{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:34:50Z","timestamp":1772120090361,"version":"3.50.1"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T00:00:00Z","timestamp":1617926400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T00:00:00Z","timestamp":1617926400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s12652-021-03195-9","type":"journal-article","created":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T13:02:23Z","timestamp":1617973343000},"page":"921-960","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Intelligent route discovery towards rushing attacks in ad hoc wireless networks"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5376-0327","authenticated-orcid":false,"given":"Udayakumar","family":"Allimuthu","sequence":"first","affiliation":[]},{"given":"K.","family":"Mahalakshmi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,9]]},"reference":[{"key":"3195_CR1","doi-asserted-by":"publisher","unstructured":"Al Shahrani AS (2011) Rushing attack in mobile ad hoc networks. In: 2011 Third international conference on intelligent networking and collaborative systems. IEEE, pp 752\u2013758. https:\/\/doi.org\/10.1109\/INCoS.2011.145","DOI":"10.1109\/INCoS.2011.145"},{"issue":"Special","key":"3195_CR2","first-page":"722","volume":"12","author":"U Allimuthu","year":"2017","unstructured":"Allimuthu U (2017) BAU FAM: biometric-blacklisting anonymous users using fictitious and adroit manager. J Adv Res Dyn Control Syst 12(Special):722\u2013737","journal-title":"J Adv Res Dyn Control Syst"},{"issue":"Special","key":"3195_CR3","first-page":"952","volume":"10","author":"U Allimuthu","year":"2018","unstructured":"Allimuthu U, Mahalakshmi K (2018a) Observed survey on efficient route interaction of mobile nodes in MANET. J Adv Res Dyn Control Syst 10(Special):952\u2013965","journal-title":"J Adv Res Dyn Control Syst"},{"issue":"Special","key":"3195_CR4","first-page":"984","volume":"10","author":"U Allimuthu","year":"2018","unstructured":"Allimuthu U, Mahalakshmi K (2018b) Efficient object-route interaction for finding old unused scrap car in Coimbatore Municipality. J Adv Res Dyn Control Syst 10(Special):984\u2013988","journal-title":"J Adv Res Dyn Control Syst"},{"key":"3195_CR5","doi-asserted-by":"publisher","first-page":"68953","DOI":"10.1109\/ACCESS.2020.2986010","volume":"8","author":"FA Al-Zahrani","year":"2020","unstructured":"Al-Zahrani FA (2020) On modeling optimizations and enhancing routing protocols for wireless multihop networks. IEEE Access 8:68953\u201368973. https:\/\/doi.org\/10.1109\/ACCESS.2020.2986010","journal-title":"IEEE Access"},{"key":"3195_CR6","doi-asserted-by":"publisher","first-page":"102213","DOI":"10.1016\/j.adhoc.2020.102213","volume":"106","author":"O Alzamzami","year":"2020","unstructured":"Alzamzami O, Mahgoub I (2020) Link utility aware geographic routing for urban VANETs using two-hop neighbor information. Ad Hoc Netw 106:102213. https:\/\/doi.org\/10.1016\/j.adhoc.2020.102213","journal-title":"Ad Hoc Netw"},{"key":"3195_CR7","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1016\/j.compeleceng.2017.11.031","volume":"72","author":"S Amutha","year":"2018","unstructured":"Amutha S, Balasubramanian K (2018) Secured energy optimized ad hoc on-demand distance vector routing protocol. Comput Electr Eng 72:766\u2013773. https:\/\/doi.org\/10.1016\/j.compeleceng.2017.11.031","journal-title":"Comput Electr Eng"},{"issue":"2","key":"3195_CR8","doi-asserted-by":"publisher","first-page":"1743","DOI":"10.1109\/rJSYST.2017.2721543","volume":"12","author":"J Bai","year":"2017","unstructured":"Bai J, Sun Y, Phillips C, Cao Y (2017) Toward constructive relay-based cooperative routing in MANETs. IEEE Syst J 