{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:36:35Z","timestamp":1768422995963,"version":"3.49.0"},"reference-count":123,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012639","name":"Prince Sultan University for paying the Article Processing Charges (APC) of this publication","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012639","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012639","name":"Sultan University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012639","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3297439","type":"journal-article","created":{"date-parts":[[2023,7,20]],"date-time":"2023-07-20T17:56:11Z","timestamp":1689875771000},"page":"75628-75656","source":"Crossref","is-referenced-by-count":12,"title":["Simulative Survey of Flooding Attacks in Intermittently Connected Vehicular Delay Tolerant Networks"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0086-9892","authenticated-orcid":false,"given":"Waqar","family":"Khalid","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2941-9780","authenticated-orcid":false,"given":"Naveed","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Prince Sultan University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1190-258X","authenticated-orcid":false,"given":"Suleman","family":"Khan","sequence":"additional","affiliation":[{"name":"School of Psychology and Computer Science, University of Central Lancashire, Preston, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5156-4293","authenticated-orcid":false,"given":"Zahid","family":"Ullah","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Institute of Management Sciences, Peshawar, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6311-027X","authenticated-orcid":false,"given":"Yasir","family":"Javed","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Prince Sultan University, Riyadh, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024658"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCC.2016.7496732"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2530705"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.007.2200147"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.042512.00053"},{"key":"ref6","article-title":"Cost-effective routing & cooperative framework for opportunistic networks","author":"Yasmin","year":"2016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2003.1204759"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS.2013.6684378"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2018.5117"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1347364.1347372"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-14314-4_17"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2015.65"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/JCN.2021.000043"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/605432.605408"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-287-990-5_24"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1290168.1290181"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30577-2_90"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-019-00735-2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102095"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/I2CT54291.2022.9825432"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-6624-7_45"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.102902"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-4035-3_8"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568511"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3143533"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-2066-7"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2008.4594892"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.84"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-022-01632-2"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3186029"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2022.3206167"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-102793-6.00002-3"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107901"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3235900"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924587"},{"key":"ref36","article-title":"Towards securing disruption-tolerant networking","author":"Asokan","year":"2007"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2331395"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1742-2_60"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2720757"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0438-3"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2016.7577025"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2016.7883116"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2454291"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-016-2253-9"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2011.5982571"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6257"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCS.2016.7542331"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-4284-5_1"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3142626"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2022.2080337"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996846"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899560"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.03.035"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.04.015"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2021EBP3103"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2021.3055503"},{"issue":"3","key":"ref57","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1504\/IJSNET.2019.103043","article-title":"SPRP: A secured routing protocol for delay tolerant networks","volume":"31","author":"Bansal","year":"2019","journal-title":"Int. J. Sensor Netw."},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2019.103492"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2017.082843"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s40012-016-0129-5"},{"issue":"8","key":"ref61","first-page":"34","article-title":"Node cooperation strategy on security aided and group encounter prophet routing protocol of an opportunistic network","volume":"163","author":"Abubakar","year":"2017","journal-title":"Int. J. Comput. Appl."},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2743703"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1320-1"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1080139.1080144"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCON.2013.6524206"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08829-x"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1504\/IJCNDS.2021.113012"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.02.694"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2250-7_2"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1064-y"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1049\/iet-wss.2017.0165"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2018.5203"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2016.7506691"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2018.00019"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2016.7518882"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2016.7518942"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080356"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1201\/9781315156477-7"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2020EBP3085"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1116"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.072210.00026"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.5120\/20367-2573"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2014.7033952"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2011.6108092"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/AICT.2010.78"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/961268.961272"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2015.7057854"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICGCCEE.2014.6921381"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICISSEC.2015.7370995"},{"issue":"1","key":"ref90","first-page":"110","article-title":"Deducing malicious attacks in disruption tolerant networks","volume":"1","author":"Lavanya","year":"2014","journal-title":"Indian J. Emerg. Electron. Comput. Commun."},{"key":"ref91","article-title":"Defending against flood attacks in disruption tolerant networks","author":"Rani","year":"2014"},{"key":"ref92","article-title":"Denial of service flood attacks in disruption tolerant networks","author":"Ramaraj"},{"key":"ref93","article-title":"Protection and detection of flood attacks in disruption tolerant networks","author":"Ezhilarasan"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2014.1216.1221"},{"key":"ref95","article-title":"Mitigating flooding attacks in disruption tolerant network","author":"Bassey"},{"key":"ref96","first-page":"9","article-title":"A study of black hole attacks in delay tolerant network","volume-title":"Trends in Wireless Communication and Information Security","author":"Bisarwal","year":"2021"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100464"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-021-00327-z"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4235"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC52330.2021.9641035"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2748345"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.03.031"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4196"},{"issue":"3","key":"ref104","first-page":"272","article-title":"Comparative analysis of attack detection methods in delay tolerant network","volume":"1","author":"Chaudhari","year":"2021","journal-title":"Int. J. Eng. Appl. Phys."},{"key":"ref105","article-title":"A trusted approach for prediction of data link failure and intrusion detection in wireless sensor networks","author":"Srividya","year":"2021"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/7965093"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-022-01030-8"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-4863-2_17"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03433-x"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/1288107.1288116"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-022-01366-9"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.3390\/s22010360"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10989-8_13"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3229623"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00705-w"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3152808"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.3390\/app11073022"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3184632"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2022.100657"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-021-01595-w"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/MDM55031.2022.00067"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2021.102475"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10188813.pdf?arnumber=10188813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T15:09:32Z","timestamp":1709305772000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10188813\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":123,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3297439","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}