{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T14:22:21Z","timestamp":1762957341170},"reference-count":27,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,12,12]],"date-time":"2023-12-12T00:00:00Z","timestamp":1702339200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1016\/j.hcc.2023.100194","type":"journal-article","created":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T17:08:30Z","timestamp":1702487310000},"page":"100194","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"title":["Developing a reliable route protocol for mobile self-organization networks"],"prefix":"10.1016","volume":"4","author":[{"given":"Shaohu","family":"Li","sequence":"first","affiliation":[]},{"given":"Bei","family":"Gong","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.hcc.2023.100194_b1","first-page":"17","article-title":"Introduction to MANET","volume":"5","author":"Mirza","year":"2018","journal-title":"Int. Res. J. Eng. Technol."},{"key":"10.1016\/j.hcc.2023.100194_b2","doi-asserted-by":"crossref","DOI":"10.1155\/2019\/8249108","article-title":"Avoiding and isolating flooding attack by enhancing AODV MANET protocol (AIF_AODV)","volume":"2019","author":"Abu Zant","year":"2019","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.hcc.2023.100194_b3","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.jnca.2018.01.004","article-title":"Data collection for attack detection and security measurement in mobile ad hoc networks: A survey","volume":"105","author":"Liu","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.hcc.2023.100194_b4","doi-asserted-by":"crossref","first-page":"11872","DOI":"10.1109\/ACCESS.2021.3051491","article-title":"A hybrid wormhole attack detection in mobile ad-hoc network (MANET)","volume":"9","author":"Tahboush","year":"2021","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.hcc.2023.100194_b5","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1109\/JSYST.2012.2221912","article-title":"Lightweight sybil attack detection in manets","volume":"7","author":"Abbas","year":"2012","journal-title":"IEEE Syst. J."},{"key":"10.1016\/j.hcc.2023.100194_b6","series-title":"2019 International Conference on Computer and Information Sciences","first-page":"1","article-title":"SYN flood attack detection based on bayes estimator (SFADBE) for MANET","author":"Hussain","year":"2019"},{"key":"10.1016\/j.hcc.2023.100194_b7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2021\/8814141","article-title":"Black hole attack detection using K-nearest neighbor algorithm and reputation calculation in mobile ad hoc networks","volume":"2021","author":"Farahani","year":"2021","journal-title":"Secur. Commun. Netw."},{"issue":"4","key":"10.1016\/j.hcc.2023.100194_b8","first-page":"577","article-title":"Collective data-sanitization for preventing sensitive information inference attacks in social networks","volume":"15","author":"Cai","year":"2018","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"10.1016\/j.hcc.2023.100194_b9","article-title":"Private data trading towards range counting queries in internet of things","author":"Cai","year":"2022","journal-title":"IEEE Trans. Mobile Comput."},{"key":"10.1016\/j.hcc.2023.100194_b10","unstructured":"Zhipeng Cai, Zaobo He, Trading Private Range Counting over Big IoT Data, in: The 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019."},{"key":"10.1016\/j.hcc.2023.100194_b11","series-title":"2022 10th International Conference on Emerging Trends in Engineering and Technology-Signal and Information Processing","first-page":"1","article-title":"Black hole detection and prevention using digital signature and SEP in MANET","author":"Gupta","year":"2022"},{"issue":"29","key":"10.1016\/j.hcc.2023.100194_b12","article-title":"A lightweight technique for detection and prevention of wormhole attack in MANET","volume":"8","author":"Zardari","year":"2021","journal-title":"EAI Endorsed Trans. Scalable Inf. Syst."