{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:11:57Z","timestamp":1760746317383,"version":"build-2065373602"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12083-025-02094-6","type":"journal-article","created":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T18:59:00Z","timestamp":1757012340000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cross-layer trust management to secure wireless communication routing protocol"],"prefix":"10.1007","volume":"18","author":[{"given":"Monika","family":"Dangore","sequence":"first","affiliation":[]},{"given":"Hare Ram","family":"Sah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,4]]},"reference":[{"key":"2094_CR1","first-page":"37","volume":"2018","author":"HB Mahajan","year":"2018","unstructured":"Mahajan HB, Badarla A (2018) Application of Internet of Things for Smart Precision Farming: Solutions and Challenges. International Journal of Advanced Science and Technology 2018:37\u201345","journal-title":"International Journal of Advanced Science and Technology"},{"key":"2094_CR2","doi-asserted-by":"publisher","unstructured":"Yu FR. Tang H, Bu S, Zheng D (2013) Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks. EURASIP Journal on Wireless Communications and Networking, 2013(1). https:\/\/doi.org\/10.1186\/1687-1499-2013-188","DOI":"10.1186\/1687-1499-2013-188"},{"key":"2094_CR3","doi-asserted-by":"publisher","unstructured":"Alhayani B, Kwekha-Rashid AS, Mahajan HB et al (2022) 5G standards for the Industry 4.0 enabled communication systems using artificial intelligence: perspective of smart healthcare system. Appl Nanosci. 13:1807, https:\/\/doi.org\/10.1007\/s13204-021-02152-4","DOI":"10.1007\/s13204-021-02152-4"},{"key":"2094_CR4","doi-asserted-by":"publisher","unstructured":"Bruzgiene R, Narbutaite L, Adomkus T (2017) MANET network in internet of things system. In J. H. Ortiz, & A. a. de la Cruz (Eds.), Ad Hoc Networks. IntechOpen. https:\/\/doi.org\/10.5772\/66408","DOI":"10.5772\/66408"},{"key":"2094_CR5","unstructured":"Adjih C, Raffo D (2005) Attacks Against OLSR: Distributed Key Management for Security"},{"key":"2094_CR6","doi-asserted-by":"publisher","unstructured":"Mahajan HB, Rashid AS, Junnarkar AA et al (2022) Integration of Healthcare 4.0 and blockchain into secure cloud-based electronic health records systems. Appl Nanosci\u00a0https:\/\/doi.org\/10.1007\/s13204-021-02164-0","DOI":"10.1007\/s13204-021-02164-0"},{"issue":"4","key":"2094_CR7","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1109\/tdsc.2006.58","volume":"3","author":"Y Zhang","year":"2006","unstructured":"Zhang Y, Liu W, Lou W, Fang Y (2006) Securing mobile ad hoc networks with certificateless public keys. IEEE Trans Reliab Secur Comput 3(4):386\u2013399. https:\/\/doi.org\/10.1109\/tdsc.2006.58","journal-title":"IEEE Trans Reliab Secur Comput"},{"issue":"2","key":"2094_CR8","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/mwc.2009.4907556","volume":"16","author":"Y Fang","year":"2009","unstructured":"Fang Y, Zhu X, Zhang Y (2009) Securing resource-constrained wireless ad hoc networks. IEEE Wirel Commun 16(2):24\u201330. https:\/\/doi.org\/10.1109\/mwc.2009.4907556","journal-title":"IEEE Wirel Commun"},{"issue":"4","key":"2094_CR9","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1109\/tnsm.2010.1012.0362","volume":"7","author":"FR Yu","year":"2010","unstructured":"Yu FR, Tang H, Mason PC, Wang F (2010) A hierarchical identity based key management scheme in tactical mobile ad hoc networks. IEEE Trans Network Serv Manage 