{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T14:54:23Z","timestamp":1773240863751,"version":"3.50.1"},"reference-count":89,"publisher":"Oxford University Press (OUP)","issue":"12","license":[{"start":{"date-parts":[[2018,9,21]],"date-time":"2018-09-21T00:00:00Z","timestamp":1537488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12,1]]},"DOI":"10.1093\/comjnl\/bxy095","type":"journal-article","created":{"date-parts":[[2018,8,22]],"date-time":"2018-08-22T19:16:59Z","timestamp":1534965419000},"page":"1862-1879","source":"Crossref","is-referenced-by-count":3,"title":["Defense Mechanism for Malicious and Selective Forwarding Attacks in Large and Mobile Wireless Networks"],"prefix":"10.1093","volume":"61","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5164-9171","authenticated-orcid":false,"given":"Yung-Ting","family":"Chuang","sequence":"first","affiliation":[{"name":"Department of Information Management, National Chung Cheng University, 168 University Rd., Minhsiung Township, Chia-Yi, Taiwan"}]},{"given":"Yi-Fan","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Information Management, National Chung Cheng University, 168 University Rd., Minhsiung Township, Chia-Yi, Taiwan"}]}],"member":"286","published-online":{"date-parts":[[2018,9,21]]},"reference":[{"key":"key\n\t\t\t\t2018112402024437800_bxy095C1","doi-asserted-by":"crossref","first-page":"1447","DOI":"10.4018\/978-1-4666-5888-2.ch137","volume-title":"Encyclopedia of Information Science and Technology","author":"Chomhaill","year":"2015"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C2","author":"Clarke","year":"2001"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C3","author":"Ferreira","year":"2005"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C4","author":"Gnutella"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C5","author":"Isdal","year":"2010"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C6","author":"Terpstra","year":"2007"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C7","doi-asserted-by":"crossref","first-page":"1739","DOI":"10.1016\/j.comnet.2010.02.003","article-title":"Enabling content-based publish\/subscribe services in cooperative P2P networks","volume":"52","author":"Tran","year":"2010","journal-title":"Comput. Netw."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C8","author":"Wong","year":"2008"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C9","author":"Shah","year":"2011"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C10","author":"Sharma","year":"2012"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C11","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1023\/A:1024591915518","article-title":"Data-centric storage in sensornets with GHT: a geographic hash table","volume":"8","author":"Ratnasamy","year":"2003","journal-title":"Mobile Netw. Appl."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C12","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1109\/TPDS.2007.70740","article-title":"A new storage scheme for approximate location queries in object-tracking sensor networks","volume":"19","author":"Xu","year":"2008","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C13","doi-asserted-by":"crossref","first-page":"1202","DOI":"10.1109\/TPDS.2008.217","article-title":"An in-network querying framework for wireless sensor networks","volume":"20","author":"Demirbas","year":"2009","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C14","author":"Li","year":"2000"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C15","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1109\/TMC.2010.214","article-title":"A distributed spatial-temporal similarity data storage scheme in wireless sensor networks","volume":"10","author":"Shen","year":"2011","journal-title":"IEEE Trans. Mobile Comput."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C16","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.1007\/s12083-016-0500-1","article-title":"Protecting against malicious and selective forwarding attacks for P2P search & retrieval system","volume":"10","author":"Chuang","year":"2017","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C17","doi-asserted-by":"crossref","first-page":"738","DOI":"10.1007\/s11227-017-2158-8","article-title":"Dslm: a decentralized search for large and mobile networks","volume":"74","author":"Chuang","year":"2018","journal-title":"J. Supercomput."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C18","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MNET.2004.1265831","article-title":"A methodology for the design of distributed search in P2P middleware","volume":"18","author":"Mischke","year":"2004","journal-title":"IEEE Netw."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C19","doi-asserted-by":"crossref","first-page":"3485","DOI":"10.1016\/j.comnet.2006.02.001","article-title":"Survey of research towards robust peer-to-peer networks: Search methods","volume":"50","author":"Risson","year":"2006","journal-title":"Comput. Netw."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C20","author":"Tsoumakos","year":"2003"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C21","author":"Bianchi","year":"2007"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C22","author":"Gupta","year":"2004"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C23","doi-asserted-by":"crossref","first-page":"1124","DOI":"10.1109\/TPDS.2013.174","article-title":"A scalable and mobility-resilient data search system for large-scale mobile wireless networks","volume":"25","author":"Shen","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C24","author":"Perkins","year":"2003"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C25","first-page":"117","author":"Andoni","year":"2008"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C26","author":"Leskovec"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C27","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/TII.2016.2569523","article-title":"Efficient route update and maintenance for reliable routing in large-scale sensor networks","volume":"13","author":"Pradittasnee","year":"2017","journal-title":"IEEE Trans. Ind. Inform."