{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:58Z","timestamp":1740122698476,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T00:00:00Z","timestamp":1586476800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T00:00:00Z","timestamp":1586476800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Chongqing Basic Science and Frontier Technology Research Project","award":["cstc2017jcyjBX0047"],"award-info":[{"award-number":["cstc2017jcyjBX0047"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11277-020-07308-z","type":"journal-article","created":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T08:03:45Z","timestamp":1586505825000},"page":"2079-2106","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cluster-head Centered Fast Secure Routing based on Game theory for Device-to-Device Communication"],"prefix":"10.1007","volume":"113","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0301-3574","authenticated-orcid":false,"given":"Yimin","family":"Lv","sequence":"first","affiliation":[]},{"given":"Wenjiang","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Aowen","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Xiaolong","family":"Bao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,10]]},"reference":[{"key":"7308_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-012-0179-x","author":"D Amopoulos","year":"2012","unstructured":"Amopoulos, D., Kambourakis, G., Gritzalis, S., et al. (2012). Exposing mobile malware from the inside (or what is your mobile app really doing?). Peer-to-Peer Networking and Applications. https:\/\/doi.org\/10.1007\/s12083-012-0179-x.","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"7308_CR2","unstructured":"Chen, Z., & Kountouris, M. (2016). D2D caching versus small cell caching: Where to cache content in a wireless network? In 2016 IEEE 17th international workshop on signal processing advances in wireless communications (SPAWC), Edinburgh, pp. 1\u20136."},{"key":"7308_CR3","unstructured":"Chengetanai, G. (2018). Minimising black hole attacks to enhance security in wireless mobile ad hoc networks. In 2018 IST-Africa week conference (IST-Africa), (pp. 1\u20137) Gaborone."},{"key":"7308_CR4","doi-asserted-by":"publisher","unstructured":"Damopoulos, D., Kambourakis, G., & Portokalidis, G. (2014). The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based ids for smartphones. In Proceedings of the 7th European workshop on system security, (pp. 1\u20136) Amsterdam. https:\/\/doi.org\/10.1145\/2592791.2592797.","DOI":"10.1145\/2592791.2592797"},{"key":"7308_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/sec.341","author":"D Damopoulos","year":"2011","unstructured":"Damopoulos, D., Menesidou, S. A., Kambourakis, G., Papadaki, M., Clarke, N., & Gritzalis, S. (2011). Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers. Security and Communication Networks. https:\/\/doi.org\/10.1002\/sec.341.","journal-title":"Security and Communication Networks"},{"key":"7308_CR6","doi-asserted-by":"publisher","unstructured":"Elmahdi, E., Yoo, S., & Sharshembiev, K. (2018). Securing data forwarding against blackhole attacks in mobile ad hoc networks. In\u00a02018 IEEE 8th annual computing and communication workshop and conference (CCWC), (pp. 463\u2013467) Las Vegas. https:\/\/doi.org\/10.1109\/CCWC.2018.8301683.","DOI":"10.1109\/CCWC.2018.8301683"},{"issue":"5","key":"7308_CR7","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1109\/tmc.2006.68","volume":"5","author":"M Felegyhazi","year":"2006","unstructured":"Felegyhazi, M., Hubaux, J., & Buttyan, L. (2006). Nash equilibria of packet forwarding strategies in wireless ad hoc networks. IEEE Transactions on Mobile Computing,5(5), 463\u2013476. https:\/\/doi.org\/10.1109\/tmc.2006.68.