7(4):258\u2013267. https:\/\/doi.org\/10.1109\/tnsm.2010.1012.0362","journal-title":"IEEE Trans Network Serv Manage"},{"key":"2094_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4236\/jcc.2014.23001","volume":"02","author":"Y Xiong","year":"2014","unstructured":"Xiong Y, Elaalim K (2014) Distributed and cooperative anomaly detection scheme for mobile ad hoc networks. J Comput Commun 02:1\u201310. https:\/\/doi.org\/10.4236\/jcc.2014.23001","journal-title":"J Comput Commun"},{"key":"2094_CR11","doi-asserted-by":"publisher","first-page":"101701","DOI":"10.1016\/j.sysarc.2019.101701","volume":"105","author":"K Khan","year":"2019","unstructured":"Khan K, Mehmood A, Khan S, Khan MA, Iqbal Z, Mashwani WK (2019) A survey on Intrusion Detection and Prevention in Wireless Ad-hoc Networks. Journal of Systems Architecture 105:101701. https:\/\/doi.org\/10.1016\/j.sysarc.2019.101701","journal-title":"Journal of Systems Architecture"},{"issue":"9","key":"2094_CR12","doi-asserted-by":"publisher","first-page":"3064","DOI":"10.1109\/twc.2011.071411.102123","volume":"10","author":"S Bu","year":"2011","unstructured":"Bu S, Yu FR, Liu XP, Tang H (2011) Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks. IEEE Trans Wireless Commun 10(9):3064\u20133073. https:\/\/doi.org\/10.1109\/twc.2011.071411.102123","journal-title":"IEEE Trans Wireless Commun"},{"key":"2094_CR13","doi-asserted-by":"publisher","unstructured":"Chiejina E, Xiao H, Christianson B (2014) A dynamic reputation management system for mobile ad hoc networks. 2014 6th Computer Science and Electronic Engineering Conference (CEEC). https:\/\/doi.org\/10.1109\/ceec.2014.6958568","DOI":"10.1109\/ceec.2014.6958568"},{"key":"2094_CR14","doi-asserted-by":"publisher","unstructured":"Noorian Z, Noorian M, Fleming M, Marsh S (2012) A strategic reputation-Bbased mechanism for mobile Ad Hoc Networks. In: Kosseim, L., Inkpen, D. (eds) Advances in Artificial Intelligence. Canadian AI 2012. Lecture Notes in Computer Science, vol 7310. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-30353-1_13","DOI":"10.1007\/978-3-642-30353-1_13"},{"key":"2094_CR15","doi-asserted-by":"publisher","unstructured":"Bhalaji N, Shanmugam A (2010) A trust based technique to isolate non-forwarding nodes in DSR basedmobile adhoc networks. In: Meghanathan N, Boumerdassi S, Chaki N, Nagamalai D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-14478-3_13","DOI":"10.1007\/978-3-642-14478-3_13"},{"issue":"2","key":"2094_CR16","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/s11704-014-4212-5","volume":"9","author":"A Ahmed","year":"2014","unstructured":"Ahmed A, Abu Bakar K, Channa MI, Haseeb K, Khan AW (2014) A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. Front Comput Sci 9(2):280\u2013296. https:\/\/doi.org\/10.1007\/s11704-014-4212-5","journal-title":"Front Comput Sci"},{"key":"2094_CR17","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.procs.2016.07.363","volume":"92","author":"S Sarika","year":"2016","unstructured":"Sarika S, Pravin A, Vijayakumar A, Selvamani K (2016) Security issues in mobile ad hoc networks. Procedia Comput Sci 92:329\u2013335. https:\/\/doi.org\/10.1016\/j.procs.2016.07.363","journal-title":"Procedia Comput Sci"},{"key":"2094_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/9629381","volume":"2019","author":"S Hameed","year":"2019","unstructured":"Hameed S, Khan FI, Hameed B (2019) Understanding security requirements and challenges in internet of things (IoT): a review. J Comput Netw Commun 2019:1\u201314. https:\/\/doi.org\/10.1155\/2019\/9629381","journal-title":"J Comput Netw Commun"},{"key":"2094_CR19","doi-asserted-by":"publisher","unstructured":"Karlsson, Jonny & Dooley, Laurence & Pulkkis, G\u00f6ran. (2018). Secure Routing for MANET Connected Internet of Things Systems. 