{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T21:56:39Z","timestamp":1776722199237,"version":"3.51.2"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,1,6]],"date-time":"2022-01-06T00:00:00Z","timestamp":1641427200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,6]],"date-time":"2022-01-06T00:00:00Z","timestamp":1641427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11277-021-09359-2","type":"journal-article","created":{"date-parts":[[2022,1,6]],"date-time":"2022-01-06T00:03:39Z","timestamp":1641427419000},"page":"333-348","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["An Efficient Security Framework for Trusted and Secure Routing in MANET: A Comprehensive Solution"],"prefix":"10.1007","volume":"124","author":[{"given":"G.","family":"Vidhya Lakshmi","sequence":"first","affiliation":[]},{"given":"P.","family":"Vaishnavi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,6]]},"reference":[{"issue":"3","key":"9359_CR1","first-page":"112","volume":"2","author":"D Anitha","year":"2013","unstructured":"Anitha, D., & Punithavalli, M. (2013). A Collaborative selfish replica with watchdog and pathrater in MANETS. International Journal of Computer Science and Mobile Computing (IJCSMC), 2(3), 112\u2013119.","journal-title":"International Journal of Computer Science and Mobile Computing (IJCSMC)"},{"key":"9359_CR2","doi-asserted-by":"publisher","first-page":"36","DOI":"10.3745\/JIPS.2014.10.1.036","volume":"10","author":"B Sharma","year":"2014","unstructured":"Sharma, B., & Singh, A. K. (2014). A token based protocol for mutual exclusion in mobile ad hoc networks. Journal of Information Processing Systems, 10, 36\u201354.","journal-title":"Journal of Information Processing Systems"},{"issue":"2","key":"9359_CR3","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/TCOMM.2012.031912.110179","volume":"9","author":"F Bao","year":"2012","unstructured":"Bao, F., Chen, I. R., Chang, M., & Cho, J. H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169\u2013183.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"1","key":"9359_CR4","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","volume":"16","author":"I Butun","year":"2013","unstructured":"Butun, I., Morgera, S. D., & Sankar, R. (2013). A survey of intrusion detection systems in wireless sensor network. IEEE Communications Surveys & Tutorials, 16(1), 266\u2013282.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"9359_CR5","doi-asserted-by":"crossref","unstructured":"Gupta, N., & Singh, S. N. (2016). Wormhole attacks in MANET. In 2016 6th international conference\u2014cloud system and big data engineering (confluence), pp. 236\u2013239.","DOI":"10.1109\/CONFLUENCE.2016.7508120"},{"key":"9359_CR6","doi-asserted-by":"crossref","unstructured":"Karthik Raju, V., & Vinay Kumar, K. (2012). A simple and efficient mechanism to detect and avoid wormhole attacke in mobile ad hoc networks. In International conference on computing sciences, pp. 271\u2013275, IEEE.","DOI":"10.1109\/ICCS.2012.4"},{"issue":"12","key":"9359_CR7","first-page":"1","volume":"1","author":"Feroz","year":"2019","unstructured":"Feroz, et al. (2019). A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the IoT environment: CKMT. SN Applied Sciences, 1(12), 1\u20137.","journal-title":"SN Applied Sciences"},{"issue":"2","key":"9359_CR8","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.eij.2020.05.004","volume":"22","author":"Feroz","year":"2021","unstructured":"Feroz, et al. (2021). AHKM: An improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in IoT. Egyptian Informatics Journal, 22(2), 119\u2013124.","journal-title":"Egyptian Informatics Journal"},{"issue":"3","key":"9359_CR9","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1108\/IJIUS-06-2019-0029","volume":"9","author":"Feroz","year":"2021","unstructured":"Feroz, et al. (2021). A multi-layer security approach for DDoS detection in internet of things. International Journal of Intelligent Unmanned Systems, 9(3), 178\u2013191.","journal-title":"International Journal of Intelligent Unmanned Systems"},{"issue":"5","key":"9359_CR10","first-page":"160","volume":"8","author":"N Kalia","year":"2016","unstructured":"Kalia, N., & Sharma, H. (2016). Detection of multiple blackhole nodes attack in MANET by modifying AODV protocol. International Journal on Computer Science and Engineering, 8(5), 160\u2013174.","journal-title":"International Journal on Computer Science and Engineering"},{"issue":"3","key":"9359_CR11","first-page":"81","volume":"7","author":"M Sathya","year":"2016","unstructured":"Sathya, M., & Priyadharshini, M. (2016). Detection and removal of blackhole attack in mobile ad-hoc networks using cooperative bait detection method scheme. International Journal of Scientific & Engineering Research, 7(3), 81\u201385.","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"9359_CR12","doi-asserted-by":"crossref","unstructured":"Dhende, S., Musale, S., Shirbahadurkar, S., & Najan, A. (2017). SAODV: blackhole and grayhole attack detection protocol in MANETs. In Proceedings of the 2017 international conference on wireless communications, signal processing and networking (WiSPNET), pp. 