{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:41:32Z","timestamp":1740148892883,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s12083-021-01250-y","type":"journal-article","created":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T13:20:40Z","timestamp":1633526440000},"page":"355-368","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["LocTrust: A local and global consensus-combined trust model in MANETs"],"prefix":"10.1007","volume":"15","author":[{"given":"Shuai","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Ge","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7708-8037","authenticated-orcid":false,"given":"Xianfu","family":"Meng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,6]]},"reference":[{"issue":"3","key":"1250_CR1","doi-asserted-by":"publisher","first-page":"180","DOI":"10.2174\/2213275911666180829104117","volume":"12","author":"B Mahapatra","year":"2019","unstructured":"Mahapatra B, Patnaik S, Nayyar A (2019) Effect of multiple-agent deployment in MANET. Recent Pat Comput Sci 12(3):180\u2013190","journal-title":"Recent Pat Comput Sci"},{"key":"1250_CR2","doi-asserted-by":"crossref","unstructured":"Nayyar A (2012) Simulation based evaluation of reactive routing protocol for MANET. In 2012 Second International Conference on Advanced Computing & Communication Technologies. IEEE: 561\u2013568","DOI":"10.1109\/ACCT.2012.104"},{"key":"1250_CR3","doi-asserted-by":"publisher","DOI":"10.47893\/IJCSI.2013.1087","author":"A Nayyar","year":"2001","unstructured":"Nayyar A (2001) Cross-layer system for cluster based data access in MANET\u2019S. IJCSI. https:\/\/doi.org\/10.47893\/IJCSI.2013.1087","journal-title":"IJCSI"},{"issue":"1","key":"1250_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2018.08.005","volume":"82","author":"Y Jahir","year":"2019","unstructured":"Jahir Y, Atiquzzaman M, Refai H et al (2019) Routing protocols and architecture for disaster area network: A survey. Ad Hoc Netw 82(1):1\u201314","journal-title":"Ad Hoc Netw"},{"issue":"1","key":"1250_CR5","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/TMC.2018.2828814","volume":"18","author":"RJ Cai","year":"2019","unstructured":"Cai RJ, Li XJ, Chong PHJ (2019) An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE Trans Mob Comput 18(1):42\u201355","journal-title":"IEEE Trans Mob Comput"},{"key":"1250_CR6","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.adhoc.2016.04.008","volume":"47","author":"V Sucasas","year":"2016","unstructured":"Sucasas V, Radwan A, Marques H et al (2016) A survey on clustering techniques for cooperative wireless networks. Ad Hoc Netw 47:53\u201381","journal-title":"Ad Hoc Netw"},{"key":"1250_CR7","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.comnet.2015.12.007","volume":"96","author":"MA Mojamed","year":"2016","unstructured":"Mojamed MA, Kolberg M (2016) Structured Peer-to-Peer overlay deployment on MANET: A survey. Comput Netw 96:29\u201347","journal-title":"Comput Netw"},{"key":"1250_CR8","doi-asserted-by":"publisher","first-page":"3654","DOI":"10.1016\/j.comnet.2013.08.012","volume":"57","author":"E Atsan","year":"2013","unstructured":"Atsan E, \u00d6zkasap \u00d6 (2013) SCALAR: Scalable data lookup and replication protocol for mobile ad hoc networks. Comput Netw 57:3654\u20133672","journal-title":"Comput Netw"},{"key":"1250_CR9","doi-asserted-by":"publisher","first-page":"1641","DOI":"10.1016\/j.adhoc.2013.03.003","volume":"11","author":"M Orlinski","year":"2013","unstructured":"Orlinski M, Filer N (2013) The rise and fall of spatio-temporal clusters in mobile ad hoc networks. Ad Hoc Netw 11:1641\u20131654","journal-title":"Ad Hoc Netw"},{"issue":"8","key":"1250_CR10","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.adhoc.2017.08.007","volume":"66","author":"A Banerjee","year":"2017","unstructured":"Banerjee A, King C-T, Hsiao H-C (2017) On state maintenance in cluster-based mobile ad-hoc