114\u2013119. https:\/\/doi.org\/10.1109\/FiCloud.2018.00024.","DOI":"10.1109\/FiCloud.2018.00024"},{"key":"2094_CR20","doi-asserted-by":"publisher","unstructured":"Gupta S, Jha HN (2021) Performance Analysis of MANET Under Grayhole Attack Using AODV Protocol. In: Das, SK, Samanta, S, Dey, N, Patel, BS, Hassanien, AE (eds) Architectural Wireless Networks Solutions and Security Issues. Lecture Notes in Networks and Systems, vol 196. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-16-0386-0_15","DOI":"10.1007\/978-981-16-0386-0_15"},{"issue":"2","key":"2094_CR21","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/jsac.2005.861390","volume":"24","author":"G Theodorakopoulos","year":"2006","unstructured":"Theodorakopoulos G, Baras JS (2006) On trust models and trust evaluation metrics for ad hoc networks. IEEE J Sel Areas Commun 24(2):318\u2013328. https:\/\/doi.org\/10.1109\/jsac.2005.861390","journal-title":"IEEE J Sel Areas Commun"},{"issue":"3","key":"2094_CR22","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1109\/tnsm.2010.1009.i9p0339","volume":"7","author":"PB Velloso","year":"2010","unstructured":"Velloso PB, Laufer RP, Cunha DD, Duarte OC, Pujolle G (2010) Trust management in mobile ad hoc networks using a scalable maturity-based model. IEEE Trans Network Serv Manag 7(3):172\u2013185. https:\/\/doi.org\/10.1109\/tnsm.2010.1009.i9p0339","journal-title":"IEEE Trans Network Serv Manag"},{"issue":"2","key":"2094_CR23","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/jsac.2005.861389","volume":"24","author":"YL Sun","year":"2006","unstructured":"Sun YL, Wei Yu, Han Z, Liu KJR (2006) Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J Sel Areas Commun 24(2):305\u2013317. https:\/\/doi.org\/10.1109\/jsac.2005.861389","journal-title":"IEEE J Sel Areas Commun"},{"issue":"9","key":"2094_CR24","doi-asserted-by":"publisher","first-page":"7579","DOI":"10.1109\/tvt.2015.2495325","volume":"65","author":"S Tan","year":"2016","unstructured":"Tan S, Li X, Dong Q (2016) A trust management system for securing data plane of ad-hoc networks. IEEE Trans Veh Technol 65(9):7579\u20137592. https:\/\/doi.org\/10.1109\/tvt.2015.2495325","journal-title":"IEEE Trans Veh Technol"},{"issue":"3","key":"2094_CR25","doi-asserted-by":"publisher","first-page":"878","DOI":"10.1109\/jsyst.2014.2345912","volume":"9","author":"S Kraounakis","year":"2015","unstructured":"Kraounakis S, Demetropoulos IN, Michalas A, Obaidat MS, Sarigiannidis PG, Louta MD (2015) A robust reputation-based computational model for trust establishment in pervasive systems. IEEE Syst J 9(3):878\u2013891. https:\/\/doi.org\/10.1109\/jsyst.2014.2345912","journal-title":"IEEE Syst J"},{"issue":"9","key":"2094_CR26","doi-asserted-by":"publisher","first-page":"4647","DOI":"10.1109\/tvt.2014.2313865","volume":"63","author":"Z Wei","year":"2014","unstructured":"Wei Z, Tang H, Yu FR, Wang M, Mason P (2014) Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans Veh Technol 63(9):4647\u20134658. https:\/\/doi.org\/10.1109\/tvt.2014.2313865","journal-title":"IEEE Trans Veh Technol"},{"issue":"4","key":"2094_CR27","doi-asserted-by":"publisher","first-page":"1140","DOI":"10.1109\/tpds.2013.138","volume":"26","author":"MMEA Mahmoud","year":"2015","unstructured":"Mahmoud