{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:30:57Z","timestamp":1761611457447,"version":"3.37.3"},"reference-count":108,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN 1731-2013"],"award-info":[{"award-number":["RGPIN 1731-2013"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"name":"UBC PMC-Sierra Professorship in Networking and Communications"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/comst.2018.2859900","type":"journal-article","created":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T18:49:16Z","timestamp":1532544556000},"page":"3510-3541","source":"Crossref","is-referenced-by-count":14,"title":["A Survey of Secure Routing Protocols in Multi-Hop Cellular Networks"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4519-1034","authenticated-orcid":false,"given":"Gholamreza","family":"Ramezan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9911-2069","authenticated-orcid":false,"given":"Cyril","family":"Leung","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3791-0249","authenticated-orcid":false,"given":"Zhen Jane","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"2105","DOI":"10.1109\/49.957326","article-title":"Integrated cellular and ad hoc relaying systems: iCAR","volume":"19","author":"wu","year":"2001","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"1060","DOI":"10.1109\/TMC.2007.1035","article-title":"The design and evaluation of unified cellular and ad-hoc networks","volume":"6","author":"luo","year":"2007","journal-title":"IEEE Trans Mobile Comput"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2001.965324"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2605924"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2419979"},{"key":"ref30","first-page":"595","article-title":"When cellular networks met IPv6: Security problems of middleboxes in IPv6 cellular networks","author":"hong","year":"2017","journal-title":"Proc IEEE Eur Symp Secur Privacy (EuroS P)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2009.5073297"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.138"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2012.6506570"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6231164"},{"article-title":"Packet authentication and packet encryption\/decryption scheme for security gateway","year":"2000","author":"shimbo","key":"ref28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2580-5_4"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5772\/13468"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICoAC.2012.6416801"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2000.903912"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2004.1311489"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803204"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-015-0036-3"},{"key":"ref101","article-title":"Blockchain based trust & authentication for decentralized sensor networks","volume":"abs 1706 1730","author":"moinet","year":"2017","journal-title":"CoRR"},{"article-title":"Modular device and data management system and gateway for a communications network","year":"2017","author":"fisher","key":"ref26"},{"key":"ref100","first-page":"446","article-title":"A distributed authentication protocol using identity-based encryption and blockchain for LEO network","author":"li","year":"2017","journal-title":"Proc Int Conf Security Privacy Anonymity Comput Commun Storage"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.jnca.2016.03.006","article-title":"Secure routing for Internet of Things: A survey","volume":"66","author":"airehrour","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref50","volume":"34","author":"molisch","year":"2012","journal-title":"Wireless Communications"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS.2007.4449664"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012314.00178"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2519402"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5751298"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1368895"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00019-2"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"1613","DOI":"10.1093\/ietcom\/e88-b.4.1613","article-title":"Power and frequency efficient wireless multi-hop virtual cellular concept","volume":"88","author":"kudoh","year":"2005","journal-title":"IEICE Trans Commun"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2013.6824972"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2498171"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5783993"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.7000981"},{"key":"ref8","first-page":"5","article-title":"Solutions for secure routing in mobile ad hoc network (MANET): A survey","volume":"2","author":"jain","year":"2016","journal-title":"Imperial J Interdiscipl Res"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/Nets4CarsFall.2014.7000910"},{"journal-title":"Gartner IoT","year":"2016","key":"ref7"},{"key":"ref9","first-page":"129","article-title":"A survey on security issues in mobile ad-hoc networks","volume":"11","author":"boora","year":"2011","journal-title":"Int J Comput Sci Manag Stud"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2015.7145936"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2003.1286160"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2009.090505"},{"key":"ref47","article-title":"Ultra-low latency (ULL) networks: A comprehensive survey covering the IEEE TSN standard and related ULL research","volume":"abs 1803 7673","author":"nasrallah","year":"2018","journal-title":"CoRR"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2004.6596578"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1023\/B:MONE.0000031606.04846.fa"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1007421"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2002.1046660"},{"key":"ref73","article-title":"Secured greedy perimeter stateless routing for wireless sensor networks","volume":"abs 1009 