{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T12:40:50Z","timestamp":1775047250171,"version":"3.50.1"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:00:00Z","timestamp":1619568000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:00:00Z","timestamp":1619568000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s11277-021-08542-9","type":"journal-article","created":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T18:03:39Z","timestamp":1619633019000},"page":"1895-1919","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Secure Opportunistic Watchdog Production in Wireless Sensor Networks: A Review"],"prefix":"10.1007","volume":"120","author":[{"given":"S.","family":"Rajasoundaran","sequence":"first","affiliation":[]},{"given":"A. V.","family":"Prabu","sequence":"additional","affiliation":[]},{"given":"G. Sateesh","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Prince Priya","family":"Malla","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3658-3514","authenticated-orcid":false,"given":"Sidheswar","family":"Routray","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,28]]},"reference":[{"key":"8542_CR1","unstructured":"Singh, M., Babbar, K., and Jain, K. L. (2014). A Survey on Intrusion Detection System in Wireless Sensor Networks.\u00a0International Journal of Wireless Communications and Networking Technologies,\u00a03(3)."},{"issue":"3","key":"8542_CR2","doi-asserted-by":"publisher","first-page":"1096","DOI":"10.21533\/pen.v7i3.645","volume":"7","author":"OI Khalaf","year":"2019","unstructured":"Khalaf, O. I., & Sabbar, B. M. (2019). An overview on wireless sensor networks and finding optimal location of nodes. Periodicals of Engineering and Natural Sciences, 7(3), 1096\u20131101","journal-title":"Periodicals of Engineering and Natural Sciences"},{"issue":"1","key":"8542_CR3","doi-asserted-by":"publisher","first-page":"142","DOI":"10.11591\/ijeecs.v15.i1.pp142-147","volume":"15","author":"AD Salman","year":"2019","unstructured":"Salman, A. D., Khalaf, O. I., & Abdulsahib, G. M. (2019). An adaptive intelligent alarm system for wireless sensor network. Indonesian Journal of Electrical Engineering and Computer Science, 15(1), 142\u2013147","journal-title":"Indonesian Journal of Electrical Engineering and Computer Science"},{"issue":"2\u20133","key":"8542_CR4","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1504\/IJICS.2018.091462","volume":"10","author":"V Mohindru","year":"2018","unstructured":"Mohindru, V., & Singh, Y. (2018). Node authentication algorithm for securing static wireless sensor networks from node clone attack. International Journal of Information and Computer Security, 10(2\u20133), 129\u2013148","journal-title":"International Journal of Information and Computer Security"},{"key":"8542_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/047011276X","volume-title":"Wireless sensor networks: technology, protocols, and applications","author":"K Sohraby","year":"2007","unstructured":"Sohraby, K., Minoli, D., & Znati, T. (2007). Wireless sensor networks: technology, protocols, and applications. Wiley."},{"key":"8542_CR6","unstructured":"Krishnamachari, B. (2005) \"An introduction to wireless sensor networks.\" Proc. of ICISIP"},{"issue":"1","key":"8542_CR7","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11276-017-1558-2","volume":"25","author":"A Sarkar","year":"2019","unstructured":"Sarkar, A., & Murugan, T. S. (2019). Cluster head selection for energy efficient and delay-less routing in wireless sensor network. Wireless Networks, 25(1), 303\u2013320","journal-title":"Wireless Networks"},{"key":"8542_CR8","doi-asserted-by":"publisher","first-page":"101842","DOI":"10.1016\/j.adhoc.2019.02.001","volume":"90","author":"M Aloqaily","year":"2019","unstructured":"Aloqaily, M., Otoum, S., Al