MMEA, Lin X, Shen X (2015) Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Trans Parallel Distrib Syst 26(4):1140\u20131153. https:\/\/doi.org\/10.1109\/tpds.2013.138","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"2094_CR28","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-016-2667-6","author":"G Dhananjayan","year":"2016","unstructured":"Dhananjayan G, Subbiah J (2016) T2AR: trust-aware ad-hoc routing protocol for MANET. Springerplus. https:\/\/doi.org\/10.1186\/s40064-016-2667-6","journal-title":"Springerplus"},{"key":"2094_CR29","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5017","author":"S Sankara Narayanan","year":"2018","unstructured":"Sankara Narayanan S, Murugaboopathi G (2018) Modified secure AODV protocol to prevent wormhole attack in MANET. Concurrency Computat Pract Exper. https:\/\/doi.org\/10.1002\/cpe.5017","journal-title":"Concurrency Computat Pract Exper"},{"issue":"8","key":"2094_CR30","first-page":"509","volume":"78","author":"Khondekar Hassan","year":"2019","unstructured":"Hassan Khondekar, Mandal Jyotsna, Mondal Shukla (2019) Enhanced Trust-based Intrusion Detection System in MANET. Journal of Scientific & Industrial Research. 78(8):509\u201312","journal-title":"Journal of Scientific & Industrial Research."},{"key":"2094_CR31","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.cosrev.2019.03.001","volume":"32","author":"N Khanna","year":"2019","unstructured":"Khanna N, Sachdeva M (2019) A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs. Comput Sci Rev 32:24\u201344. https:\/\/doi.org\/10.1016\/j.cosrev.2019.03.001","journal-title":"Comput Sci Rev"},{"key":"2094_CR32","doi-asserted-by":"publisher","unstructured":"El-Semary AM, Diab H (2019) BP-AODV: Blackhole Protected AODV Routing Protocol for MANETs based on Chaotic Map. IEEE Access, 1\u20131. https:\/\/doi.org\/10.1109\/access.2019.2928804","DOI":"10.1109\/access.2019.2928804"},{"issue":"5","key":"2094_CR33","doi-asserted-by":"publisher","first-page":"155014772092162","DOI":"10.1177\/1550147720921624","volume":"16","author":"KH Mohammadani","year":"2020","unstructured":"Mohammadani KH, Memon KA, Memon I, Hussaini NN, Fazal H (2020) Preamble time-division multiple access fixed slot assignment protocol for secure mobile ad hoc networks. Int J Distrib Sens Networks 16(5):155014772092162. https:\/\/doi.org\/10.1177\/1550147720921624","journal-title":"Int J Distrib Sens Networks"},{"key":"2094_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/8819587","volume":"2020","author":"H Yang","year":"2020","unstructured":"Yang H (2020) A study on improving secure routing performance using trust model in MANET. Mob Inf Syst 2020:1\u201317. https:\/\/doi.org\/10.1155\/2020\/8819587","journal-title":"Mob Inf Syst"},{"issue":"3","key":"2094_CR35","doi-asserted-by":"publisher","first-page":"1993","DOI":"10.1007\/s11277-021-08315-4","volume":"119","author":"NR Marathe","year":"2021","unstructured":"Marathe NR, Shinde SK (2021) Multidimensional multi-attribute approach to counter the routing attacks on MANET. Wirel Pers Commun 119(3):1993\u20132016. https:\/\/doi.org\/10.1007\/s11277-021-08315-4","journal-title":"Wirel Pers Commun"},{"key":"2094_CR36","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s11277-021-09359-2","volume":"124","author":"G Vidhya Lakshmi","year":"2022","unstructured":"Vidhya Lakshmi G, Vaishnavi P (2022) An efficient security framework for trusted and secure routing in MANET: a comprehensive solution. Wireless Pers Commun 