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C28","article-title":"Content retrieval at the edge: a social-aware and named data cooperative framework","author":"Pu","year":"2016","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C29","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1016\/j.adhoc.2015.09.009","article-title":"Cstorage: decentralized compressive data storage in wireless sensor networks","volume":"37","author":"Talari","year":"2016","journal-title":"Ad Hoc Netw."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C30","doi-asserted-by":"crossref","first-page":"931","DOI":"10.1109\/TMC.2007.70783","article-title":"A swarm-intelligence-based protocol for data acquisition in networks with mobile sinks","volume":"7","author":"Yang","year":"2008","journal-title":"IEEE Trans. Mobile Comput."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C31","doi-asserted-by":"crossref","first-page":"1271","DOI":"10.1109\/TMC.2008.55","article-title":"Dynamic forwarding over tree-on-dag for scalable data aggregation in sensor networks","volume":"7","author":"Fan","year":"2008","journal-title":"IEEE Trans. Mobile Comput."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C32","doi-asserted-by":"crossref","first-page":"884","DOI":"10.1109\/TMC.2007.70769","article-title":"Adaptive cluster-based data collection in sensor networks with direct sink access","volume":"7","author":"Lotfinezhad","year":"2008","journal-title":"IEEE Trans. Mobile Comput."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C33","doi-asserted-by":"crossref","first-page":"1205","DOI":"10.1109\/TMC.2009.17","article-title":"Dynamic multiresolution data dissemination in wireless sensor networks","volume":"8","author":"Xing","year":"2009","journal-title":"IEEE Trans. Mobile Comput."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C34","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/2632296","article-title":"A survey on dht-based routing for large-scale mobile ad hoc networks","volume":"47","author":"Abid","year":"2015","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C35","doi-asserted-by":"crossref","first-page":"1515","DOI":"10.1016\/j.comnet.2006.08.005","article-title":"Efficient use of route requests for loop-free on-demand routing in ad hoc networks","volume":"51","author":"Rangarajan","year":"2007","journal-title":"Comput. Netw."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C36","doi-asserted-by":"crossref","first-page":"3142","DOI":"10.1016\/j.comnet.2006.12.010","article-title":"Routing and quality of service support for mobile ad hoc networks","volume":"51","author":"Munaretto","year":"2007","journal-title":"Comput. Netw."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C37","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1109\/TMC.2006.73","article-title":"Cluster overlay broadcast (COB): MANET routing with complexity polynomial in source-destination distance","volume":"5","author":"Ritchie","year":"2006","journal-title":"IEEE Trans. Mobile Comput."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C38","first-page":"1454","volume-title":"IEEE J. Selected Areas Commun.","author":"Sivakumar","year":"1999"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C39","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1109\/TMC.2007.1042","article-title":"Hop id: a virtual coordinate based routing for sparse mobile ad hoc networks","volume":"6","author":"Zhao","year":"2007","journal-title":"IEEE Trans. Mobile Comput."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C40","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1145\/1218556.1218561","article-title":"Scalable logical coordinates framework for routing in wireless sensor networks","volume":"2","author":"Cao","year":"2006","journal-title":"ACM Trans. Sensor Netw. (TOSN)"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C41","author":"Stoica","year":"2001"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C42","author":"Rowstron","year":"2001"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C43","doi-asserted-by":"crossref","DOI":"10.1145\/383059.383072","volume-title":"A Scalable Content-Addressable Network","author":"Ratnasamy","year":"2001"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C44","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/JSAC.2003.818784","article-title":"Tapestry: a resilient global-scale overlay for service deployment","volume":"22","author":"Zhao","year":"2004","journal-title":"IEEE J. Selected Areas Commun."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C45","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/SURV.2009.090107","article-title":"A survey of multicast routing protocols for mobile ad-hoc networks","volume":"11","author":"Junhai","year":"2009","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C46","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1002\/qre.392","article-title":"An anomaly detection technique based on a Chi-square statistic for detecting intrusions into information systems","volume":"17","author":"Ye","year":"2001","journal-title":"Qual. Reliab. Eng. Int. J."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C47","author":"Zhou","year":"2006"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C48","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1080\/00401706.1959.10489860","article-title":"Control chart tests based on geometric moving averages","volume":"1","author":"Roberts","year":"1959","journal-title":"Technometrics"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C49","author":"Viinikka","year":"2004"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C50","first-page":"255","article-title":"Intrusion detection using the Chi-square goodness-of-fit test for information assurance, network, forensics and software security","volume":"23","author":"Goonatilake","year":"2007","journal-title":"J. Comput. Sci. Coll."