networks. Ad Hoc Netw 66(8):95\u2013109","journal-title":"Ad Hoc Netw"},{"key":"1250_CR11","doi-asserted-by":"publisher","first-page":"2455","DOI":"10.1007\/s11276-016-1287-y","volume":"23","author":"GM Borkar","year":"2017","unstructured":"Borkar GM, Mahajan AR (2017) A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wirel Netw 23:2455\u20132472","journal-title":"Wirel Netw"},{"issue":"3","key":"1250_CR12","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/s12083-016-0503-y","volume":"11","author":"N Amirazodi","year":"2018","unstructured":"Amirazodi N, Saghiri AM, Meybodi M (2018) An adaptive algorithm for super-peer selection considering peer\u2019s capacity in mobile peer-to-peer networks based on learning automata. Peer Peer Netw Appl 11(3):74\u201389","journal-title":"Peer Peer Netw Appl"},{"issue":"3","key":"1250_CR13","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1111\/glob.12214","volume":"19","author":"M Campbell-Verduyn","year":"2019","unstructured":"Campbell-Verduyn M, Goguen M (2019) Blockchains, trust and action nets: extending the pathologies of financial globalization. Global Netw 19(3):308\u2013328","journal-title":"Global Netw"},{"key":"1250_CR14","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.cose.2019.04.007","volume":"84","author":"L Zhong","year":"2019","unstructured":"Zhong L, Wu Q, Xie J et al (2019) A secure large-scale instant payment system based on blockchain. Comput Secur 84:349\u2013364","journal-title":"Comput Secur"},{"key":"1250_CR15","doi-asserted-by":"publisher","first-page":"22328","DOI":"10.1109\/ACCESS.2019.2896108","volume":"7","author":"W Wang","year":"2019","unstructured":"Wang W, Hoang DT, Hu P et al (2019) A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access 7:22328\u201322370","journal-title":"IEEE Access"},{"issue":"10","key":"1250_CR16","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.comnet.2016.07.008","volume":"108","author":"X Meng","year":"2016","unstructured":"Meng X, Ren S (2016) An outlier mining-based malicious node detection model for hybrid P2P networks. Comput Netw 108(10):29\u201339","journal-title":"Comput Netw"},{"issue":"2","key":"1250_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/fi10020016","volume":"10","author":"MS Pathan","year":"2018","unstructured":"Pathan MS, Zhu N, He J et al (2018) An efficient trust-based scheme for secure and quality of service routing in MANETs. Future Internet 10(2):1\u201316","journal-title":"Future Internet"},{"key":"1250_CR18","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.jnca.2018.07.008","volume":"123","author":"AM Shabut","year":"2018","unstructured":"Shabut AM, Kaiser MS, Dahal KP et al (2018) A multidimensional trust evaluation model for MANETs. J Netw Comput Appl 123:32\u201341","journal-title":"J Netw Comput Appl"},{"issue":"10","key":"1250_CR19","first-page":"2118","volume":"37","author":"X Wu","year":"2014","unstructured":"Wu X (2014) Enhanced stable group model-based trust evaluation scheme for mobile P2P networks. Chin J Comput 37(10):2118\u20132127","journal-title":"Chin J Comput"},{"key":"1250_CR20","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1007\/s12083-020-01064-4","volume":"14","author":"Z Zhu","year":"2021","unstructured":"Zhu Z, Xu Y, Su Z (2021) A reputation-based cooperative content delivery with parking vehicles in vehicular ad-hoc networks. Peer Peer Netw Appl 14:1531\u20131547","journal-title":"Peer Peer Netw Appl"},{"key":"1250_CR21","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.adhoc.2015.05.004","volume":"33","author":"I-R Chen","year":"2015","unstructured":"Chen I-R, Guo J (2015) Hierarchical trust management of community of interest groups in mobile ad hoc networks. Ad Hoc Netw 33:154\u2013167","journal-title":"Ad Hoc Netw"},{"key":"1250_CR22","doi-asserted-by":"publisher","first-page":"2096","DOI":"10.1016\/j.adhoc.2012.02.009","volume":"11","author":"H Xia","year":"2013","unstructured":"Xia