{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T19:30:28Z","timestamp":1775935828006,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,6,17]],"date-time":"2020-06-17T00:00:00Z","timestamp":1592352000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,17]],"date-time":"2020-06-17T00:00:00Z","timestamp":1592352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s11277-020-07596-5","type":"journal-article","created":{"date-parts":[[2020,6,17]],"date-time":"2020-06-17T12:02:53Z","timestamp":1592395373000},"page":"725-744","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Prediction of Node and Link Failures in Mobile Ad Hoc Network Using Hello Based Path Recovery Routing Protocol"],"prefix":"10.1007","volume":"115","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7440-8533","authenticated-orcid":false,"given":"Sunil","family":"Kumar","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,17]]},"reference":[{"issue":"4","key":"7596_CR1","doi-asserted-by":"publisher","first-page":"1599","DOI":"10.1007\/s11277-019-06162-y","volume":"105","author":"P Sra","year":"2019","unstructured":"Sra, P., & Chand, S. (2019). QoS in mobile ad-hoc networks. Wireless Personal Communications, 105(4), 1599\u20131616. https:\/\/doi.org\/10.1007\/s11277-019-06162-y.","journal-title":"Wireless Personal Communications"},{"key":"7596_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-9574-1_6","author":"H Kumar","year":"2020","unstructured":"Kumar, H., et al. (2020). Study and design of route repairing mechanism in MANET. Design Frameworks for Wireless Networks. https:\/\/doi.org\/10.1007\/978-981-13-9574-1_6.","journal-title":"Design Frameworks for Wireless Networks"},{"issue":"3","key":"7596_CR3","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/s41870-018-0246-5","volume":"11","author":"A Banerjee","year":"2019","unstructured":"Banerjee, A., & Ghosh, S. (2019). WEEP: Weight based energy efficient priority scheduling of data packets in mobile ad-hoc networks. International Journal of Information Technology, 11(3), 435\u2013443. https:\/\/doi.org\/10.1007\/s41870-018-0246-5.","journal-title":"International Journal of Information Technology"},{"key":"7596_CR4","doi-asserted-by":"publisher","first-page":"18409","DOI":"10.1109\/ACCESS.2019.2896001","volume":"7","author":"T Poongodi","year":"2019","unstructured":"Poongodi, T., Khan, M. S., Patan, R., Gandomi, A. H., et al. (2019). Robust defense scheme against selective drop attack in wireless ad hoc networks. IEEE Access, 7, 18409\u201318419. https:\/\/doi.org\/10.1109\/ACCESS.2019.2896001.","journal-title":"IEEE Access"},{"key":"7596_CR5","doi-asserted-by":"publisher","first-page":"17067","DOI":"10.1109\/ACCESS.2018.2885120","volume":"7","author":"M Ahmad","year":"2019","unstructured":"Ahmad, M., Hameed, A., Ikram, A. A., & Wahid, I. (2019). State-of-the-art clustering schemes in mobile ad hoc networks: Objectives, challenges, and future directions. IEEE Access, 7, 17067\u201317081. https:\/\/doi.org\/10.1109\/ACCESS.2018.2885120.","journal-title":"IEEE Access"},{"issue":"4","key":"7596_CR6","doi-asserted-by":"publisher","first-page":"9715","DOI":"10.1007\/s10586-017-1410-6","volume":"22","author":"P Ramya","year":"2019","unstructured":"Ramya, P., & Gopalakrishnan, V. (2019). Proficient algorithms for enhancing topology control for dynamic clusters in MANET. Cluster Computing, 22(4), 9715\u20139726. https:\/\/doi.org\/10.1007\/s10586-017-1410-6.","journal-title":"Cluster Computing"},{"issue":"5","key":"7596_CR7","doi-asserted-by":"publisher","first-page":"12681","DOI":"10.1007\/s10586-018-1721-2","volume":"22","author":"M Anand","year":"2019","unstructured":"Anand, M., & Sasikala, T. (2019). Efficient energy optimization in mobile ad hoc network (MANET) using better-quality AODV