2391\u20132394, Chennai, India.","DOI":"10.1109\/WiSPNET.2017.8300188"},{"issue":"20","key":"9359_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2016\/v9i20\/90391","volume":"9","author":"SK Arora","year":"2016","unstructured":"Arora, S. K., Vijan, S., & Gaba, G. S. (2016). Detection and analysis of blackhole attack using IDS. Indian Journal of Science and Technology, 9(20), 1\u20135.","journal-title":"Indian Journal of Science and Technology"},{"key":"9359_CR14","doi-asserted-by":"crossref","unstructured":"Jain, A., Prajapati, U., & Chouhan, P. (2016). Trust based mechanism with AODV protocol for prevention of black-hole attack in MANET scenario. In Proceedings of the 2016 Symposium on Colossal Data Analysis and Networking, CDAN 2016, Indore, India.","DOI":"10.1109\/CDAN.2016.7570866"},{"key":"9359_CR15","doi-asserted-by":"crossref","unstructured":"Alani, M. M. (2014). MANET security: A survey. In: Proceedings of the 2014 IEEE International Conference on Control System, Computing and Engineering (ICCSCE), pp. 559\u2013564, Penang, Malaysia.","DOI":"10.1109\/ICCSCE.2014.7072781"},{"key":"9359_CR16","doi-asserted-by":"crossref","unstructured":"Prashar, L., & Kapur, R. K. (2016). Performance analysis of routing protocols under different types of attacks in MANETs. In Proceedings of the 5th International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2016, pp. 405\u2013408, Noida, India","DOI":"10.1109\/ICRITO.2016.7784989"},{"key":"9359_CR17","first-page":"23","volume":"4","author":"Y Chung","year":"2013","unstructured":"Chung, Y., Choi, S., & Won, D. (2013). Lightweight anonymous authentication scheme with unlinkability in global mobility networks. Journal of Convergence, 4, 23\u201329.","journal-title":"Journal of Convergence"},{"issue":"5","key":"9359_CR18","first-page":"16","volume":"4","author":"A Joshi","year":"2016","unstructured":"Joshi, A. (2016). A review paper on blackhole attack in MANET. International Journal of Advance Research in Computer Science and Management Studies, 4(5), 16\u201321.","journal-title":"International Journal of Advance Research in Computer Science and Management Studies"},{"key":"9359_CR19","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9812135","author":"A Yasin","year":"2018","unstructured":"Yasin, A., & Zant, M. A. (2018). Detecting and isolating black-hole attacks in MANET using timer based baited technique. Wireless Communications and Mobile Computing. https:\/\/doi.org\/10.1155\/2018\/9812135","journal-title":"Wireless Communications and Mobile Computing"},{"key":"9359_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08391-6","author":"AB Feroz Khan","year":"2021","unstructured":"Feroz Khan, A. B., & Anandharaj, G. (2021). A cognitive energy efficient and trusted routing model for the security of wireless sensor networks: CEMT. Wireless Personal Communications. https:\/\/doi.org\/10.1007\/s11277-021-08391-6","journal-title":"Wireless Personal Communications"},{"key":"9359_CR21","doi-asserted-by":"crossref","unstructured":"Prashar, L., & Kapur, R. K. (2016). Performance analysis of routing protocols under different types of attacks in MANETs. In Proceedings of the 5th International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2016, pp. 405\u2013408, Noida, India.","DOI":"10.1109\/ICRITO.2016.7784989"},{"key":"9359_CR22","doi-asserted-by":"crossref","unstructured":"Moudni, H., Er-Rouidi, M., Mouncif, H., & El Hadadi, B. (2016). Performance analysis of AODV routing protocol in MANET under the influence of routing attacks. In Proceedings of the 2nd International Conference on Electrical and Information Technologies, ICEIT 2016, pp. 536\u2013542, Tangiers, Morocco.","DOI":"10.1109\/EITech.2016.7519658"},{"key":"9359_CR23","doi-asserted-by":"crossref","unstructured":"Gupta, S., Kar, S., & Dharmaraja, S. (2011). WHOP: Wormhole attack detection protocol using hound packet. In The International Conference on Innovations Technology, IEEE, pp. 226\u2013231.","DOI":"10.1109\/INNOVATIONS.2011.5893822"},{"key":"9359_CR24","unstructured":"Chiu, H. S., Lui, K. S. (2016). DELPHI, Wormhole detection mechanism for ad hoc wireless networks. In 1st International Symposium on Wireless Pervasive Computing, pp. 6\u201311."},{"key":"9359_CR25","doi-asserted-by":"publisher","first-page":"151","DOI":"10.23956\/ijarcsse\/V7I6\/0254","volume":"7","author":"K Gupta","year":"2017","unstructured":"Gupta, K., & Mittal, P. (2017). An overview of security in MANET. International Journal of Advanced Research in Computer Science and Software Engineering, 7, 151\u2013156. https:\/\/doi.org\/10.23956\/ijarcsse\/V7I6\/0254","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09359-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-09359-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09359-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T09:56:37Z","timestamp":1650880597000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-09359-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,6]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["9359"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-09359-2","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,6]]},"assertion":[{"value":"4 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}