},{"key":"10.1016\/j.hcc.2023.100194_b13","series-title":"2016 International Conference on Emerging Trends in Communication Technologies","first-page":"1","article-title":"A framework to manage trust in internet of things","author":"Sharma","year":"2016"},{"issue":"4","key":"10.1016\/j.hcc.2023.100194_b14","doi-asserted-by":"crossref","first-page":"2573","DOI":"10.1109\/JIOT.2019.2957201","article-title":"IoT sensor numerical data trust model using temporal correlation","volume":"7","author":"Karmakar","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.hcc.2023.100194_b15","series-title":"2016 International Conference on Selected Topics in Mobile & Wireless Networking","first-page":"1","article-title":"CBSTM-IoT: Context-based social trust model for the internet of things","author":"Rafey","year":"2016"},{"issue":"2","key":"10.1016\/j.hcc.2023.100194_b16","doi-asserted-by":"crossref","first-page":"1516","DOI":"10.1109\/TII.2014.2306799","article-title":"An interactive trust model for application market of the internet of things","volume":"10","author":"Kang","year":"2014","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"2","key":"10.1016\/j.hcc.2023.100194_b17","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1109\/TNSE.2018.2830307","article-title":"A private and efficient mechanism for data uploading in smart cyber-physical systems","volume":"7","author":"Cai","year":"2020","journal-title":"IEEE Trans. Netw. Sci. Eng. (TNSE)"},{"issue":"10","key":"10.1016\/j.hcc.2023.100194_b18","doi-asserted-by":"crossref","first-page":"803","DOI":"10.12720\/jcm.17.10.803-811","article-title":"BDAODV: A security routing protocol to detect the black hole attacks in mobile ad hoc networks","volume":"17","author":"Huy","year":"2022","journal-title":"J. Commun."},{"issue":"17","key":"10.1016\/j.hcc.2023.100194_b19","doi-asserted-by":"crossref","first-page":"2637","DOI":"10.3390\/electronics11172637","article-title":"Routing protocol for MANET based on qos-aware service composition with dynamic secured broker selection","volume":"11","author":"Ramalingam","year":"2022","journal-title":"Electronics"},{"issue":"3","key":"10.1016\/j.hcc.2023.100194_b20","article-title":"Hybrid trust based reputation mechanism for discovering malevolent node in MANET","volume":"44","author":"Pari","year":"2023","journal-title":"Comput. Syst. Sci. Eng."},{"key":"10.1016\/j.hcc.2023.100194_b21","series-title":"2020 11th International Conference on Computing, Communication and Networking Technologies","first-page":"1","article-title":"A secure hybrid routing protocol for mobile ad-hoc networks (MANETs)","author":"Biswas","year":"2020"},{"issue":"2","key":"10.1016\/j.hcc.2023.100194_b22","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1016\/j.gltp.2021.10.001","article-title":"Enhanced energy efficient secure routing protocol for mobile ad-hoc network","volume":"3","author":"Prasad","year":"2022","journal-title":"Global Trans. Proc."},{"key":"10.1016\/j.hcc.2023.100194_b23","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/s11277-020-07711-6","article-title":"Defending against smart grayhole attack within MANETs: A reputation-based ant colony optimization approach for secure route discovery in DSR protocol","volume":"116","author":"Ourouss","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.hcc.2023.100194_b24","article-title":"Multi objective ALO based energy efficient and secure routing OLSR protocol in MANET","volume":"12","author":"Kanagasundaram","year":"2019","journal-title":"Int. J. Intell. Eng. Syst."},{"key":"10.1016\/j.hcc.2023.100194_b25","doi-asserted-by":"crossref","first-page":"163043","DOI":"10.1109\/ACCESS.2021.3133882","article-title":"An improved hybrid secure multipath routing protocol for MANET","volume":"9","author":"Srilakshmi","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.hcc.2023.100194_b26","doi-asserted-by":"crossref","first-page":"95197","DOI":"10.1109\/ACCESS.2019.2928804","article-title":"BP-AODV: Blackhole protected AODV routing protocol for MANETs based on chaotic map","volume":"7","author":"El-Semary","year":"2019","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.hcc.2023.100194_b27","doi-asserted-by":"crossref","first-page":"143","DOI":"10.12720\/jcm.16.4.143-149","article-title":"AODV-MSA: A security routing protocol on mobile ad hoc network","volume":"16","author":"Minh","year":"2021","journal-title":"J. Commun."}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295223000922?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295223000922?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T16:19:01Z","timestamp":1727194741000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295223000922"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["S2667295223000922"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2023.100194","relation":{},"ISSN":["2667-2952"],"issn-type":[{"type":"print","value":"2667-2952"}],"subject":[],"published":{"date-parts":[[2024,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Developing a reliable route protocol for mobile self-organization networks","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2023.100194","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100194"}}