal-title":"Pattern Recognition Letters"},{"key":"6969_CR42","unstructured":"Hassoun, M. H. (1996). Fundamentals of artificial neural networks. In\u00a0Proceedings of the IEEE, New York."},{"issue":"5","key":"6969_CR43","doi-asserted-by":"publisher","first-page":"988","DOI":"10.1109\/72.788640","volume":"10","author":"VN Vapnik","year":"1999","unstructured":"Vapnik, V. N. (1999). An overview of statistical learning theory. IEEE Transactions on Neural Networks,10(5), 988\u2013999.","journal-title":"IEEE Transactions on Neural Networks"},{"issue":"4","key":"6969_CR44","first-page":"101","volume":"6","author":"LA Maglaras","year":"2015","unstructured":"Maglaras, L. A. (2015). A novel distributed intrusion detection system for vehicular ad hoc networks. International Journal of Advanced Computer Science and Applications (IJACSA),6(4), 101\u2013106.","journal-title":"International Journal of Advanced Computer Science and Applications (IJACSA)"},{"key":"6969_CR45","unstructured":"Tiwari, A. (2019). Real-time intrusion detection system using computational intelligence and neural network: Review, analysis and anticipated solution of machine learning. In Information technology and applied mathematics (pp. 153\u2013161). Singapore: Springer."},{"issue":"1","key":"6969_CR46","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s00500-014-1511-6","volume":"20","author":"FA Narudin","year":"2016","unstructured":"Narudin, F. A., Feizollah, A., Anuar, N. B., & Gani, A. (2016). Evaluation of machine learning classifiers for mobile malware detection. Soft Computing,20(1), 343\u2013357.","journal-title":"Soft Computing"},{"issue":"4","key":"6969_CR47","doi-asserted-by":"publisher","first-page":"2595","DOI":"10.1109\/COMST.2018.2846401","volume":"20","author":"Q Mao","year":"2018","unstructured":"Mao, Q., Hu, F., & Hao, Q. (2018). Deep learning for intelligent wireless networks: A comprehensive survey. IEEE Communications Surveys & Tutorials,20(4), 2595\u20132621.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"6969_CR48","doi-asserted-by":"publisher","first-page":"52843","DOI":"10.1109\/ACCESS.2018.2869577","volume":"6","author":"M Al-Qatf","year":"2018","unstructured":"Al-Qatf, M., Lasheng, Y., Al-Habib, M., & Al-Sabahi, K. (2018). Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access,6, 52843\u201352856.","journal-title":"IEEE Access"},{"key":"6969_CR49","doi-asserted-by":"crossref","unstructured":"Kim, J., Kim, J., Thu, H. L. T., & Kim, H. (2016). Long short term memory recurrent neural network classifier for intrusion detection. In 2016 international conference on platform technology and service (PlatCon) (pp. 1\u20135). IEEE.","DOI":"10.1109\/PlatCon.2016.7456805"},{"issue":"1","key":"6969_CR50","doi-asserted-by":"publisher","first-page":"33","DOI":"10.3141\/1822-05","volume":"1822","author":"S Mukkamala","year":"2003","unstructured":"Mukkamala, S., & Sung, A. H. (2003). Feature selection for intrusion detection with neural networks and support vector machines. Transportation Research Record,1822(1), 33\u201339.","journal-title":"Transportation Research Record"},{"issue":"2","key":"6969_CR51","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.jnca.2004.01.003","volume":"28","author":"S Mukkamala","year":"2005","unstructured":"Mukkamala, S., Sung, A. H., & Abraham, A. (2005). Intrusion detection using an ensemble of intelligent paradigms. Journal of Network and Computer Applications,28(2), 167\u2013182.","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"6969_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.epsr.2004.07.008","volume":"74","author":"LV Ganyun","year":"2005","unstructured":"Ganyun, L. V., Haozhong, C., Haibao, Z., & Lixin, D. (2005). Fault diagnosis of power transformer based on multi-layer SVM classifier. Electric Power Systems Research,74(1), 1\u20137.","journal-title":"Electric Power Systems Research"},{"issue":"1","key":"6969_CR53","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.compbiomed.2005.11.002","volume":"37","author":"E \u00c7omak","year":"2007","unstructured":"\u00c7omak, E., Arslan, A., & T\u00fcrko\u011flu, \u0130. (2007). A decision support system based on support vector machines for diagnosis of the heart valve diseases. Computers in Biology and Medicine,37(1), 21\u201327.","journal-title":"Computers in Biology and Medicine"},{"issue":"3","key":"6969_CR54","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1109\/TFUZZ.2006.882464","volume":"15","author":"SM Zhou","year":"2007","unstructured":"Zhou, S. M., & Gan, J. Q. (2007). Constructing L2-SVM-based fuzzy classifiers in high-dimensional space with automatic model selection and fuzzy rule ranking. IEEE Transactions on Fuzzy Systems,15(3), 398\u2013409.","journal-title":"IEEE Transactions on Fuzzy Systems"},{"issue":"1","key":"6969_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TFUZZ.2003.817839","volume":"12","author":"JH Chiang","year":"2004","unstructured":"Chiang, J. H., & Hao, P. Y. (2004). Support vector learning mechanism for fuzzy rule-based modeling: A new approach. IEEE Transactions on Fuzzy Systems,12(1), 1\u201312.","journal-title":"IEEE Transactions on Fuzzy Systems"},{"issue":"3","key":"6969_CR56","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., & Vapnik, V. (1995). Support-vector networks. Machine Learning,20(3), 273\u2013297.","journal-title":"Machine Learning"},{"issue":"9","key":"6969_CR57","doi-asserted-by":"publisher","first-page":"68","DOI":"10.4304\/jsw.3.9.68-76","volume":"3","author":"SB Shamsuddin","year":"2008","unstructured":"Shamsuddin, S. B., & Woodward, M. E. (2008). Applying knowledge discovery in database techniques in modeling packet header anomaly intrusion detection systems. Journal of Software,3(9), 68\u201376.","journal-title":"Journal of Software"},{"key":"6969_CR58","doi-asserted-by":"crossref","unstructured":"Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A., & Srivastava, J. (2003). A comparative study of anomaly detection schemes in network intrusion detection. In Proceedings of the 2003 SIAM international conference on data mining (pp. 25\u201336). Society for Industrial and Applied Mathematics.","DOI":"10.1137\/1.9781611972733.3"},{"key":"6969_CR59","doi-asserted-by":"crossref","unstructured":"Wang, X., Wong, J. S., Stanley, F., & Basu, S. (2009). Cross-layer based anomaly detection in wireless mesh networks. In 2009 ninth annual international symposium on applications and the internet (pp. 9\u201315). IEEE.","DOI":"10.1109\/SAINT.2009.11"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06969-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-019-06969-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06969-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T01:08:30Z","timestamp":1606180110000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-019-06969-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,25]]},"references-count":59,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["6969"],"URL":"https:\/\/doi.org\/10.1007\/s11277-019-06969-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,25]]},"assertion":[{"value":"25 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}