12(2):1743\u20131754. https:\/\/doi.org\/10.1109\/rJSYST.2017.2721543","journal-title":"IEEE Syst J"},{"issue":"1\u201310","key":"3195_CR9","doi-asserted-by":"publisher","first-page":"103358","DOI":"10.1016\/j.csi.2019.103358","volume":"66","author":"S Balaji","year":"2019","unstructured":"Balaji S, Julie EG, Robinson YH, Kumar R, Thong PH (2019) Design of a security-aware routing scheme in mobile ad-hoc network using repeated game model. Comput Stand Interfaces 66(1\u201310):103358. https:\/\/doi.org\/10.1016\/j.csi.2019.103358","journal-title":"Comput Stand Interfaces"},{"key":"3195_CR10","doi-asserted-by":"publisher","first-page":"103406","DOI":"10.1016\/j.csi.2019.103406","volume":"70","author":"AM Bamhdi","year":"2020","unstructured":"Bamhdi AM (2020) Efficient dynamic-power AODV routing protocol based on node density. Comput Stand Interfaces 70:103406. https:\/\/doi.org\/10.1016\/j.csi.2019.103406","journal-title":"Comput Stand Interfaces"},{"issue":"4","key":"3195_CR11","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TIV.2017.2771233","volume":"2","author":"AM Bozorgi","year":"2017","unstructured":"Bozorgi AM, Farasat M, Mahmoud A (2017) A time and energy efficient routing algorithm for electric vehicles based on historical driving data. IEEE Trans Intell Veh 2(4):308\u2013320. https:\/\/doi.org\/10.1109\/TIV.2017.2771233","journal-title":"IEEE Trans Intell Veh"},{"issue":"1","key":"3195_CR12","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/TMC.2018.2828814","volume":"18","author":"RJ Cai","year":"2018","unstructured":"Cai RJ, Li XJ, Chong PHJ (2018) An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE Trans Mob Comput 18(1):42\u201355. https:\/\/doi.org\/10.1109\/TMC.2018.2828814","journal-title":"IEEE Trans Mob Comput"},{"issue":"8","key":"3195_CR13","doi-asserted-by":"publisher","first-page":"1778","DOI":"10.1109\/TMC.2017.2778262","volume":"17","author":"YH Chen","year":"2017","unstructured":"Chen YH, Wu EHK, Lin CH, Chen GH (2017) Bandwidth-satisfied and coding-aware multicast protocol in MANETs. IEEE Trans Mob Comput 17(8):1778\u20131790. https:\/\/doi.org\/10.1109\/TMC.2017.2778262","journal-title":"IEEE Trans Mob Comput"},{"key":"3195_CR14","doi-asserted-by":"publisher","first-page":"44760","DOI":"10.1109\/ACCESS.2020.2978582","volume":"8","author":"Z Chen","year":"2020","unstructured":"Chen Z, Zhou W, Wu S, Cheng L (2020) An adaptive on-demand multipath routing protocol with QoS support for high-speed MANET. IEEE Access 8:44760\u201344773. https:\/\/doi.org\/10.1109\/ACCESS.2020.2978582","journal-title":"IEEE Access"},{"issue":"12","key":"3195_CR15","doi-asserted-by":"publisher","first-page":"1406","DOI":"10.1049\/iet-com.2017.1279","volume":"12","author":"RM Chintalapalli","year":"2018","unstructured":"Chintalapalli RM, Ananthula VR (2018) M-LionWhale: multi-objective optimisation model for secure routing in mobile ad-hoc network. IET Commun 12(12):1406\u20131415. https:\/\/doi.org\/10.1049\/iet-com.2017.1279","journal-title":"IET Commun"},{"key":"3195_CR16","doi-asserted-by":"publisher","first-page":"106863","DOI":"10.1016\/j.comnet.2019.106863","volume":"162","author":"P Chithaluru","year":"2019","unstructured":"Chithaluru P, Tiwari R, Kumar K (2019) AREOR\u2013adaptive ranking based energy efficient opportunistic routing scheme in wireless sensor network. Comput Netw 162:106863. https:\/\/doi.org\/10.1016\/j.comnet.2019.106863","journal-title":"Comput Netw"},{"key":"3195_CR17","doi-asserted-by":"publisher","first-page":"102467","DOI":"10.1016\/j.jisa.2020.102467","volume":"52","author":"N Djedjig","year":"2020","unstructured":"Djedjig N, Tandjaoui D, Medjek F, Romdhani I (2020) Trust-aware and cooperative routing protocol for IoT security. J Inf Secur Appl 