585","author":"samundiswary","year":"2010","journal-title":"CoRR"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570684"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417664"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6539"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5198751"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4744-y"},{"key":"ref74","first-page":"117","article-title":"Secure routing protocol based on Weil paring for multi-hop cellular network (SRP-MCN)","volume":"16","author":"othmen","year":"2016","journal-title":"Int J Comput Sci Netw Security"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2016.7746093"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/778445.778449"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.37"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2002.1179633"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.832029"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2008.4651384"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060848"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2005.1605889"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2014.184"},{"key":"ref66","first-page":"18","article-title":"Secure opportunistic routing for wireless multi-hop networks using LPG and digital signature","volume":"1","author":"zhou","year":"2010","journal-title":"Information Assurance and Security Letters"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.1"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.06.003"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.032511.00097"},{"article-title":"Key distribution mechanisms for wireless sensor networks: A survey","year":"2005","author":"camtepe","key":"ref69"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2013.6692781"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1195151"},{"journal-title":"Security Engineering","year":"2008","author":"anderson","key":"ref108"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2497703"},{"journal-title":"A next-generation smart contract and decentralized application platform","year":"2014","author":"buterin","key":"ref107"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2586999"},{"journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System","year":"2008","author":"nakamoto","key":"ref106"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2016.98"},{"journal-title":"Adept An IoT Practitioner Perspective Draft Copy for Advance Review","year":"2015","author":"panikkar","key":"ref105"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.23919\/TST.2017.7986943"},{"key":"ref104","doi-asserted-by":"crossref","DOI":"10.1145\/3018896.3018901","article-title":"Harnessing the power of blockchain technology to solve IoT security & privacy issues","author":"ouaddah","year":"2017","journal-title":"Proc 2nd Int Conf Internet Things Data Cloud Comput (ICC)"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/BDCloud-SocialCom-SustainCom.2016.52"},{"key":"ref103","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-319-46568-5_53","article-title":"Towards a novel privacy-preserving access control model based on blockchain technology in IoT","author":"ouaddah","year":"2017","journal-title":"de Europe and Mena Cooperation Advances in information and Communication Technologies"},{"key":"ref102","article-title":"Securing vehicle to vehicle communications using blockchain through visible light and acoustic side-channels","volume":"abs 1704 2553","author":"rowan","year":"2017","journal-title":"CoRR"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.11.007"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016280"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1593277"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-33112-6_5"},{"key":"ref12","first-page":"535","article-title":"DoS attacks in mobile ad hoc networks: A survey","author":"jhaveri","year":"2012","journal-title":"Proc IEEE 2nd Int Conf Adv Comput Commun Technol (ACCT)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCE.2015.104"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6815897"},{"key":"ref15","first-page":"158","article-title":"Base-centric routing protocol for multihop cellular networks","volume":"1","author":"hsu","year":"2002","journal-title":"Proc IEEE Globe Telecommun Conf (GLOBECOM)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1041"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/WPMC.2002.1088284"},{"key":"ref17","first-page":"1273","article-title":"Multihop cellular: A new architecture for wireless communications","volume":"3","author":"lin","year":"2000","journal-title":"Proc IEEE 19th Annu Joint Conf Comput Commun Soc (INFOCOM)"},{"key":"ref81","first-page":"1","article-title":"Secure routing for mobile ad hoc networks","volume":"31","author":"papadimitratos","year":"2002","journal-title":"Commun Netw Distrib Syst Model Simul Conf (CNDS)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.01.019"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1065-3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SAINTW.2003.1210190"},{"key":"ref83","first-page":"961","article-title":"A hybrid network model for cellular wireless packet data networks","volume":"1","author":"hsieh","year":"2002","journal-title":"Proc IEEE Globe Telecommun Conf (GLOBECOM)"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080108"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841543"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/209436"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/952905"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2474118"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/8540503\/08419252.pdf?arnumber=8419252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T03:25:19Z","timestamp":1643253919000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8419252\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":108,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/comst.2018.2859900","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"type":"electronic","value":"1553-877X"},{"type":"electronic","value":"2373-745X"}],"subject":[],"published":{"date-parts":[[2018]]}}}