124:333\u2013348. https:\/\/doi.org\/10.1007\/s11277-021-09359-2","journal-title":"Wireless Pers Commun"},{"issue":"2","key":"2094_CR37","doi-asserted-by":"publisher","DOI":"10.3390\/s22020571","volume":"22","author":"E Chiejina","year":"2022","unstructured":"Chiejina E, Xiao H, Christianson B, Mylonas A, Chiejina C (2022) A robust dirichlet reputation and trust evaluation of nodes in mobile ad hoc networks. Sensors 22(2):571. https:\/\/doi.org\/10.3390\/s22020571","journal-title":"Sensors"},{"key":"2094_CR38","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4446","author":"K Anish","year":"2022","unstructured":"Anish K, Yamini A, Stephy J, Kannan S, Ravi V (2022) Improving routing disruption attack detection in MANETs using efficient trust establishment. Trans Emerging Tel Commun Technol. https:\/\/doi.org\/10.1002\/ett.4446","journal-title":"Trans Emerging Tel Commun Technol"},{"key":"2094_CR39","doi-asserted-by":"publisher","first-page":"2309","DOI":"10.1016\/j.procs.2023.01.206","volume":"218","author":"S Shafi","year":"2023","unstructured":"Shafi S, Mounika S, Velliangiri S (2023) Machine learning and trust based AODV routing protocol to mitigate flooding and blackhole attacks in MANET. Procedia Comput Sci 218:2309\u20132318. https:\/\/doi.org\/10.1016\/j.procs.2023.01.206","journal-title":"Procedia Comput Sci"},{"key":"2094_CR40","doi-asserted-by":"publisher","first-page":"2794","DOI":"10.1007\/s12083-023-01560-3","volume":"16","author":"M Rao","year":"2023","unstructured":"Rao M, Chaudhary P, Sheoran K et al (2023) A secure routing protocol using hybrid deep regression based trust evaluation and clustering for mobile ad-hoc network. Peer-to-Peer Netw Appl 16:2794\u20132810. https:\/\/doi.org\/10.1007\/s12083-023-01560-3","journal-title":"Peer-to-Peer Netw Appl"},{"key":"2094_CR41","doi-asserted-by":"publisher","first-page":"13046","DOI":"10.1038\/s41598-023-40273-8","volume":"13","author":"M Hosseinzadeh","year":"2023","unstructured":"Hosseinzadeh M, Yoo J, Ali S et al (2023) A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs). Sci Rep 13:13046. https:\/\/doi.org\/10.1038\/s41598-023-40273-8","journal-title":"Sci Rep"},{"issue":"17","key":"2094_CR42","doi-asserted-by":"publisher","first-page":"3652","DOI":"10.3390\/math11173652","volume":"11","author":"TS Malik","year":"2023","unstructured":"Malik TS, Tanveer J, Anwar S, Mufti MR, Afzal H, Kim A (2023) An efficient and secure fog based routing mechanism in IoT network. Mathematics 11(17):3652. https:\/\/doi.org\/10.3390\/math11173652","journal-title":"Mathematics"},{"issue":"12","key":"2094_CR43","doi-asserted-by":"publisher","first-page":"5526","DOI":"10.3390\/s23125526","volume":"23","author":"MA Saad","year":"2023","unstructured":"Saad MA, Jaafar R, Chellappan K (2023) Variable-length multiobjective social class optimization for trust-aware data gathering in wireless sensor networks. Sensors 23(12):5526. https:\/\/doi.org\/10.3390\/s23125526","journal-title":"Sensors"},{"issue":"9","key":"2094_CR44","doi-asserted-by":"publisher","first-page":"4407","DOI":"10.3390\/s23094407","volume":"23","author":"Y Cho","year":"2023","unstructured":"Cho Y, Qu G (2023) A hybrid trust model against insider packet drop attacks in wireless sensor networks. Sensors 23(9):4407. https:\/\/doi.org\/10.3390\/s23094407","journal-title":"Sensors"},{"key":"2094_CR45","doi-asserted-by":"publisher","first-page":"104926","DOI":"10.1016\/j.micpro.2023.104926","volume":"102","author":"MV Kadam","year":"2023","unstructured":"Kadam MV, Mahajan HB, Uke NJ, Futane PR (2023) Cybersecurity