52:102467. https:\/\/doi.org\/10.1016\/j.jisa.2020.102467","journal-title":"J Inf Secur Appl"},{"issue":"3","key":"3195_CR18","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1109\/TR.2019.2915800","volume":"69","author":"M Elhoseny","year":"2019","unstructured":"Elhoseny M, Shankar K (2019) Reliable data transmission model for mobile ad hoc network using signcryption technique. IEEE Trans Reliab 69(3):1077\u20131086. https:\/\/doi.org\/10.1109\/TR.2019.2915800","journal-title":"IEEE Trans Reliab"},{"key":"3195_CR19","doi-asserted-by":"publisher","first-page":"95185","DOI":"10.1109\/ACCESS.2019.2928804","volume":"7","author":"AM El-Semary","year":"2019","unstructured":"El-Semary AM, Diab H (2019) BP-AODV: blackhole protected AODV routing protocol for MANETs based on chaotic map. IEEE Access 7:95185\u201395199. https:\/\/doi.org\/10.1109\/ACCESS.2019.2928804","journal-title":"IEEE Access"},{"issue":"2","key":"3195_CR20","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1007\/s40998-019-00253-z","volume":"44","author":"A Garaaghaji","year":"2020","unstructured":"Garaaghaji A, Alfi A (2020) A fuzzy-hierarchical routing algorithm for MANET networks allocation rates problem. Iran J Sci Technol Trans Electr Eng 44(2):1003\u20131011. https:\/\/doi.org\/10.1007\/s40998-019-00253-z","journal-title":"Iran J Sci Technol Trans Electr Eng"},{"key":"3195_CR21","doi-asserted-by":"publisher","unstructured":"Ghoreishi SM, Abd Razak S, Isnin IF, Chizari H (2014) Rushing attack against routing protocols in mobile ad-hoc networks. In: 2014 international symposium on biometrics and security technologies (ISBAST), IEEE, pp 220\u2013224.https:\/\/doi.org\/10.1109\/ISBAST.2014.7013125","DOI":"10.1109\/ISBAST.2014.7013125"},{"issue":"3","key":"3195_CR22","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1016\/j.jesit.2017.02.002","volume":"5","author":"J Govindasamy","year":"2018","unstructured":"Govindasamy J, Punniakody S (2018) A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack. J Electr Syst Inf Technol 5(3):735\u2013744. https:\/\/doi.org\/10.1016\/j.jesit.2017.02.002","journal-title":"J Electr Syst Inf Technol"},{"issue":"1","key":"3195_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41534-019-0191-6","volume":"5","author":"F Hahn","year":"2019","unstructured":"Hahn F, Pappa A, Eisert J (2019) Quantum network routing and local complementation. npj Quantum Inf 5(1):1\u20137. https:\/\/doi.org\/10.1038\/s41534-019-0191-6","journal-title":"npj Quantum Inf"},{"key":"3195_CR24","doi-asserted-by":"publisher","first-page":"102118","DOI":"10.1016\/j.adhoc.2020.102118","volume":"103","author":"B Hammi","year":"2020","unstructured":"Hammi B, Zeadally S, Labiod H, Khatoun R, Begriche Y, Khoukhi L (2020) A secure multipath reactive protocol for routing in IoT and HANETs. Ad Hoc Netw 103:102118. https:\/\/doi.org\/10.1016\/j.adhoc.2020.102118","journal-title":"Ad Hoc Netw"},{"issue":"1","key":"3195_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-018-29626-w","volume":"8","author":"Y Hayashi","year":"2018","unstructured":"Hayashi Y, Uchiyama N (2018) Onion-like networks are both robust and resilient. Sci Rep 8(1):1\u201313. https:\/\/doi.org\/10.1038\/s41598-018-29626-w","journal-title":"Sci Rep"},{"key":"3195_CR26","doi-asserted-by":"publisher","first-page":"105702","DOI":"10.1016\/j.asoc.2019.105702","volume":"84","author":"MC Ho","year":"2019","unstructured":"Ho MC, Lim JMY, Soon KL, Chong CY (2019) An improved pheromone-based vehicle rerouting system to reduce traffic congestion. Appl Soft Comput 84:105702. https:\/\/doi.org\/10.1016\/j.asoc.2019.105702","journal-title":"Appl Soft Comput"},{"key":"3195_CR27","doi-asserted-by":"publisher","unstructured":"Hu YC, Perrig A, Johnson