H, Jia Z, Li X et al (2013) Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw 11:2096\u20132114","journal-title":"Ad Hoc Netw"},{"key":"1250_CR23","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1007\/s12083-015-0411-6","volume":"9","author":"H-S Yang","year":"2016","unstructured":"Yang H-S, Sun J-H (2016) A study on hybrid trust evaluation model for identifying malicious behavior in mobile P2P. Peer Peer Netw Appl 9:578\u2013587","journal-title":"Peer Peer Netw Appl"},{"key":"1250_CR24","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s12083-011-0103-9","volume":"5","author":"X Wu","year":"2012","unstructured":"Wu X (2012) A distributed trust management model for mobile P2P networks. Peer Peer Netw Appl 5:193\u2013204","journal-title":"Peer Peer Netw Appl"},{"key":"1250_CR25","first-page":"19","volume":"5","author":"B Sharma","year":"2015","unstructured":"Sharma B, Bhatia RS, Singh AK (2015) A Secure Cluster Formation Protocol for Safe Consensus in Hierarchical Mobile Ad Hoc Networks. Int J Sens Wirel Commun Control 5:19\u201331","journal-title":"Int J Sens Wirel Commun Control"},{"issue":"2","key":"1250_CR26","doi-asserted-by":"publisher","first-page":"4837","DOI":"10.1007\/s10586-018-2405-7","volume":"22","author":"S Sargunavathi","year":"2019","unstructured":"Sargunavathi S, Manickam JML (2019) Enhanced trust based encroachment discovery system for Mobile Ad-hoc networks. Clust Comput 22(2):4837\u20134847","journal-title":"Clust Comput"},{"issue":"4","key":"1250_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSEN.2018.2879207","volume":"19","author":"J Yang","year":"2019","unstructured":"Yang J, He S, Xu Y et al (2019) A trusted routing scheme using blockchain and reinforcement learning for wireless sensor networks. Sensors 19(4):1\u201319","journal-title":"Sensors"},{"key":"1250_CR28","doi-asserted-by":"crossref","unstructured":"Goka S, Shigeno H (2018) Distributed management system for trust and reward in mobile ad hoc networks. 15th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE: 1\u20136","DOI":"10.1109\/CCNC.2018.8319278"},{"issue":"3","key":"1250_CR29","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.jss.2015.12.018","volume":"113","author":"X Meng","year":"2016","unstructured":"Meng X, Li T, Deng Y (2016) preferTrust: An ordered preferences-based trust model in peer-to-peer networks. J Syst Softw 113(3):309\u2013323","journal-title":"J Syst Softw"},{"issue":"1","key":"1250_CR30","doi-asserted-by":"publisher","first-page":"19","DOI":"10.5626\/JCSE.2011.5.1.019","volume":"5","author":"J-H Kim","year":"2011","unstructured":"Kim J-H, Lee K-J, Kim T-H et al (2011) Effective routing schemes for double-layered peer-to-peer systems in MANET. J Comput Sci Eng 5(1):19\u201331","journal-title":"J Comput Sci Eng"},{"issue":"3","key":"1250_CR31","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/s12083-017-0577-1","volume":"11","author":"X Meng","year":"2018","unstructured":"Meng X (2018) sureTrust: A super peer-aware trust model for 2-level P2P networks. Peer Peer Netw Appl 11(3):619\u2013631","journal-title":"Peer Peer Netw Appl"},{"key":"1250_CR32","doi-asserted-by":"crossref","unstructured":"Perkins CE, Belding-Royer EM, Das SR (2003)\u00a0Ad hoc on-demand distance vector (AODV) routing. Internet Draft","DOI":"10.17487\/rfc3561"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01250-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01250-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01250-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T02:15:43Z","timestamp":1642644943000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01250-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["1250"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01250-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2021,10,6]]},"assertion":[{"value":"20 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}