Ridhawi, I., & Jararweh, Y. (2019). An intrusion detection system for connected vehicles in smart cities. Ad Hoc Networks, 90, 101842","journal-title":"Ad Hoc Networks"},{"issue":"2","key":"8542_CR9","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s12083-017-0630-0","volume":"12","author":"N Sultana","year":"2019","unstructured":"Sultana, N., Chilamkurti, N., Peng, W., & Alhadad, R. (2019). Survey on SDN based network intrusion detection system using machine learning approaches. Peer-to-Peer Networking and Applications, 12(2), 493\u2013501","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"12","key":"8542_CR10","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","volume":"52","author":"J Yick","year":"2008","unstructured":"Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer networks, 52(12), 2292\u20132330","journal-title":"Computer networks"},{"key":"8542_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.01.012","volume":"42","author":"R Mitchell","year":"2014","unstructured":"Mitchell, R., & Chen, R. (2014). A survey of intrusion detection in wireless network applications. Computer Communications, 42, 1\u201323","journal-title":"Computer Communications"},{"issue":"3","key":"8542_CR12","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/SURV.2012.121912.00006","volume":"15","author":"A Abduvaliyev","year":"2013","unstructured":"Abduvaliyev, A., Pathan, A. S. K., Zhou, J., Roman, R., & Wong, W. C. (2013). On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 15(3), 1223\u20131237","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"4","key":"8542_CR13","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1109\/TNET.2012.2186151","volume":"20","author":"GY Keung","year":"2012","unstructured":"Keung, G. Y., Li, Bo., & Zhang, Q. (2012). The intrusion detection in mobile sensor network. IEEE\/ACM Transactions on Networking, 20(4), 1152\u20131161","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"8542_CR14","unstructured":"Honus, B. L. (2009) \"Design, implementation and simulation of intrusion detection system for wireless sensor networks.\" Brno, spring."},{"issue":"3","key":"8542_CR15","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1109\/TIE.2010.2052533","volume":"58","author":"F Maci\u00e1-P\u00e9rez","year":"2010","unstructured":"Maci\u00e1-P\u00e9rez, F., Mora-Gimeno, F. J., Marcos-Jorquera, D., Gil-Mart\u00ednez-Abarca, J. A., Ramos-Morillo, H., & Lorenzo-Fonseca, I. (2010). Network intrusion detection system embedded on a smart sensor. IEEE Transactions on Industrial Electronics, 58(3), 722\u2013732","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"8542_CR16","doi-asserted-by":"crossref","unstructured":"Medhat, K., Rabie A. R., and Ihab, T. (2015) \"Distributed intrusion detection system for wireless sensor networks.\" In 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, pp. 234\u2013239. IEEE","DOI":"10.1109\/NGMAST.2015.29"},{"key":"8542_CR17","doi-asserted-by":"crossref","unstructured":"Besson, L., and Philippe L. (2009) \"A distributed intrusion detection system for ad-hoc wireless sensor networks: the AWISSENET distributed intrusion detection system.\" In 2009 16th International Conference on Systems, Signals and Image Processing, pp. 1\u20133. IEEE","DOI":"10.1109\/IWSSIP.2009.5367767"},{"key":"8542_CR18","doi-asserted-by":"publisher","first-page":"102041","DOI":"10.1016\/j.simpat.2019.102041","volume":"101","author":"M Krzyszto\u0144","year":"2020","unstructured":"Krzyszto\u0144, M., & Marks, M. (2020). Simulation of watchdog placement for cooperative anomaly detection in Bluetooth Mesh Intrusion Detection System. Simulation Modelling Practice and Theory, 101, 102041","journal-title":"Simulation Modelling Practice and Theory"},{"key":"8542_CR19","doi-asserted-by":"crossref","unstructured":"Saifuddin, K. M., Ali, A. J. B., Ahmed, A. S., Alam, S. S., and Ahmad, A. S. (2018) \"Watchdog and Pathrater based Intrusion Detection System for MANET.