{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T05:34:57Z","timestamp":1768455297358,"version":"3.49.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,14]]},"DOI":"10.1109\/ic3i59117.2023.10397708","type":"proceedings-article","created":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T18:27:08Z","timestamp":1706293628000},"page":"2082-2088","source":"Crossref","is-referenced-by-count":2,"title":["Collaborative MAC Protocol Design for Enhanced Network Lifetime in Mobile Ad Hoc Networks"],"prefix":"10.1109","author":[{"given":"Sanjeev Kumar","family":"Verma","sequence":"first","affiliation":[{"name":"Invertis University,Department of Applied Sciences,Bareilly,India"}]},{"given":"Digvijay","family":"Singh","sequence":"additional","affiliation":[{"name":"School of Engineering and Computer Dev Bhoomi Uttarakhand University,Uttarakhand,India"}]},{"given":"Yogita Yashveer","family":"Raghav","sequence":"additional","affiliation":[{"name":"K. R. Mangalam University,Department of Computer Science &#x0026; Engineering,Gurugram,India"}]},{"given":"S.","family":"Hemelatha","sequence":"additional","affiliation":[{"name":"Karpagam College of Engineering,Department of Computer Science Engineering,Coimbatore,India"}]},{"given":"S.","family":"Kannimuthu","sequence":"additional","affiliation":[{"name":"Karpagam College of Engineering,Department of Information Technology,Coimbatore,India"}]},{"given":"Chitrakant O.","family":"Banchhor","sequence":"additional","affiliation":[{"name":"Vishwakarma Institute of Information Technology,Pune,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/PhDEDITS51180.2020.9315311"},{"issue":"10S","key":"ref2","first-page":"3194","article-title":"An Extensive Study On Machine Learning Based Routing Algorithms Used In Wireless Sensor Network","author":"Kumar","year":"2020","journal-title":"International Journal of Advance Science and Technology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4394"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2984593"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07395-y"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36808-1_56"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.838089"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2003.818096"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.817829"},{"key":"ref4a","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.99"},{"key":"ref5a","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.060811.101196"},{"key":"ref7a","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749281"},{"key":"ref8a","doi-asserted-by":"publisher","DOI":"10.1145\/288235.288256"},{"key":"ref9a","article-title":"Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Spec","year":"1999","journal-title":"IEEE802. 11Standard"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2007.070207"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1653760.1653765"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.05.090307"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070176"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.07.081669"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.152"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1203757"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/icecaa55415.2022.9936206"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/icses55317.2022.9914108"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/i4tech55392.2022.9952780"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3233\/jifs-169966"},{"key":"ref21","first-page":"223","article-title":"Securing Cloud information with the use of Bastion Algorithm to enhance Confidentiality and Protection","volume":"118","author":"Jeyachandran","year":"2018","journal-title":"Int. J. Pure Appl. Math"},{"issue":"4","key":"ref22","doi-asserted-by":"crossref","first-page":"1549","DOI":"10.1007\/s10586-015-0496-y","article-title":"The probabilistic approach of energy utility and reusability model with enhanced security from the compromised nodes through wireless energy transfer on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET","volume":"18","author":"Poongodi","year":"2017","journal-title":"Cluster Computing"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-015-1822-7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/fi14010028"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT52158.2021.9548546"},{"key":"ref26","article-title":"Networks are struggling in Texas amid historic winter storms","author":"Peters","year":"2021","journal-title":"The V erge."},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-00815-2"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2020.101065"}],"event":{"name":"2023 6th International Conference on Contemporary Computing and Informatics (IC3I)","location":"Gautam Buddha Nagar, India","start":{"date-parts":[[2023,9,14]]},"end":{"date-parts":[[2023,9,16]]}},"container-title":["2023 6th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10397581\/10397594\/10397708.pdf?arnumber=10397708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T07:18:29Z","timestamp":1709450309000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10397708\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,14]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/ic3i59117.2023.10397708","relation":{},"subject":[],"published":{"date-parts":[[2023,9,14]]}}}