DB (2003) Rushing attacks and defense in wireless ad hoc network routing protocols. In: Proceedings of the 2nd ACM workshop on wireless security, association for computing machinery, pp 30\u201340. https:\/\/doi.org\/10.1145\/941311.941317","DOI":"10.1145\/941311.941317"},{"issue":"10","key":"3195_CR28","doi-asserted-by":"publisher","first-page":"2927","DOI":"10.1109\/TMC.2017.2649527","volume":"16","author":"D Hurley-Smith","year":"2017","unstructured":"Hurley-Smith D, Wetherall J, Adekunle A (2017) SUPERMAN: security using pre-existing routing for mobile ad hoc networks. IEEE Trans Mob Comput 16(10):2927\u20132940. https:\/\/doi.org\/10.1109\/TMC.2017.2649527","journal-title":"IEEE Trans Mob Comput"},{"issue":"1","key":"3195_CR29","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s11277-019-07022-5","volume":"112","author":"M Islabudeen","year":"2020","unstructured":"Islabudeen M, Devi MK (2020) A smart approach for intrusion detection and prevention system in mobile ad hoc networks against security attacks. Wirel Pers Commun 112(1):193\u2013224. https:\/\/doi.org\/10.1007\/s11277-019-07022-5","journal-title":"Wirel Pers Commun"},{"key":"3195_CR30","doi-asserted-by":"publisher","first-page":"76546","DOI":"10.1109\/ACCESS.2018.2882853","volume":"6","author":"WA Jabbar","year":"2018","unstructured":"Jabbar WA, Saad WK, Ismail M (2018) MEQSA-OLSRv2: a multicriteria-based hybrid multipath protocol for energy-efficient and QoS-aware data routing in MANET-WSN convergence scenarios of IoT. IEEE Access 6:76546\u201376572. https:\/\/doi.org\/10.1109\/ACCESS.2018.2882853","journal-title":"IEEE Access"},{"key":"3195_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2020.2987427","author":"M Jain","year":"2020","unstructured":"Jain M, Sharma N, Gupta A, Rawal D, Garg P (2020) Performance analysis of NOMA assisted mobile ad hoc networks for sustainable future radio access. IEEE Trans Sustain Comput. https:\/\/doi.org\/10.1109\/TSUSC.2020.2987427","journal-title":"IEEE Trans Sustain Comput"},{"key":"3195_CR32","doi-asserted-by":"publisher","first-page":"106599","DOI":"10.1016\/j.compeleceng.2020.106599","volume":"83","author":"RK Jaiswal","year":"2020","unstructured":"Jaiswal RK (2020) Position-based routing protocol using Kalman filter as a prediction module for vehicular ad hoc networks. Comput Electr Eng 83:106599. https:\/\/doi.org\/10.1016\/j.compeleceng.2020.106599","journal-title":"Comput Electr Eng"},{"key":"3195_CR33","doi-asserted-by":"publisher","first-page":"65705","DOI":"10.1109\/ACCESS.2018.2878145","volume":"6","author":"I Kacem","year":"2018","unstructured":"Kacem I, Sait B, Mekhilef S, Sabeur N (2018) A new routing approach for mobile ad hoc systems based on fuzzy petri nets and ant system. IEEE Access 6:65705\u201365720. https:\/\/doi.org\/10.1109\/ACCESS.2018.2878145","journal-title":"IEEE Access"},{"key":"3195_CR34","doi-asserted-by":"publisher","first-page":"2591","DOI":"10.1007\/s11277-020-07491-z","volume":"114","author":"V Kalpana","year":"2020","unstructured":"Kalpana V, Karthik S (2020) Route availability with QoE and QoS metrics for data analysis of video stream over a mobile ad hoc networks. Wirel Pers Commun 114:2591\u20132612. https:\/\/doi.org\/10.1007\/s11277-020-07491-z","journal-title":"Wirel Pers Commun"},{"issue":"5","key":"3195_CR35","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1049\/iet-com.2018.5564","volume":"13","author":"H Kanagasundaram","year":"2018","unstructured":"Kanagasundaram H, Kathirvel A (2018) EIMO-ESOLSR: energy efficient and security-based model for OLSR routing protocol in mobile ad-hoc network. IET Commun 13(5):553\u2013559. https:\/\/doi.org\/10.1049\/iet-com.2018.5564","journal-title":"IET