\" In 2018 4th International Conference on Electrical Engineering and Information & Communication Technology (iCEEiCT), pp. 168\u2013173. IEEE","DOI":"10.1109\/CEEICT.2018.8628117"},{"key":"8542_CR20","unstructured":"Bhuse, V., Gupta, A., and Lilien, L. (2005) \"DPDSN: Detection of packet-dropping attacks for wireless sensor networks.\" In Proc. Fourth Trusted Internet Workshop, 107"},{"key":"8542_CR21","unstructured":"Roman, R., Zhou, J., and Lopez, J. (2006). \"Applying intrusion detection systems to wireless sensor networks.\" In IEEE Consumer Communications & Networking Conference (CCNC 2006)"},{"key":"8542_CR22","first-page":"65","volume-title":"Cyber Security for Cyber Physical Systems","author":"S Ali","year":"2018","unstructured":"Ali, S., Al Balushi, T., Nadir, Z., & Hussain, O. K. (2018). WSN security mechanisms for CPS. Cyber Security for Cyber Physical Systems. (pp. 65\u201387). Cham: Springer."},{"issue":"1","key":"8542_CR23","first-page":"00093","volume":"4","author":"G Kalnoor","year":"2018","unstructured":"Kalnoor, G., & Agarkhed, J. (2018). Intrusion threats and security solutions in wireless sensor networks. Int Rob Auto J, 4(1), 00093","journal-title":"Int Rob Auto J"},{"issue":"2","key":"8542_CR24","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/SURV.2009.090205","volume":"11","author":"X Chen","year":"2009","unstructured":"Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: a survey. IEEE Communications Surveys & Tutorials, 11(2), 52\u201373","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"1","key":"8542_CR25","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/SURV.2009.090106","volume":"11","author":"MN Lima","year":"2009","unstructured":"Lima, M. N., Dos Santos, A. L., & Pujolle, G. (2009). A survey of survivability in mobile ad hoc networks. IEEE Communications surveys & tutorials, 11(1), 66\u201377","journal-title":"IEEE Communications surveys & tutorials"},{"key":"8542_CR26","volume-title":"Cryptography and network security: principles and practice","author":"S William","year":"2019","unstructured":"William, S. (2019). Cryptography and network security: principles and practice. Prentice hall."},{"key":"8542_CR27","volume-title":"Security engineering","author":"R Anderson","year":"2008","unstructured":"Anderson, R. (2008). Security engineering. Wiley."},{"issue":"2","key":"8542_CR28","first-page":"371","volume":"10","author":"S-H Seo","year":"2014","unstructured":"Seo, S.-H., Won, J., Sultana, S., & Bertino, E. (2014). Effective key management in dynamic wireless sensor networks. IEEE Transactions on Information Forensics and Security, 10(2), 371\u2013383","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"8542_CR29","doi-asserted-by":"crossref","unstructured":"Proano, A. (2012). LoukasLazos,\u201cPacket Hiding method for Selective Jamming Attacks\u201d.\u00a0IEEE Transactions on Dependable and Secure Computing,\u00a01","DOI":"10.1109\/TDSC.2011.41"},{"key":"8542_CR30","unstructured":"Pietil\u00e4inen, H. (2000). \"Elliptic curve cryptography on smart cards.\" M. Sc., Helsinki Univ. of Technology"},{"key":"8542_CR31","first-page":"119","volume-title":"International workshop on cryptographic hardware and embedded systems","author":"N Gura","year":"2004","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., & Shantz, S. C. (2004). Comparing elliptic curve cryptography and RSA on 8-bit CPUs. International workshop on cryptographic hardware and embedded systems. (pp. 119\u2013132). Springer."},{"key":"8542_CR32","unstructured":"Gallagher, P. (2009). Federal information processing standards publication digital signature standard (DSS).