attacks mitigation in Internet of Vehicles communication system using reliable clustering and routing. Microprocess Microsyst 102:104926. https:\/\/doi.org\/10.1016\/j.micpro.2023.104926","journal-title":"Microprocess Microsyst"},{"key":"2094_CR46","doi-asserted-by":"publisher","first-page":"7777","DOI":"10.1007\/s12652-020-02502-0","volume":"12","author":"HB Mahajan","year":"2021","unstructured":"Mahajan HB, Badarla A, Junnarkar AA (2021) Cl-IoT: cross-layer internet of things protocol for intelligent manufacturing of smart farming. J Ambient Intell Human Comput 12:7777\u20137791. https:\/\/doi.org\/10.1007\/s12652-020-02502-0","journal-title":"J Ambient Intell Human Comput"},{"issue":"2","key":"2094_CR47","doi-asserted-by":"publisher","first-page":"274","DOI":"10.3390\/electronics12020274","volume":"12","author":"A Rajeswari","year":"2023","unstructured":"Rajeswari A, Lai W, Kavitha C, Kavin BP, Srividhya S (2023) A trust-based secure neuro fuzzy clustering technique for mobile ad hoc networks. Electronics 12(2):274\u2013274. https:\/\/doi.org\/10.3390\/electronics12020274","journal-title":"Electronics"},{"key":"2094_CR48","doi-asserted-by":"publisher","first-page":"3125","DOI":"10.1007\/s11277-021-08866-6","volume":"121","author":"HB Mahajan","year":"2021","unstructured":"Mahajan HB, Badarla A (2021) Cross-layer protocol for WSN-assisted IoT smart farming applications using nature inspired algorithm. Wireless Pers Commun 121:3125\u20133149. https:\/\/doi.org\/10.1007\/s11277-021-08866-6","journal-title":"Wireless Pers Commun"},{"issue":"1","key":"2094_CR49","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1007\/s11277-024-11641-y","volume":"139","author":"B Muthu","year":"2024","unstructured":"Muthu B, Sivaparthipan CB, Kumar RL, Jayanthi S, Lee C-C (2024) Trust-based energy efficient protocol over MANET using PTORA and RRFO. Wireless Pers Commun 139(1):653\u2013678. https:\/\/doi.org\/10.1007\/s11277-024-11641-y","journal-title":"Wireless Pers Commun"},{"issue":"5","key":"2094_CR50","doi-asserted-by":"publisher","first-page":"3200","DOI":"10.1007\/s12083-024-01746-3","volume":"17","author":"M Baumgartner","year":"2024","unstructured":"Baumgartner M, Papaj J, Kurkina N, Dobos L, Cizmar A (2024) Resilient enhancements of routing protocols in MANET. Peer-Peer Netw Appl 17(5):3200\u20133221. https:\/\/doi.org\/10.1007\/s12083-024-01746-3","journal-title":"Peer-Peer Netw Appl"},{"issue":"1","key":"2094_CR51","doi-asserted-by":"publisher","first-page":"3363923","DOI":"10.1155\/2024\/3363923","volume":"2024","author":"SV Kumari","year":"2024","unstructured":"Kumari SV, Anslam Sibi S, Selvan Shano Maria, Nadar KP (2024) RTO-TV: Routed Tree Optimization and Trust-Value-Based Security Scheme to Prevent Black Hole Attack in MANET. Journal of Sensors 2024(1):3363923. https:\/\/doi.org\/10.1155\/2024\/3363923","journal-title":"Journal of Sensors"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02094-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02094-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02094-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T06:39:14Z","timestamp":1760683154000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02094-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":51,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2094"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02094-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,9]]},"assertion":[{"value":"23 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"277"}}