{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:39:28Z","timestamp":1767141568550,"version":"build-2238731810"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s11277-022-09669-z","type":"journal-article","created":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T07:02:54Z","timestamp":1662015774000},"page":"2841-2868","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Attack Resilient and Efficient Protocol based on Greedy Perimeter Coordinator Routing\u2014Mobility Awareness for Preventing the Attack in the VANET"],"prefix":"10.1007","volume":"126","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4852-6314","authenticated-orcid":false,"given":"Naziya","family":"Hussain","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Priti","family":"Maheshwary","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Piyush Kumar","family":"Shukla","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anoop","family":"Singh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,9,1]]},"reference":[{"key":"9669_CR1","doi-asserted-by":"crossref","unstructured":"Fiore, M., Harri, J., Filali, F., & Bonnet, C. (2007, March). Vehicular mobility simulation for VANETs. In 40th Annual Simulation Symposium (ANSS'07) (pp. 301-309). IEEE.","DOI":"10.1109\/ANSS.2007.44"},{"key":"9669_CR2","doi-asserted-by":"crossref","unstructured":"Lee, K. C., Lee, U., & Gerla, M. (2010). Survey of routing protocols in vehicular ad hoc networks. Advances in vehicular ad-hoc networks: Developments and challenges, 149\u2013170.","DOI":"10.4018\/978-1-61520-913-2.ch008"},{"issue":"4","key":"9669_CR3","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/S1570-8705(03)00040-4","volume":"1","author":"F Bai","year":"2003","unstructured":"Bai, F., Sadagopan, N., & Helmy, A. (2003). The IMPORTANT framework for analyzing the impact of mobility on performance of RouTing protocols for adhoc NeTworks. Ad hoc networks, 1(4), 383\u2013403.","journal-title":"Ad hoc networks"},{"key":"9669_CR4","unstructured":"Bustamante, D. R. C. F. E. (2005). An integrated mobility and traffic model for vehicular wireless networks. In: Second ACM\ninternational workshop on vehicular ad hoc networks (VANET\u201905)."},{"issue":"5","key":"9669_CR5","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1002\/wcm.72","volume":"2","author":"T Camp","year":"2002","unstructured":"Camp, T., Boleng, J., & Davies, V. (2002). A survey of mobility models for ad hoc network research. Wireless communications and mobile computing, 2(5), 483\u2013502.","journal-title":"Wireless communications and mobile computing"},{"key":"9669_CR6","doi-asserted-by":"crossref","unstructured":"Bai, F., Sadagopan, N., & Helmy, A. (2003, March). IMPORTANT: A framework to systematically analyze the Impact of Mobility on Performance of RouTing protocols for Adhoc NeTworks. In IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428) (Vol. 2, pp. 825-835). IEEE.","DOI":"10.1109\/INFCOM.2003.1208920"},{"issue":"12","key":"9669_CR7","doi-asserted-by":"publisher","first-page":"329","DOI":"10.14257\/ijseia.2016.10.12.29","volume":"10","author":"N Hussain","year":"2016","unstructured":"Hussain, N., Singh, A., & Shukla, P. K. (2016). In depth analysis of attacks & countermeasures in vehicular ad hoc network. International Journal of Software Engineering and Its Applications, 10(12), 329\u2013368.","journal-title":"International Journal of Software Engineering and Its Applications"},{"key":"9669_CR8","unstructured":"Davies, V. A. (2000). Evaluating mobility models within an ad hoc network (Master's thesis, advisor: Tracy Camp, Department of mathematical and computer sciences. Colorado School of Mines)."},{"key":"9669_CR9","doi-asserted-by":"crossref","unstructured":"Saha, A. K., & Johnson, D. B. (2004). Modeling mobility for vehicular ad-hoc networks. In: Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks (pp. 91\u201392). ACM.","DOI":"10.1145\/1023875.1023892"},{"key":"9669_CR10","doi-asserted-by":"crossref","unstructured":"Choffnes, D. R., & Bustamante, F. E. (2005). An integrated mobility and traffic model for vehicular wireless networks. In Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks (pp. 69\u201378). ACM.","DOI":"10.1145\/1080754.1080765"},{"issue":"5","key":"9669_CR11","doi-asserted-by":"publisher","first-page":"414","DOI":"10.4103\/0256-4602.103175","volume":"29","author":"M Zuhairi","year":"2012","unstructured":"Zuhairi, M., Zafar, H., & Harle, D. (2012). The impact of mobility models on the performance of mobile Ad Hoc network routing protocol. IETE Technical Review, 29(5), 414\u2013420.","journal-title":"IETE Technical Review"},{"key":"9669_CR12","unstructured":"Rai, A. P., Datia, S. R. I. T. S., Srivastava, V., Gwalior, I. T. M., & Khare, P. (2014). Effect of Mobility Models on the performance of Proactive and Reactive Routing Protocols. International Journal of Engineering and Innovative Technology (IJEIT), 3(12)."