\u00a0Fips pub 186-3"},{"key":"8542_CR33","unstructured":"Schneier, B., and Doug W. (2000) \"A Performance Comparison of the Five AES Finalists.\" In AES Candidate Conference, pp. 123\u2013135."},{"key":"8542_CR34","doi-asserted-by":"crossref","unstructured":"Rachmat, N. (2019) \"Performance analysis of 256-bit AES encryption algorithm on android smartphone.\" In Journal of Physics: Conference Series, vol. 1196, no. 1, p. 012049. IOP Publishing","DOI":"10.1088\/1742-6596\/1196\/1\/012049"},{"issue":"4","key":"8542_CR35","doi-asserted-by":"publisher","first-page":"2341","DOI":"10.1016\/j.ijleo.2015.11.188","volume":"127","author":"P Kumar","year":"2016","unstructured":"Kumar, P., & Rana, S. B. (2016). Development of modified AES algorithm for data security. Optik, 127(4), 2341\u20132345","journal-title":"Optik"},{"issue":"6","key":"8542_CR36","first-page":"2377","volume":"3","author":"A Vani","year":"2011","unstructured":"Vani, A., & Rao, D. S. (2011). A simple algorithm for detection and removal of wormhole attacks for secure routing in ad hoc wireless networks. International Journal on Computer Science and Engineering (IJCSE), 3(6), 2377\u20132384","journal-title":"International Journal on Computer Science and Engineering (IJCSE)"},{"issue":"2","key":"8542_CR37","first-page":"137","volume":"3","author":"J Thalor","year":"2013","unstructured":"Thalor, J., & Monika, M. (2013). Wormhole attack detection and prevention technique in mobile ad hoc networks: A review. International Journal of Advanced Research in Computer Science and Software Engineering, 3(2), 137\u2013142","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"issue":"3","key":"8542_CR38","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1016\/j.jesit.2017.02.002","volume":"5","author":"J Govindasamy","year":"2018","unstructured":"Govindasamy, J., & Punniakody, S. (2018). A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack. Journal of Electrical Systems and Information Technology, 5(3), 735\u2013744","journal-title":"Journal of Electrical Systems and Information Technology"},{"key":"8542_CR39","doi-asserted-by":"crossref","unstructured":"Mohammed, A. S., Yuvaraj, D., Sivaram, M., and Porkodi, V. (2018). DETECTION and removal of black hole attack in mobile Ad Hoc networks using grp protocol.\u00a0International Journal of Advanced Research in Computer Science,\u00a010(6)","DOI":"10.26483\/ijarcs.v9i6.6335"},{"issue":"2","key":"8542_CR40","first-page":"117","volume":"5","author":"CS Sneha","year":"2016","unstructured":"Sneha, C. S., & Jose, B. (2016). Detecting packet dropping attack in wireless ad hoc network. International Journal of Cybernetic Inferface (IJCI), 5(2), 117\u2013124","journal-title":"International Journal of Cybernetic Inferface (IJCI)"},{"issue":"3","key":"8542_CR41","first-page":"209","volume":"5","author":"IA Khan","year":"2015","unstructured":"Khan, I. A., Ahmad, F., Baig, W. A., & Naseer, M. (2015). Application-based classification and comparison of secure routing protocols in wireless sensor networks: a survey. SmartCR, 5(3), 209\u2013223","journal-title":"SmartCR"},{"key":"8542_CR42","doi-asserted-by":"crossref","unstructured":"Clausen, T., Jacquet, P., Adjih, C., Laouiti, A., Minet, P., Muhlethaler, P., Qayyum, A., and Viennot, L. (2003) \"Optimized link state routing protocol (OLSR).\"","DOI":"10.17487\/rfc3626"},{"key":"8542_CR43","doi-asserted-by":"crossref","unstructured":"Litvinov, G., and Shcherba. E. (2019) \"Modeling Message Spoofing Attacks on the OLSR Routing Protocol.\" In 2019 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT), pp. 299\u2013302. IEEE","DOI":"10.1109\/USBEREIT.2019.8736652"},{"key":"8542_CR44","doi-asserted-by":"crossref","unstructured":"Gulhane, G., and Mahajan, N. V. (2014) \"Securing multipath routing protocol using authentication approach for wireless sensor network.