Commun"},{"issue":"11","key":"3195_CR36","doi-asserted-by":"publisher","first-page":"2095","DOI":"10.1002\/spe.2782","volume":"50","author":"S Kausar","year":"2020","unstructured":"Kausar S, Habib M, Shabir MY, Ullah A, Xu H, Mehmood R, Iqbal MS (2020) Secure and efficient data transfer using spreading and assimilation in MANET. Softw Pract Exp 50(11):2095\u20132109. https:\/\/doi.org\/10.1002\/spe.2782","journal-title":"Softw Pract Exp"},{"key":"3195_CR37","doi-asserted-by":"publisher","unstructured":"Keerthi TDS, Venkataram P (2012) Locating the attacker of wormhole attack by using the honeypot. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications. IEEE, pp 1175\u20131180. https:\/\/doi.org\/10.1109\/trustcom.2012.196","DOI":"10.1109\/trustcom.2012.196"},{"issue":"12","key":"3195_CR38","doi-asserted-by":"publisher","first-page":"e4012 1","DOI":"10.1002\/dac.4012","volume":"32","author":"N Khanna","year":"2019","unstructured":"Khanna N, Sachdeva M (2019) Study of trust-based mechanism and its component model in MANET: Current research state, issues, and future recommendation. Int J Commun Syst 32(12):e4012 1-e4012 23. https:\/\/doi.org\/10.1002\/dac.4012","journal-title":"Int J Commun Syst"},{"key":"3195_CR39","doi-asserted-by":"publisher","first-page":"24019","DOI":"10.1109\/ACCESS.2020.2970279","volume":"8","author":"BH Khudayer","year":"2020","unstructured":"Khudayer BH, Anbar M, Hanshi SM, Wan TC (2020) Efficient route discovery and link failure detection mechanisms for source routing protocol in mobile ad-hoc networks. IEEE Access 8:24019\u201324032. https:\/\/doi.org\/10.1109\/ACCESS.2020.2970279","journal-title":"IEEE Access"},{"key":"3195_CR40","doi-asserted-by":"publisher","first-page":"102157","DOI":"10.1016\/j.adhoc.2020.102157","volume":"103","author":"BS Kim","year":"2020","unstructured":"Kim BS, Ullah S, Kim KH, Roh B, Ham JH, Kim KI (2020) An enhanced geographical routing protocol based on multi-criteria decision making method in mobile ad-hoc networks. Ad Hoc Netw 103:102157. https:\/\/doi.org\/10.1016\/j.adhoc.2020.102157","journal-title":"Ad Hoc Netw"},{"issue":"1","key":"3195_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/ncomms11061","volume":"7","author":"C Kirst","year":"2016","unstructured":"Kirst C, Timme M, Battaglia D (2016) Dynamic information routing in complex networks. Nat Commun 7(1):1\u20139. https:\/\/doi.org\/10.1038\/ncomms11061","journal-title":"Nat Commun"},{"issue":"1","key":"3195_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-017-02910-x","volume":"7","author":"KK Kleineberg","year":"2017","unstructured":"Kleineberg KK, Helbing D (2017) Collective navigation of complex networks: participatory greedy routing. Sci Rep 7(1):1\u20139. https:\/\/doi.org\/10.1038\/s41598-017-02910-x","journal-title":"Sci Rep"},{"key":"3195_CR43","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.adhoc.2018.04.013","volume":"77","author":"A Ladas","year":"2018","unstructured":"Ladas A, Deepak GC, Pavlatos N, Politis C (2018) A selective multipath routing protocol for ubiquitous networks. Ad Hoc Netw 77:95\u2013107. https:\/\/doi.org\/10.1016\/j.adhoc.2018.04.013","journal-title":"Ad Hoc Netw"},{"issue":"13","key":"3195_CR44","doi-asserted-by":"publisher","first-page":"e4059","DOI":"10.1002\/dac.4059","volume":"32","author":"Y Li","year":"2019","unstructured":"Li Y, Wang X (2019) A novel and efficient address configuration for MANET. Int J Commun Syst 32(13):e4059. https:\/\/doi.org\/10.1002\/dac.4059","journal-title":"Int J Commun Syst"},{"issue":"7","key":"3195_CR45","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1109\/LCOMM.2017.2654439","volume":"21","author":"Z Li","year":"2017","unstructured":"Li Z, Wu Y (2017) Smooth mobility and link reliability-based