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"7308_CR8","doi-asserted-by":"publisher","unstructured":"Felt, A.P., Finifter, M., Chin, E., Hanna, S., & Wagner, D. (2011). A survey of mobile malware in the wild. In Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices, (pp. 3\u201314), Chicago, Illinois. https:\/\/doi.org\/10.1145\/2046614.2046618.","DOI":"10.1145\/2046614.2046618"},{"key":"7308_CR9","doi-asserted-by":"publisher","unstructured":"Gadekar, S., & Kadam, S. (2017). Secure optimized link state routing (OLSR) protocol against node isolation attack. In\u00a02017 IEEE international conference on power, control, signals and instrumentation engineering (ICPCSI), (pp. 684\u2013687) Chennai. https:\/\/doi.org\/10.1109\/icpcsi.2017.8391800.","DOI":"10.1109\/icpcsi.2017.8391800"},{"key":"7308_CR10","doi-asserted-by":"publisher","unstructured":"Gaikwad, K. S., & Waykar, S. B. (2017). Detection and removal of node isolation attack in OLSR protocol using imaginary nodes with neighbour response in MANET. In:\u00a02017 international conference on computing, communication, control and automation (ICCUBEA), (pp. 1\u20135) Pune. https:\/\/doi.org\/10.1109\/iccubea.2017.8463762.","DOI":"10.1109\/iccubea.2017.8463762"},{"issue":"2","key":"7308_CR11","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1109\/COMST.2017.2649687","volume":"19","author":"M Haus","year":"2017","unstructured":"Haus, M., Waqas, M., Ding, A. Y., Li, Y., Tarkoma, S., & Ott, J. (2017). Security and privacy in device-to-device (D2D) communication: A Review. IEEE Communications Surveys & Tutorials,19(2), 1054\u20131079.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"1","key":"7308_CR12","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1109\/JIOT.2019.2951509","volume":"7","author":"L Li","year":"2020","unstructured":"Li, L., et al. (2020). Deep reinforcement learning approaches for content caching in cache-enabled D2D networks. IEEE Internet of Things Journal,7(1), 544\u2013557.","journal-title":"IEEE Internet of Things Journal"},{"key":"7308_CR13","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-319-12601-2_11","volume-title":"Decision and game theory for security, GameSec 2014. Lecture Notes in Computer Science","author":"E Panaousis","year":"2014","unstructured":"Panaousis, E., Alpcan, T., Fereidooni, H., & Conti, M. (2014). Secure message delivery games for device-to-device communications. In R. Poovendran & W. Saad (Eds.), Decision and game theory for security, GameSec 2014. Lecture Notes in Computer Science (vol. 8840, pp. 195\u2013215), Cham: Springer. https:\/\/doi.org\/10.1007\/978-3-319-12601-2_11."},{"key":"7308_CR14","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.adhoc.2016.11.008","volume":"56","author":"E Panaousis","year":"2017","unstructured":"Panaousis, E., Karapistoli, E., Elsemary, H., Alpcan, T., Khuzani, M., & Economides, A. A. (2017). Game theoretic path selection to support security in device-to-device communications. Ad Hoc Networks,56, 28\u201342.","journal-title":"Ad Hoc Networks"},{"key":"7308_CR15","doi-asserted-by":"publisher","unstructured":"Papaleo, G., Cambiaso, E., Patti L., & Aiello, M. (2016). Malware development on mobile environments. In 2016 IEEE 4th international conference on future Internet of Things and cloud workshops (FiCloudW), (pp. 270\u2013275), Vienna. https:\/\/doi.org\/10.1109\/w-ficloud.2016.62.","DOI":"10.1109\/w-ficloud.2016.62"},{"issue":"1","key":"7308_CR16","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/JCN.2015.000012","volume":"17","author":"B Paramasivan","year":"2015","unstructured":"Paramasivan, B., Prakash, M. J. V., & Kaliappan, M. (2015). Development of a secure routing protocol using game theory model in mobile ad hoc networks. Journal of Communications and Networks,17(1), 75\u201383. https:\/\/doi.org\/10.1109\/JCN.2015.000012.","journal-title":"Journal of Communications and Networks"},{"issue":"7","key":"7308_CR17","first-page":"1","volume":"37","author":"Z Qian","year":"2016","unstructured":"Qian, Z., & Wang, X. (2016). Overview of D2D technologies for 5G communication networks. Journal on Communications,37(7), 1\u201314.","journal-title":"Journal on Communications"},{"issue":"1","key":"7308_CR18","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/TDSC.2016.2536605","volume":"15","author":"A Saracino","year":"2018","unstructured":"Saracino, A., Sgandurra, D., Dini, G., & Martinelli, F. (2018). MADAM: Effective and efficient behavior-based android malware detection and prevention. IEEE Transactions on Dependable and Secure Computing,15(1), 83\u201397. https:\/\/doi.org\/10.1109\/TDSC.2016.2536605.