\" In 2014 Fourth International Conference on Communication Systems and Network Technologies, pp. 729\u2013733. IEEE","DOI":"10.1109\/CSNT.2014.153"},{"issue":"7","key":"8542_CR45","doi-asserted-by":"publisher","first-page":"15127","DOI":"10.3390\/s150715127","volume":"15","author":"TM Rahayu","year":"2015","unstructured":"Rahayu, T. M., Lee, S. G., & Lee, H. J. (2015). A secure routing protocol for wireless sensor networks considering secure data aggregation. Sensors, 15(7), 15127\u201315158","journal-title":"Sensors"},{"key":"8542_CR46","unstructured":"Adjih, C., Clausen, T., Jacquet, P., Laouiti, A., Muhlethaler, P., and Raffo, D. (2003). \"Securing the OLSR protocol.\" In Proceedings of Med-Hoc-Net, pp. 25\u201327"},{"key":"8542_CR47","doi-asserted-by":"crossref","unstructured":"Naik, K. K., Balaswamy, C., and Reddy, P. R. (2019). \"Performance Analysis of OLSR Protocol for MANETs under Realistic Mobility Model.\" In 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1\u20135. IEEE","DOI":"10.1109\/ICECCT.2019.8869406"},{"key":"8542_CR48","doi-asserted-by":"crossref","unstructured":"Bao, F., Chen, I. R., Chang, M., and Cho, J. H. (2011). \"Hierarchical trust management for wireless sensor networks and its application to trust-based routing.\" In Proceedings of the 2011 ACM Symposium on Applied Computing, pp. 1732\u20131738. 2011.","DOI":"10.1145\/1982185.1982547"},{"key":"8542_CR49","doi-asserted-by":"publisher","first-page":"58221","DOI":"10.1109\/ACCESS.2019.2914769","volume":"7","author":"T Khan","year":"2019","unstructured":"Khan, T., Singh, K., Abdel-Basset, M., Long, H. V., Singh, S. P., & Manjul, M. (2019). A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks. IEEE Access, 7, 58221\u201358240","journal-title":"IEEE Access"},{"issue":"1","key":"8542_CR50","doi-asserted-by":"publisher","first-page":"67","DOI":"10.2174\/1573409914666180509152711","volume":"15","author":"C Raychaudhury","year":"2019","unstructured":"Raychaudhury, C., Rizvi, M. I., & Pal, D. (2019). Combinatorial design of molecule using activity-linked substructural topological information as applied to antitubercular compounds. Current computer-aided drug design, 15(1), 67\u201381","journal-title":"Current computer-aided drug design"},{"key":"8542_CR51","unstructured":"Magar, A. A. (2014). A Survey about key pre-distribution scheme in wireless sensor networks.\u00a0International Journal of Engineering Reserach General Science\u00a02(6)"},{"issue":"7","key":"8542_CR52","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1109\/TMC.2013.134","volume":"13","author":"HJ Jo","year":"2013","unstructured":"Jo, H. J., Paik, J. H., & Lee, D. H. (2013). Efficient privacy-preserving authentication in wireless mobile networks. IEEE Transactions on Mobile Computing, 13(7), 1469\u20131481","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"2","key":"8542_CR53","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1049\/cje.2015.04.018","volume":"24","author":"Y Li","year":"2015","unstructured":"Li, Y., Zhu, J., Zhang, N., Wang, X., & Zhang, Y. (2015). RYY++: A novel provably secure identity-based authenticated key agreement protocol. Chinese Journal of Electronics, 24(2), 332\u2013337","journal-title":"Chinese Journal of Electronics"},{"issue":"1","key":"8542_CR54","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1049\/iet-ifs.2014.0234","volume":"10","author":"W Wen","year":"2016","unstructured":"Wen, W., Wang, L., & Pan, J. (2016). Unified security model of authenticated key exchange with specific adversarial capabilities. IET Information Security, 10(1), 8\u201317","journal-title":"IET Information Security"},{"key":"8542_CR55","doi-asserted-by":"crossref","unstructured":"Rachedi, A., and Baklouti, H. (2011, June). mudog: Smart monitoring mechanism for wireless sensor networks based on ieee 802.15. 