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C51","author":"Belen","year":"2009"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C52","author":"Heckert","year":"2006"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C53","volume-title":"Numerical Recipes in Fortran: The Art of Scientific Computing.","author":"Press","year":"2007"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C54","author":"Busse","year":"2006"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C55","author":"Gu","year":"2007"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C56","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1109\/TNET.2006.876186","article-title":"Gossip-based ad hoc routing","volume":"14","author":"Haas","year":"2006","journal-title":"IEEE\/ACM Trans. Networking (ToN)"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C57","author":"Sasson","year":"2003"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C58","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1002\/net.3230180406","article-title":"A survey of gossiping and broadcasting in communication networks","volume":"18","author":"Hedetniemi","year":"1988","journal-title":"Networks"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C59","author":"Chen","year":"2009"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C60","author":"Erramilli","year":"2008"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C61","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1002\/net.3230090404","article-title":"Minimal broadcast networks","volume":"9","author":"Farley","year":"1979","journal-title":"Networks"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C62","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1137\/0139032","article-title":"Broadcast time in communication networks","volume":"39","author":"Farley","year":"1980","journal-title":"SIAM J. Appl. Math."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C63","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/78952.78953","article-title":"Multicast routing in datagram internetworks and extended lans","volume":"8","author":"Deering","year":"1990","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C64","author":"Moser","year":"2013"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C65","author":"Lazarevic","year":"2003"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C66","author":"Hales","year":"2004"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C67","author":"Jesi","year":"2007"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C68","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1109\/3468.594912","article-title":"A statistically based system for prioritizing information exploration under uncertainty","volume":"27","author":"Helman","year":"1997","journal-title":"IEEE Trans. Syst. Man Cybern. A Syst. Hum."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C69","author":"Lee","year":"1998"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C70","author":"Ghosh","year":"1999"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C71","author":"Morselli","year":"2005"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C72","author":"Condie","year":"2004"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C73","author":"Wang","year":"2009"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C74","doi-asserted-by":"crossref","first-page":"29332","DOI":"10.3390\/s151129332","article-title":"Multi-layer approach for the detection of selective forwarding attacks","volume":"15","author":"Alajmi","year":"2015","journal-title":"Sensors"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C75","author":"Hai","year":"2008"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C76","author":"Deng","year":"2009"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C77","doi-asserted-by":"crossref","first-page":"118","DOI":"10.3390\/s16010118","article-title":"Defence against black hole and selective forwarding attacks for medical wsns in the iot","volume":"16","author":"Mathur","year":"2016","journal-title":"Sensors"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C78","author":"Yu","year":"2006"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C79","doi-asserted-by":"crossref","first-page":"1218","DOI":"10.1016\/j.jpdc.2007.04.014","article-title":"Chemas: Identify suspect nodes in selective forwarding attacks","volume":"67","author":"Xiao","year":"2007","journal-title":"J. Parallel Distrib. Comput."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C80","author":"Lee","year":"2007"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C81","author":"Geethu","year":"2013"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C82","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/S1570-8705(03)00008-8","article-title":"Secure routing in wireless sensor networks: Attacks and countermeasures","volume":"1","author":"Karlof","year":"2003","journal-title":"Ad hoc Netw."},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C83","volume-title":"An Introduction to Probability Theory and Its Applications","author":"Feller","year":"1968"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C84","volume-title":"Statistical Theory and Methodology in Science and Engineering","author":"Brownlee","year":"1965"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C85","author":"Melliar-Smith","year":"2012"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C86","author":"Philips"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C87","author":"Broder","year":"2000"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C88","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139924801","volume-title":"Mining of Massive Datasets","author":"Leskovec","year":"2014"},{"key":"key\n\t\t\t\t2018112402024437800_bxy095C89","author":"Mueller","year":"2004"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/12\/1862\/26724979\/bxy095.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T03:49:01Z","timestamp":1604807341000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/12\/1862\/5105707"}},"subtitle":[],"editor":[{"given":"Daniele","family":"Sgandurra","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,9,21]]},"references-count":89,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2018,9,21]]},"published-print":{"date-parts":[[2018,12,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy095","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,12]]},"published":{"date-parts":[[2018,9,21]]}}}