optimized link state routing scheme for MANETs. IEEE Commun Lett 21(7):1529\u20131532. https:\/\/doi.org\/10.1109\/LCOMM.2017.2654439","journal-title":"IEEE Commun Lett"},{"key":"3195_CR46","doi-asserted-by":"publisher","first-page":"21343","DOI":"10.1109\/ACCESS.2019.2896699","volume":"7","author":"S Liu","year":"2019","unstructured":"Liu S, Zhang DG, Liu XH, Zhang T, Gao JX, Cui YY (2019) Dynamic analysis for the average shortest path length of mobile ad hoc networks under random failure scenarios. IEEE Access 7:21343\u201321358. https:\/\/doi.org\/10.1109\/ACCESS.2019.2896699","journal-title":"IEEE Access"},{"issue":"1\u201317","key":"3195_CR47","doi-asserted-by":"publisher","first-page":"102068","DOI":"10.1016\/j.adhoc.2019.102068","volume":"99","author":"I Manolopoulos","year":"2020","unstructured":"Manolopoulos I, Kontovasilis K, Stavrakakis I, Thomopoulos SC (2020) Methodologies for calculating decision-related event occurrence times, with applications to effective routing in diverse MANET environments. Ad Hoc Netw 99(1\u201317):102068. https:\/\/doi.org\/10.1016\/j.adhoc.2019.102068","journal-title":"Ad Hoc Netw"},{"key":"3195_CR48","doi-asserted-by":"publisher","first-page":"101941","DOI":"10.1016\/j.adhoc.2019.101941","volume":"94","author":"LM Matheus","year":"2019","unstructured":"Matheus LM, Vieira AB, Vieira MA, Vieira LF (2019) DYRP-VLC: a dynamic routing protocol for wireless ad-hoc visible light communication networks. Ad Hoc Netw 94:101941. https:\/\/doi.org\/10.1016\/j.adhoc.2019.101941","journal-title":"Ad Hoc Netw"},{"issue":"2","key":"3195_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/dac.4186","volume":"33","author":"A Mishra","year":"2020","unstructured":"Mishra A, Saha S, Makhija S, Sinha S, Raychoudhury V, Sobin CC (2020) Empirical study of dynamics of amoebiasis transmission in mobile ad hoc networks (MANETs). Int J Commun Syst 33(2):1-28 e4186. https:\/\/doi.org\/10.1002\/dac.4186","journal-title":"Int J Commun Syst"},{"issue":"7","key":"3195_CR50","doi-asserted-by":"publisher","first-page":"e4252","DOI":"10.1002\/dac.4252","volume":"33","author":"MM Mukhedkar","year":"2020","unstructured":"Mukhedkar MM, Kolekar U (2020) E-TDGO: an encrypted trust-based dolphin glowworm optimization for secure routing in mobile ad hoc network. Int J Commun Syst 33(7):e4252. https:\/\/doi.org\/10.1002\/dac.4252","journal-title":"Int J Commun Syst"},{"issue":"12","key":"3195_CR51","doi-asserted-by":"publisher","first-page":"1828","DOI":"10.1049\/iet-com.2018.6150","volume":"13","author":"B Muneeswari","year":"2019","unstructured":"Muneeswari B, Manikandan MSK (2019) Energy efficient clustering and secure routing using reinforcement learning for three-dimensional mobile ad hoc networks. IET Commun 13(12):1828\u20131839. https:\/\/doi.org\/10.1049\/iet-com.2018.6150","journal-title":"IET Commun"},{"key":"3195_CR52","doi-asserted-by":"publisher","first-page":"15054","DOI":"10.1038\/s41598-017-15041-0","volume":"7","author":"E Ortiz Castillo","year":"2017","unstructured":"Ortiz Castillo E, Starnini M, Serrano Moral M (2017) Navigability of temporal networks in hyperbolic space. Sci Rep 7:15054. https:\/\/doi.org\/10.1038\/s41598-017-15041-0","journal-title":"Sci Rep"},{"key":"3195_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jpdc.2020.02.007","volume":"140","author":"KJ Pai","year":"2020","unstructured":"Pai KJ, Chang RS, Chang JM (2020) A protection routing with secure mechanism in M\u00f6bius cubes. J Parallel Distrib Comput 140:1\u201312. https:\/\/doi.org\/10.1016\/j.jpdc.2020.02.007","journal-title":"J Parallel Distrib Comput"},{"key":"3195_CR54","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05034-z","author":"JS Priya","year":"2020","unstructured":"Priya