4 mac. In\u00a02011 IEEE International Conference on Communications (ICC)\u00a0(pp. 1-6). IEEE","DOI":"10.1109\/icc.2011.5963200"},{"key":"8542_CR56","doi-asserted-by":"crossref","unstructured":"Qu, H., Lei, L., Tang, X., and Wang, P. (2018). A lightweight intrusion detection method based on fuzzy clustering algorithm for wireless sensor networks.\u00a0Advances in Fuzzy Systems","DOI":"10.1155\/2018\/4071851"},{"issue":"2","key":"8542_CR57","first-page":"94","volume":"9","author":"P Kumar","year":"2018","unstructured":"Kumar, P., & Josh, S. (2018). Optimization of watchdog selection in wireless sensor networks. IIOAB Journal, 9(2), 94\u2013100","journal-title":"IIOAB Journal"},{"key":"8542_CR58","unstructured":"Rohbanian, M. R., Kharazmi, M. R., Keshavarz-Haddad, A., and Keshtgary, M. (2013). \"Watchdog-LEACH: a new method based on LEACH protocol to secure clustered wireless sensor networks.\" arXiv preprint arXiv:1310.3637"},{"issue":"3","key":"8542_CR59","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1109\/TIFS.2015.2389145","volume":"10","author":"P Zhou","year":"2015","unstructured":"Zhou, P., Jiang, S., Irissappane, A., Zhang, J., Zhou, J., & Teo, J. C. M. (2015). Toward energy-efficient trust system through watchdog optimization for WSNs. IEEE Transactions on Information Forensics and Security, 10(3), 613\u2013625","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"8542_CR60","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1109\/TVT.2014.2322939","volume":"64","author":"X Lou","year":"2014","unstructured":"Lou, X., Yao, H., Tan, C. W., & Wang, J. (2014). VANDER: efficient cooperative watchdog monitoring for Lossy wireless network coding. IEEE Transactions on Vehicular Technology, 64(2), 702\u2013713","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"12","key":"8542_CR61","doi-asserted-by":"publisher","first-page":"7929","DOI":"10.1109\/TIE.2015.2425357","volume":"62","author":"JA Dias","year":"2015","unstructured":"Dias, J. A., Rodrigues, J. J., Xia, F., & Mavromoustakis, C. X. (2015). A cooperative watchdog system to detect misbehavior nodes in vehicular delay-tolerant networks. IEEE Transactions on Industrial Electronics, 62(12), 7929\u20137937","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"8542_CR62","unstructured":"Yu, L., and Li, J. (2008). \"Spymon: Hidden network monitoring for security in wireless sensor networks.\" In 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 328\u2013333. IEEE"},{"issue":"3\u20134","key":"8542_CR63","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1504\/IJAHUC.2009.024518","volume":"4","author":"LM Ni","year":"2009","unstructured":"Ni, L. M., Zhu, Y., Ma, J., Luo, Q., Liu, Y., Cheung, S. C., & Wu, M. Y. (2009). Semantic Sensor Net: an extensible framework. International Journal of Ad Hoc and Ubiquitous Computing, 4(3\u20134), 157\u2013167","journal-title":"International Journal of Ad Hoc and Ubiquitous Computing"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08542-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08542-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08542-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,30]],"date-time":"2021-08-30T12:16:24Z","timestamp":1630325784000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08542-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,28]]},"references-count":63,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["8542"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08542-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,28]]},"assertion":[{"value":"22 April 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}