protocol. Cluster Computing, 22(5), 12681\u201312687. https:\/\/doi.org\/10.1007\/s10586-018-1721-2.","journal-title":"Cluster Computing"},{"issue":"4","key":"7596_CR8","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.1007\/s11276-017-1621-z","volume":"25","author":"C Pu","year":"2019","unstructured":"Pu, C., Lim, S., Chae, J., & Jung, B. (2019). Active detection in mitigating routing misbehavior for MANETs. Wireless Networks, 25(4), 1669\u20131683. https:\/\/doi.org\/10.1007\/s11276-017-1621-z.","journal-title":"Wireless Networks"},{"key":"7596_CR9","doi-asserted-by":"publisher","first-page":"102068","DOI":"10.1016\/j.adhoc.2019.102068","volume":"99","author":"I Manolopoulos","year":"2020","unstructured":"Manolopoulos, I., Kontovasilis, K., & Stavrakakis, I. (2020). Methodologies for calculating decision-related event occurrence times, with applications to effective routing in diverse MANET environments. Ad Hoc Networks, 99, 102068. https:\/\/doi.org\/10.1016\/j.adhoc.2019.102068.","journal-title":"Ad Hoc Networks"},{"key":"7596_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34496-2_17","author":"G Howser","year":"2020","unstructured":"Howser, G. (2020). Open shortest path first. Computer Networks and the Internet. https:\/\/doi.org\/10.1007\/978-3-030-34496-2_17.","journal-title":"Computer Networks and the Internet"},{"key":"7596_CR11","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1016\/j.procs.2016.08.046","volume":"94","author":"A Nafarieh","year":"2016","unstructured":"Nafarieh, A., Fazili, Y., Raza, M., & Robertson, W. (2016). Greenness link state advertisement extension for WDM networks. Procedia Computer Science, 94, 310\u2013317. https:\/\/doi.org\/10.1016\/j.procs.2016.08.046.","journal-title":"Procedia Computer Science"},{"key":"7596_CR12","doi-asserted-by":"publisher","first-page":"107031","DOI":"10.1016\/j.comnet.2019.107031","volume":"167","author":"B Al-Musawi","year":"2020","unstructured":"Al-Musawi, B., Branch, P., Hassan, M. F., & Pokhrel, S. R. (2020). Identifying OSPF LSA falsification attacks through non-linear analysis. Computer Networks, 167, 107031. https:\/\/doi.org\/10.1016\/j.comnet.2019.107031.","journal-title":"Computer Networks"},{"key":"7596_CR13","doi-asserted-by":"publisher","first-page":"24019","DOI":"10.1109\/ACCESS.2020.2970279","volume":"8","author":"BH Khudayer","year":"2020","unstructured":"Khudayer, B. H., Anbar, M., Hanshi, S. M., & Wan, T. C. (2020). Efficient route discovery and link failure detection mechanisms for source routing protocol in mobile ad-hoc networks. IEEE Access, 8, 24019\u201324032. https:\/\/doi.org\/10.1109\/ACCESS.2020.2970279.","journal-title":"IEEE Access"},{"key":"7596_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8201-6_27","author":"SS Kumar","year":"2019","unstructured":"Kumar, S. S. (2019). Minimizing link failure in mobile ad hoc networks through QOS routing. Innovations in Computer Science and Engineering. https:\/\/doi.org\/10.1007\/978-981-10-8201-6_27.","journal-title":"Innovations in Computer Science and Engineering"},{"issue":"4","key":"7596_CR15","doi-asserted-by":"publisher","first-page":"5185","DOI":"10.1007\/s11277-016-3735-5","volume":"96","author":"MS Rahul","year":"2017","unstructured":"Rahul, M. S., Arun, E., Shameem, P. M., & Rajeesh, J. (2017). An augmented routing algorithm for trusted detection of link failures in MANETs. Wireless Personal Communications, 96(4), 5185\u20135201. https:\/\/doi.org\/10.1007\/s11277-016-3735-5.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"7596_CR16","doi-asserted-by":"publisher","first-page":"1745","DOI":"10.1007\/s11277-019-06494-9","volume":"108","author":"R Jain","year":"2019","unstructured":"Jain, R., & Kashyap, I. (2019). An QoS aware link defined OLSR (LD-OLSR) routing protocol for MANETS. Wireless Personal Communications, 108(3), 1745\u20131758. https:\/\/doi.org\/10.1007\/s11277-019-06494-9.