JS, Femina MA, Samuel RA (2020) APSO-MVS: an adaptive particle swarm optimization incorporating multiple velocity strategies for optimal leader selection in hybrid MANETs. Soft Comput. https:\/\/doi.org\/10.1007\/s00500-020-05034-z","journal-title":"Soft Comput"},{"key":"3195_CR55","doi-asserted-by":"publisher","first-page":"100108","DOI":"10.1016\/j.iot.2019.100108","volume":"8","author":"JS Ramamoorthi","year":"2019","unstructured":"Ramamoorthi JS, Sangaiah AK (2019) SCGR: Self-configuring greedy routing for minimizing routing interrupts in vehicular communication networks. Internet Things 8:100108. https:\/\/doi.org\/10.1016\/j.iot.2019.100108","journal-title":"Internet Things"},{"key":"3195_CR56","doi-asserted-by":"publisher","first-page":"143312","DOI":"10.1109\/ACCESS.2019.2943145","volume":"7","author":"YH Robinson","year":"2019","unstructured":"Robinson YH, Julie EG, Saravanan K, Kumar R, Abdel-Basset M, Thong PH (2019a) Link-disjoint multipath routing for network traffic overload handling in mobile ad-hoc networks. IEEE Access 7:143312\u2013143323. https:\/\/doi.org\/10.1109\/ACCESS.2019.2943145","journal-title":"IEEE Access"},{"key":"3195_CR57","doi-asserted-by":"publisher","first-page":"101896","DOI":"10.1016\/j.adhoc.2019.101896","volume":"93","author":"YH Robinson","year":"2019","unstructured":"Robinson YH, Krishnan RS, Julie EG, Kumar R, Thong PH (2019b) Neighbor knowledge-based rebroadcast algorithm for minimizing the routing overhead in mobile ad-hoc networks. Ad Hoc Netw 93:101896. https:\/\/doi.org\/10.1016\/j.adhoc.2019.101896","journal-title":"Ad Hoc Netw"},{"issue":"1\u201317","key":"3195_CR58","doi-asserted-by":"publisher","first-page":"102095","DOI":"10.1016\/j.adhoc.2020.102095","volume":"102","author":"E Rosas","year":"2020","unstructured":"Rosas E, Garay F, Hidalgo N (2020) Context-aware self-adaptive routing for delay tolerant network in disaster scenarios. Ad Hoc Netw 102(1\u201317):102095. https:\/\/doi.org\/10.1016\/j.adhoc.2020.102095","journal-title":"Ad Hoc Netw"},{"issue":"4","key":"3195_CR59","doi-asserted-by":"publisher","first-page":"2641","DOI":"10.1007\/s11277-020-07345-8","volume":"113","author":"R Sahu","year":"2020","unstructured":"Sahu R, Sharma S, Rizvi MA (2020) ZBLE: zone based efficient energy multipath protocol for routing in mobile ad hoc networks. Wirel Pers Commun 113(4):2641\u20132659. https:\/\/doi.org\/10.1007\/s11277-020-07345-8","journal-title":"Wirel Pers Commun"},{"issue":"1","key":"3195_CR60","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s42005-020-0345-z","volume":"3","author":"RJ S\u00e1nchez-Garc\u00eda","year":"2020","unstructured":"S\u00e1nchez-Garc\u00eda RJ (2020) Exploiting symmetry in network analysis. Commun Phys 3(1):1\u201315. https:\/\/doi.org\/10.1038\/s42005-020-0345-z","journal-title":"Commun Phys"},{"key":"3195_CR61","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.adhoc.2018.05.012","volume":"78","author":"BP Santos","year":"2018","unstructured":"Santos BP, Goussevskaia O, Vieira LF, Vieira MA, Loureiro AA (2018) Mobile matrix: routing under mobility in IoT, IoMT, and social IoT. Ad Hoc Netw 78:84\u201398. https:\/\/doi.org\/10.1016\/j.adhoc.2018.05.012","journal-title":"Ad Hoc Netw"},{"key":"3195_CR62","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1016\/j.future.2017.10.024","volume":"108","author":"J Shen","year":"2020","unstructured":"Shen J, Wang C, Wang A, Liu Q, Xiang Y (2020) Moving centroid based routing protocol for incompletely predictable cyber devices in cyber-physical-social distributed systems. Future Gener Comput Syst 108:1129\u20131139. https:\/\/doi.org\/10.1016\/j.future.2017.10.024","journal-title":"Future Gener Comput