{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T21:05:29Z","timestamp":1763499929454,"version":"3.44.0"},"reference-count":24,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T00:00:00Z","timestamp":1699574400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1016\/j.hcc.2023.100170","type":"journal-article","created":{"date-parts":[[2023,11,11]],"date-time":"2023-11-11T12:07:07Z","timestamp":1699704427000},"page":"100170","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":5,"title":["Performance of unique and secure routing protocol (USRP) in flying Adhoc Networks for healthcare applications"],"prefix":"10.1016","volume":"4","author":[{"given":"J. Vijitha","family":"Ananthi","sequence":"first","affiliation":[]},{"given":"P. Subha Hency","family":"Jose","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.hcc.2023.100170_b1","series-title":"Mobile Computing and Sustainable Informatics","first-page":"315","article-title":"A review on various routing protocol designing features for flying adhoc networks","author":"Vijith","year":"2022"},{"issue":"1","key":"10.1016\/j.hcc.2023.100170_b2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10922-021-09621-9","article-title":"Deep learning in IoT intrusion detection","volume":"30","author":"Tsimenidis","year":"2022","journal-title":"J. Netw. Syst. Manage."},{"key":"10.1016\/j.hcc.2023.100170_b3","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1016\/j.future.2021.10.018","article-title":"A high precision intrusion detection system for network security communication based on multi-scale convolutional neural network","volume":"129","author":"Yu","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.hcc.2023.100170_b4","series-title":"Networking, Intelligent Systems and Security","first-page":"327","article-title":"Enhanced intrusion detection system based on AutoEncoder network and support vector machine","author":"Dadi","year":"2022"},{"issue":"1","key":"10.1016\/j.hcc.2023.100170_b5","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3390\/jsan11010003","article-title":"New multipath OLSR protocol version for heterogeneous adhoc networks","volume":"11","author":"Benjbara","year":"2022","journal-title":"J. Sensor Actuator Netw."},{"key":"10.1016\/j.hcc.2023.100170_b6","doi-asserted-by":"crossref","DOI":"10.1109\/MCE.2022.3141065","article-title":"On the role of futuristic technologies in securing UAV-supported autonomous vehicles","author":"Aloqaily","year":"2022","journal-title":"IEEE Consum. Electron. Mag."},{"key":"10.1016\/j.hcc.2023.100170_b7","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2021.107806","article-title":"Jamming detection at the edge of drone networks using multi-layer perceptrons and decision trees","volume":"111","author":"Greco","year":"2021","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.hcc.2023.100170_b8","series-title":"Mobile Computing and Sustainable Informatics","first-page":"315","article-title":"A review on various routing protocol designing features for flying adhoc networks","author":"Vijitha","year":"2022"},{"key":"10.1016\/j.hcc.2023.100170_b9","first-page":"300","article-title":"A policy-based solution for the detection of colluding GPS-spoofing attacks in FANETs","volume":"149","author":"Bada","year":"2021","journal-title":"Transp. Res. A"},{"key":"10.1016\/j.hcc.2023.100170_b10","series-title":"Smart Technologies in Data Science and Communication","first-page":"83","article-title":"Dual detection procedure to secure flying adhoc networks: A trust-based framework","author":"Gupta","year":"2021"},{"key":"10.1016\/j.hcc.2023.100170_b11","series-title":"2021 International Wireless Communications and Mobile Computing","first-page":"825","article-title":"Securing unmanned aerial systems using mobile agents and artificial neural networks","author":"Titouna","year":"2021"},{"key":"10.1016\/j.hcc.2023.100170_b12","first-page":"1","article-title":"Trust based DoS attack detection in wireless sensor networks for reliable data transmission","author":"Anand","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.hcc.2023.100170_b13","doi-asserted-by":"crossref","DOI":"10.1016\/j.micpro.2020.103352","article-title":"Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm","volume":"80","author":"Kumar","year":"2021","journal-title":"Microprocess. Microsyst."},{"key":"10.1016\/j.hcc.2023.100170_b14","doi-asserted-by":"crossref","unstructured":"Chamika Sudusinghe, Subodha Charles, Prabhat Mishra, Denial-of-service attack detection using machine learning in network-on-chip architectures, in: Proceedings of the 15th IEEE\/ACM International Symposium on Networks-on-Chip, 2021, pp. 35\u201340.","DOI":"10.1145\/3479876.3481589"},{"key":"10.1016\/j.hcc.2023.100170_b15","series-title":"2021 6th International Conference on Communication and Electronics Systems","first-page":"657","article-title":"Impact of DoS attack in IoT system and identifying the attacker location for interference attacks","author":"Sinha","year":"2021"},{"key":"10.1016\/j.hcc.2023.100170_b16","article-title":"Security aware routing: Rule based attack detection on optimal shortest route selection","volume":"49","author":"Kalyani","year":"2021","journal-title":"Adhoc Sensor Wirel. Netw."},{"issue":"4","key":"10.1016\/j.hcc.2023.100170_b17","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1504\/IJAC.2017.089700","article-title":"Analysis of reverse tracing algorithm for the detection of DOS attacks in MANET","volume":"2","author":"Hemalatha","year":"2017","journal-title":"Int. J. Autonomic Comput."},{"key":"10.1016\/j.hcc.2023.100170_b18","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.ins.2022.05.128","article-title":"Combinatorial resources auction in decentralized edge-thing systems using blockchain and differential privacy","volume":"607","author":"Guo","year":"2022","journal-title":"Inform. Sci."},{"issue":"2","key":"10.1016\/j.hcc.2023.100170_b19","doi-asserted-by":"crossref","first-page":"1216","DOI":"10.1109\/TGCN.2022.3142438","article-title":"An architecture for distributed energies trading in Byzantine-based blockchains","volume":"6","author":"Guo","year":"2022","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"10.1016\/j.hcc.2023.100170_b20","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1007\/s11276-013-0623-8","article-title":"Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANET","volume":"20","author":"Sundararajan","year":"2014","journal-title":"Wirel. Netw."},{"issue":"2","key":"10.1016\/j.hcc.2023.100170_b21","doi-asserted-by":"crossref","first-page":"272","DOI":"10.3390\/electronics9020272","article-title":"Computer network simulation with ns-3: A systematic literature review","volume":"9","author":"Campanile","year":"2020","journal-title":"Electronics"},{"issue":"8","key":"10.1016\/j.hcc.2023.100170_b22","first-page":"21","article-title":"Experimental analysis of olsr and dsdv protocols on ns-2.35 in mobile ad-hoc networks","volume":"7","author":"Sharma","year":"2015","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"issue":"1","key":"10.1016\/j.hcc.2023.100170_b23","doi-asserted-by":"crossref","DOI":"10.1002\/dac.5362","article-title":"Mobility management UAV-based grouping routing protocol in flying ad hoc networks for biomedical applications","volume":"36","author":"Ananthi","year":"2023","journal-title":"Int. J. Commun. Syst."},{"key":"10.1016\/j.hcc.2023.100170_b24","series-title":"2021 Third International Conference on Inventive Research in Computing Applications","first-page":"37","article-title":"Implementation of IoT and UAV based WBAN for healthcare applications","author":"Ananthi","year":"2021"}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295223000685?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295223000685?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T08:41:34Z","timestamp":1757407294000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295223000685"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["S2667295223000685"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2023.100170","relation":{},"ISSN":["2667-2952"],"issn-type":[{"type":"print","value":"2667-2952"}],"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Performance of unique and secure routing protocol (USRP) in flying Adhoc Networks for healthcare applications","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2023.100170","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100170"}}