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"7596_CR17","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s11276-018-1779-z","volume":"26","author":"X Bai","year":"2020","unstructured":"Bai, X., Wei, X., & Bai, S. (2020). Efficient receiver-based flooding in mobile ad hoc networks. Wireless Networks, 26(1), 17\u201331. https:\/\/doi.org\/10.1007\/s11276-018-1779-z.","journal-title":"Wireless Networks"},{"issue":"6","key":"7596_CR18","doi-asserted-by":"publisher","first-page":"3587","DOI":"10.1007\/s11276-019-01955-2","volume":"25","author":"D Zhang","year":"2019","unstructured":"Zhang, D., Gao, J., Liu, X., Zhang, T., & Zhao, D. (2019). Novel approach of distributed and adaptive trust metrics for MANET. Wireless Networks, 25(6), 3587\u20133603. https:\/\/doi.org\/10.1007\/s11276-019-01955-2.","journal-title":"Wireless Networks"},{"key":"7596_CR19","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.comnet.2019.06.003","volume":"161","author":"B Yang","year":"2019","unstructured":"Yang, B., Wu, Z., Shen, Y., & Jiang, X. (2019). Packet delivery ratio and energy consumption in multicast delay tolerant MANETs with power control. Computer Networks, 161, 150\u2013161. https:\/\/doi.org\/10.1016\/j.comnet.2019.06.003.","journal-title":"Computer Networks"},{"issue":"1","key":"7596_CR20","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.aej.2016.10.004","volume":"57","author":"M Malathi","year":"2018","unstructured":"Malathi, M., & Jayashri, S. (2018). Robust against route failure using power proficient reliable routing in MANET. Alexandria Engineering Journal, 57(1), 11\u201321. https:\/\/doi.org\/10.1016\/j.aej.2016.10.004.","journal-title":"Alexandria Engineering Journal"},{"key":"7596_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7641-1_30","author":"M Soni","year":"2019","unstructured":"Soni, M., & Joshi, B. K. (2019). Security assessment of SAODV protocols in mobile ad hoc networks. Data Science and Big Data Analytics. https:\/\/doi.org\/10.1007\/978-981-10-7641-1_30.","journal-title":"Data Science and Big Data Analytics"},{"issue":"4","key":"7596_CR22","doi-asserted-by":"publisher","first-page":"1599","DOI":"10.1007\/s11277-019-06120-8","volume":"104","author":"RT Merlin","year":"2019","unstructured":"Merlin, R. T., & Ravi, R. (2019). Novel trust based energy aware routing mechanism for mitigation of black hole attacks in MANET. Wireless Personal Communications, 104(4), 1599\u20131636. https:\/\/doi.org\/10.1007\/s11277-019-06120-8.","journal-title":"Wireless Personal Communications"},{"key":"7596_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896699","author":"S Liu","year":"2019","unstructured":"Liu, S., Zhang, D. G., Liu, X. H., Zhang, T., Gao, J. X., & Cui, Y. Y. (2019). Dynamic analysis for the average shortest path length of mobile ad hoc networks under random failure scenarios. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2019.2896699.","journal-title":"IEEE Access"},{"key":"7596_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2685-1_19","author":"S Prabha","year":"2019","unstructured":"Prabha, S., & Yadav, R. (2019). Trusted-differential evolution algorithm for mobile ad hoc networks. Recent Trends in Communication, Computing, and Electronics. https:\/\/doi.org\/10.1007\/978-981-13-2685-1_19.","journal-title":"Recent Trends in Communication, Computing, and Electronics"},{"key":"7596_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06202-7","author":"L Femila","year":"2019","unstructured":"Femila, L., & Beno, M. M. (2019). Optimizing transmission power and energy efficient routing protocol in MANETs. Wireless Personal Communications. https:\/\/doi.org\/10.1007\/s11277-019-06202-7.","journal-title":"Wireless