Syst"},{"key":"3195_CR63","doi-asserted-by":"publisher","first-page":"100231","DOI":"10.1016\/j.vehcom.2020.100231","volume":"23","author":"A Srivastava","year":"2020","unstructured":"Srivastava A, Prakash A, Tripathi R (2020) Location based routing protocols in VANET: issues and existing solutions. Veh Commun 23:100231. https:\/\/doi.org\/10.1016\/j.vehcom.2020.100231","journal-title":"Veh Commun"},{"issue":"12","key":"3195_CR64","doi-asserted-by":"publisher","first-page":"e3853","DOI":"10.1002\/ett.3853","volume":"31","author":"SJ Sultanuddin","year":"2020","unstructured":"Sultanuddin SJ, Ali Hussain M (2020) Token system-based efficient route optimization in mobile ad hoc network for vehicular ad hoc network in smart city. Trans Emerg Telecommun Technol 31(12):e3853. https:\/\/doi.org\/10.1002\/ett.3853","journal-title":"Trans Emerg Telecommun Technol"},{"key":"3195_CR65","doi-asserted-by":"publisher","first-page":"10369","DOI":"10.1109\/ACCESS.2017.2707537","volume":"5","author":"A Taha","year":"2017","unstructured":"Taha A, Alsaqour R, Uddin M, Abdelhaq M, Saba T (2017) Energy efficient multipath routing protocol for mobile ad-hoc network using the fitness function. IEEE Access 5:10369\u201310381. https:\/\/doi.org\/10.1109\/ACCESS.2017.2707537","journal-title":"IEEE Access"},{"issue":"2","key":"3195_CR66","doi-asserted-by":"publisher","first-page":"975","DOI":"10.1007\/s11277-020-07403-1","volume":"114","author":"M Thebiga","year":"2020","unstructured":"Thebiga M, SujiPramila R (2020) A new mathematical and correlation coefficient based approach to recognize and to obstruct the black hole attacks in manets using DSR routing. Wirel Pers Commun 114(2):975\u2013993. https:\/\/doi.org\/10.1007\/s11277-020-07403-1","journal-title":"Wirel Pers Commun"},{"issue":"7","key":"3195_CR67","doi-asserted-by":"publisher","first-page":"e17017","DOI":"10.1038\/lsa.2017.17","volume":"6","author":"C Yan","year":"2017","unstructured":"Yan C, Yang KY, Martin OJ (2017) Fano-resonance-assisted metasurface for color routing. Light Sci Appl 6(7):e17017. https:\/\/doi.org\/10.1038\/lsa.2017.17","journal-title":"Light Sci Appl"},{"key":"3195_CR68","doi-asserted-by":"publisher","first-page":"102116","DOI":"10.1016\/j.adhoc.2020.102116","volume":"102","author":"L Zhang","year":"2020","unstructured":"Zhang L, Hu L, Hu F, Ye Z, Li X, Kumar S (2020a) Enhanced OLSR routing for airborne networks with multi-beam directional antennas. Ad Hoc Netw 102:102116. https:\/\/doi.org\/10.1016\/j.adhoc.2020.102116","journal-title":"Ad Hoc Netw"},{"key":"3195_CR69","doi-asserted-by":"publisher","first-page":"32652","DOI":"10.1109\/ACCESS.2020.2974191","volume":"8","author":"T Zhang","year":"2020","unstructured":"Zhang T, Zhao S, Cheng B (2020b) Multipath routing and MPTCP-based data delivery over manets. IEEE Access 8:32652\u201332673. https:\/\/doi.org\/10.1109\/ACCESS.2020.2974191","journal-title":"IEEE Access"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03195-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-021-03195-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03195-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T09:36:56Z","timestamp":1644313016000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-021-03195-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,9]]},"references-count":69,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["3195"],"URL":"https:\/\/doi.org\/10.1007\/s12652-021-03195-9","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-171257\/v1","asserted-by":"object"}]},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,9]]},"assertion":[{"value":"29 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Corresponding author and co-author declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}]}}