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"7308_CR19","doi-asserted-by":"publisher","unstructured":"Sharma, S., Jain, A., & Gupta, N. (2016). Modified ZRP to identify cooperative attacks. In 2016 Second international conference on computational intelligence and communication technology (CICT), (pp. 302\u2013307) Ghaziabad. https:\/\/doi.org\/10.1109\/cict.2016.66.","DOI":"10.1109\/cict.2016.66"},{"key":"7308_CR20","doi-asserted-by":"crossref","unstructured":"Shiroma, T., Nakajima, T., Wu, C., & Yoshinaga, T. (2017). A light-weight cooperative caching strategy by D2D content sharing. In 2017 Fifth international symposium on computing and networking (CANDAR), Aomori, pp. 159\u2013165.","DOI":"10.1109\/CANDAR.2017.76"},{"issue":"2","key":"7308_CR21","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1109\/SURV.2013.101613.00077","volume":"16","author":"G Suarez-Tangil","year":"2013","unstructured":"Suarez-Tangil, G., Tapiador, J. E., Peris-Lopez, P., & Ribagorda, A. (2013). Evolution, detection and analysis of malware for smart devices. IEEE Communications Surveys & Tutorials.,16(2), 961\u2013987. https:\/\/doi.org\/10.1109\/SURV.2013.101613.00077.","journal-title":"IEEE Communications Surveys & Tutorials."},{"key":"7308_CR22","doi-asserted-by":"publisher","unstructured":"Sun, M., Zheng Lui, M., John C. S., & Jiang, X. (2014). Design and implementation of an android host-based intrusion prevention system. In Proceedings of the 30th annual computer security applications conference, (pp. 226\u2013235) New Orleans, Louisiana. https:\/\/doi.org\/10.1145\/2664243.2664245.","DOI":"10.1145\/2664243.2664245"},{"key":"7308_CR23","unstructured":"von Neumann, J., Morgenstern, O., Kuhn, H., et al. (2019) Theory of Game-s and economic behavior. In 60th Anniversary Commemorative Edition. Princeton: Princeton University Press. Retrieved 16 December 2019, from https:\/\/www.de-gruyter.com\/view\/product\/451360."},{"issue":"2","key":"7308_CR24","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1109\/TIFS.2007.897270","volume":"2","author":"W Yu","year":"2007","unstructured":"Yu, W., Ji, Z., & Liu, K. J. R. (2007). Securing cooperative ad-hoc networks under noise and imperfect monitoring: strategies and game theoretic analysis. IEEE Transactions on Information Forensics and Security,2(2), 240\u2013253. https:\/\/doi.org\/10.1109\/TIFS.2007.897270.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"5","key":"7308_CR25","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/tmc.2007.1026","volume":"6","author":"W Yu","year":"2007","unstructured":"Yu, W., & Liu, K. J. R. (2007). Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks. IEEE Transactions on Mobile Computing,6(5), 507\u2013521. https:\/\/doi.org\/10.1109\/tmc.2007.1026.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"2","key":"7308_CR26","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1109\/TIFS.2008.922453","volume":"3","author":"W Yu","year":"2008","unstructured":"Yu, W., & Liu, K. J. R. (2008). Secure cooperation in autonomous mobile ad-hoc networks under noise and imperfect monitoring: A game-theoretic approach. IEEE Transactions on Information Forensics and Security,3(2), 317\u2013330. https:\/\/doi.org\/10.1109\/TIFS.2008.922453.","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07308-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07308-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07308-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T23:05:52Z","timestamp":1618009552000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07308-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,10]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["7308"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07308-z","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2020,4,10]]},"assertion":[{"value":"10 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}