Personal Communications"},{"issue":"8","key":"7596_CR26","doi-asserted-by":"publisher","first-page":"2693","DOI":"10.1007\/s40815-018-0529-9","volume":"20","author":"D Bisen","year":"2018","unstructured":"Bisen, D., & Sharma, S. (2018). An energy-efficient routing approach for performance enhancement of MANET through adaptive neuro-fuzzy inference system. International Journal of Fuzzy Systems, 20(8), 2693\u20132708. https:\/\/doi.org\/10.1007\/s40815-018-0529-9.","journal-title":"International Journal of Fuzzy Systems"},{"issue":"4","key":"7596_CR27","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s40009-018-0650-1","volume":"41","author":"D Bisen","year":"2018","unstructured":"Bisen, D., & Sharma, S. (2018). Fuzzy based hybrid energy control technique to optimize hello interval of reactive routing in MANET. National Academy science Letters, 41(4), 211\u2013214. https:\/\/doi.org\/10.1007\/s40009-018-0650-1.","journal-title":"National Academy science Letters"},{"key":"7596_CR28","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.sigpro.2018.02.030","volume":"148","author":"M Usman","year":"2018","unstructured":"Usman, M., Jan, M. A., He, X., & Alam, M. (2018). Performance evaluation of high definition video streaming over mobile ad hoc networks. Signal Processing, 148, 303\u2013313. https:\/\/doi.org\/10.1016\/j.sigpro.2018.02.030.","journal-title":"Signal Processing"},{"issue":"6","key":"7596_CR29","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1134\/S0361768818060099","volume":"44","author":"R Raja","year":"2018","unstructured":"Raja, R., & Ganeshkumar, P. (2018). QoSTRP: A trusted clustering based routing protocol for mobile ad-hoc networks. Programming and Computer Software, 44(6), 407\u2013416. https:\/\/doi.org\/10.1134\/S0361768818060099.","journal-title":"Programming and Computer Software"},{"issue":"4","key":"7596_CR30","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1007\/s11227-017-2150-3","volume":"74","author":"W Zhang","year":"2018","unstructured":"Zhang, W., Zhu, S., Tang, J., & Xiong, N. (2018). A novel trust management scheme based on Dempster\u2013Shafer evidence theory for malicious nodes detection in wireless sensor networks. The Journal of Supercomputing, 74(4), 1779\u20131801. https:\/\/doi.org\/10.1007\/s11227-017-2150-3.","journal-title":"The Journal of Supercomputing"},{"key":"7596_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-018-0688-3","author":"V Kavidha","year":"2018","unstructured":"Kavidha, V., & Ananthakumaran, S. (2018). Novel energy-efficient secure routing protocol for wireless sensor networks with mobile sink. Peer-to-Peer Networking and Applications. https:\/\/doi.org\/10.1007\/s12083-018-0688-3.","journal-title":"Peer-to-Peer Networking and Applications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07596-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07596-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07596-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T23:08:51Z","timestamp":1623884931000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07596-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,17]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["7596"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07596-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,17]]},"assertion":[{"value":"17 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no potential conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All applicable institutional and\/or national guidelines for the care and use of animals were followed.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and Animal Rights"}},{"value":"For this type of study formal consent is not required.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}]}}