},{"key":"9669_CR13","doi-asserted-by":"crossref","unstructured":"Rani, P., Sharma, N., & Singh, P. K. (2011, September). Performance comparison of VANET routing protocols. In: Wireless communications, networking and mobile computing (WiCOM), 2011 7th international conference on (pp. 1\u20134). IEEE.","DOI":"10.1109\/wicom.2011.6040428"},{"key":"9669_CR14","doi-asserted-by":"crossref","unstructured":"Ahmad, N., & Hussain, S. Z. (2013). Performance analysis of adaptive routing protocol based on different mobility model with varying network size.","DOI":"10.1049\/cp.2013.2325"},{"issue":"5","key":"9669_CR15","doi-asserted-by":"publisher","first-page":"509","DOI":"10.4304\/jnw.5.5.509-516","volume":"5","author":"N Meghanathan","year":"2010","unstructured":"Meghanathan, N. (2010). Impact of the gauss-markov mobility model on network connectivity, lifetime and hop count of routes for mobile ad hoc networks. JNW, 5(5), 509\u2013516.","journal-title":"JNW"},{"issue":"5","key":"9669_CR16","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1109\/TNET.2007.905154","volume":"15","author":"G Sharma","year":"2007","unstructured":"Sharma, G., Mazumdar, R., & Shroff, N. B. (2007). Delay and capacity trade-offs in mobile ad hoc networks: a global perspective. IEEE\/ACM Transactions on Networking (ToN), 15(5), 981\u2013992.","journal-title":"IEEE\/ACM Transactions on Networking (ToN)"},{"key":"9669_CR17","unstructured":"Muhtadi, A., Perdana, D., & Munadi, R. (2015). Performance Evaluation of AODV, DSDV, and ZRP Using Vehicular Traffic Load Balancing Scheme on VANETs. International journal of simulation system, science and technology."},{"key":"9669_CR18","doi-asserted-by":"crossref","unstructured":"Perdana, D., & Sari, R. F. (2013). Mobility models performance analysis using random Dijkstra algorithm and Doppler Effect for IEEE 1609.4 standard. International journal of simulation, systems, science, and technology, united kingdom simulation society.","DOI":"10.5013\/IJSSST.a.14.03.05"},{"issue":"5","key":"9669_CR19","doi-asserted-by":"publisher","first-page":"718","DOI":"10.1109\/TNET.2003.815301","volume":"11","author":"B Liang","year":"2003","unstructured":"Liang, B., & Haas, Z. J. (2003). Predictive distance-based mobility management for multidimensional PCS networks. IEEE\/ACM Transactions on Networking, 11(5), 718\u2013732.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"9669_CR20","doi-asserted-by":"crossref","unstructured":"Ariyakhajorn, J., Wannawilai, P., & Sathitwiriyawong, C. (2006, October). A comparative study of random waypoint and gauss-markov mobility models in the performance evaluation of manet. In: Communications and information technologies, 2006. ISCIT'06. International symposium on (pp. 894\u2013899). IEEE","DOI":"10.1109\/ISCIT.2006.339866"},{"key":"9669_CR21","unstructured":"Hussain, N., Maheshwary, P., Shukla, P. K., & Singh, A. (2017). Simulation-based performance evaluation of GPSR and modified-GPCR routing protocols in vehicular Ad-hoc Network. IJCSIS."},{"issue":"3","key":"9669_CR22","first-page":"1613","volume":"13","author":"N Hussain","year":"2018","unstructured":"Hussain, N., Maheshwary, P., Shukla, P. K., & Singh, A. (2018). Attack resilient & efficient QoS based GPCR-ARE Protocol for VANET. International Journal of Applied Engineering Research, 13(3), 1613\u20131622.","journal-title":"International Journal of Applied Engineering Research"},{"key":"9669_CR23","doi-asserted-by":"crossref","unstructured":"Hussain, N., & Rani, P. (2020). Comparative studied based on attack resilient and efficient protocol with intrusion detection system based on deep neural network for vehicular system security. In: Distributed Artificial Intelligence (pp. 217\u2013236). CRC Press.","DOI":"10.1201\/9781003038467-13"},{"key":"9669_CR24","unstructured":"https:\/\/www.isi.edu\/nsnam\/ns"}],"updated-by":[{"DOI":"10.1007\/s11277-022-10047-y","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000}}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09669-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-022-09669-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09669-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T11:43:59Z","timestamp":1666266239000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-022-09669-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,1]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["9669"],"URL":"https:\/\/doi.org\/10.1007\/s11277-022-09669-z","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,1]]},"assertion":[{"value":"7 June 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2022","order":3,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":4,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The original version of this article was revised: The author name Priti Maheshwary was incorrectly written as Priti Maheshwari. The original article has been corrected.","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2022","order":6,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":7,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11277-022-10047-y","URL":"https:\/\/doi.org\/10.1007\/s11277-022-10047-y","order":9,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have\u00a0no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}