{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:18Z","timestamp":1750306278444,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905204","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Localization Adaptive Secure Routing for Ad-Hoc Cloud Networks Based on Synchronized Timestamp Approach"],"prefix":"10.1145","author":[{"given":"Niroj Kumar","family":"Pani","sequence":"first","affiliation":[{"name":"Department of Computer Science Engineering and Application, IGIT, Sarang, India"}]},{"given":"Bikram Keshari","family":"Rath","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Utkal University, Bhubaneswar, India"}]},{"given":"Sarojananda","family":"Mishra","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Engineering and Application, IGIT, Sarang, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"National Institute of Standards and Technology. Draft NIST Working Definition of Cloud Computing v14. (2009) http:\/\/csrc.nist.gov\/groups\/SNS\/cloud-computing\/cloud-def-v14.doc.  National Institute of Standards and Technology. Draft NIST Working Definition of Cloud Computing v14. (2009) http:\/\/csrc.nist.gov\/groups\/SNS\/cloud-computing\/cloud-def-v14.doc."},{"key":"e_1_3_2_1_2_1","unstructured":"Kirby G. Dearle A. Macdonald A. and Fernandes A. 2010. An approach to ad hoc cloud computing. arXiv preprint arXiv:1002.4738.  Kirby G. Dearle A. Macdonald A. and Fernandes A. 2010. An approach to ad hoc cloud computing. arXiv preprint arXiv:1002.4738."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Pippal S.K. Mishra S. and Kushwaha D.S. 2012. Architectural Design and Issues for Ad-Hoc Clouds. Advances in Communication Network and Computing pp. 291--296.  Pippal S.K. Mishra S. and Kushwaha D.S. 2012. Architectural Design and Issues for Ad-Hoc Clouds. Advances in Communication Network and Computing pp. 291--296.","DOI":"10.1007\/978-3-642-35615-5_44"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.257"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.05.023"},{"key":"e_1_3_2_1_6_1","first-page":"262","volume-title":"Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications","author":"Bakar K.A.","unstructured":"Bakar , K.A. , Ghafoor , K.Z. , Mohammed , M.A. , Sadiq , A.S. and Lloret , J ., 2013. Vehicular cloud computing: trends and challenges . Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications , p. 262 . Bakar, K.A., Ghafoor, K.Z., Mohammed, M.A., Sadiq, A.S. and Lloret, J., 2013. Vehicular cloud computing: trends and challenges. Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications, p. 262."},{"key":"e_1_3_2_1_7_1","first-page":"262","volume-title":"Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications","author":"Bakar K.A.","unstructured":"Bakar , K.A. , Ghafoor , K.Z. , Mohammed , M.A. , Sadiq , A.S. and Lloret , J ., 2013. Vehicular cloud computing: trends and challenges . Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications , p. 262 . Bakar, K.A., Ghafoor, K.Z., Mohammed, M.A., Sadiq, A.S. and Lloret, J., 2013. Vehicular cloud computing: trends and challenges. Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications, p. 262."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.06.003"},{"issue":"4","key":"e_1_3_2_1_9_1","first-page":"658","article-title":"Mitigating packet dropping problem in mobile ad hoc networks: Proposals and challenges. Communications Surveys & Tutorials","volume":"13","author":"Djahel S.","year":"2011","unstructured":"Djahel , S. , Nait-Abdesselam , F. and Zhang , Z. , 2011 . Mitigating packet dropping problem in mobile ad hoc networks: Proposals and challenges. Communications Surveys & Tutorials , IEEE , 13 ( 4 ), pp. 658 -- 672 . http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=5556741. Djahel, S., Nait-Abdesselam, F. and Zhang, Z., 2011. Mitigating packet dropping problem in mobile ad hoc networks: Proposals and challenges. Communications Surveys & Tutorials, IEEE, 13(4), pp. 658--672. http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=5556741.","journal-title":"IEEE"},{"volume-title":"INFOCOM, 2010 Proceedings IEEE (pp. 1--9). IEEE.","author":"Galuba W.","key":"e_1_3_2_1_10_1","unstructured":"Galuba , W. , Papadimitratos , P. , Poturalski , M. , Aberer , K. , Despotovic , Z. and Kellerer , W ., 2010, March. Castor: scalable secure routing for ad hoc networks . In INFOCOM, 2010 Proceedings IEEE (pp. 1--9). IEEE. Galuba, W., Papadimitratos, P., Poturalski, M., Aberer, K., Despotovic, Z. and Kellerer, W., 2010, March. Castor: scalable secure routing for ad hoc networks. In INFOCOM, 2010 Proceedings IEEE (pp. 1--9). IEEE."},{"key":"e_1_3_2_1_11_1","unstructured":"Haas Z.J. Pearlman M.R. and Samar P. 2002. The zone routing protocol (ZRP) for ad hoc networks. draft-ietf-manet-zone-zrp-04. txt.  Haas Z.J. Pearlman M.R. and Samar P. 2002. The zone routing protocol (ZRP) for ad hoc networks. draft-ietf-manet-zone-zrp-04. txt."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Chacko N.M. Sam S. and Leelipushpam P.G.J. 2013 March. A survey on various privacy and security features adopted in MANETs routing Protocol. In Automation Computing Communication Control and Compressed Sensing (iMac4s) 2013 International Multi-Conference on (pp. 508--513). IEEE.  Chacko N.M. Sam S. and Leelipushpam P.G.J. 2013 March. A survey on various privacy and security features adopted in MANETs routing Protocol. In Automation Computing Communication Control and Compressed Sensing (iMac4s) 2013 International Multi-Conference on (pp. 508--513). IEEE.","DOI":"10.1109\/iMac4s.2013.6526466"},{"volume-title":"Local Computer Networks, 2002. Proceedings. LCN 2002. 27th Annual IEEE Conference on (pp. 751--760)","author":"Ghazizadeh S.","key":"e_1_3_2_1_13_1","unstructured":"Ghazizadeh , S. , Ilghami , O. , Sirin , E. and Yaman , F ., 2002, November. Security-aware adaptive dynamic source routing protocol . In Local Computer Networks, 2002. Proceedings. LCN 2002. 27th Annual IEEE Conference on (pp. 751--760) . IEEE. Ghazizadeh, S., Ilghami, O., Sirin, E. and Yaman, F., 2002, November. Security-aware adaptive dynamic source routing protocol. In Local Computer Networks, 2002. Proceedings. LCN 2002. 27th Annual IEEE Conference on (pp. 751--760). IEEE."},{"key":"e_1_3_2_1_14_1","first-page":"1976","volume-title":"INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies (Vol. 3","author":"Hu Y.C.","unstructured":"Hu , Y.C. , Perrig , A. and Johnson , D.B ., 2003, April. Packet leashes: a defense against wormhole attacks in wireless networks . In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies (Vol. 3 , pp. 1976 -- 1986 ). IEEE. Hu, Y.C., Perrig, A. and Johnson, D.B., 2003, April. Packet leashes: a defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies (Vol. 3, pp. 1976--1986). IEEE."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/98.760423"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Pervaiz M.O. Cardei M. and Wu J. 2010. Routing security in ad hoc wireless networks. In Network Security (pp. 117--142). Springer US.  Pervaiz M.O. Cardei M. and Wu J. 2010. Routing security in ad hoc wireless networks. In Network Security (pp. 117--142). Springer US.","DOI":"10.1007\/978-0-387-73821-5_6"},{"key":"e_1_3_2_1_17_1","first-page":"666","volume-title":"Data Communications and Networking Special Indian","author":"Behrouz A.","year":"2006","unstructured":"Behrouz A. Forouzan . Data Communications and Networking Special Indian Fourth edition 2006 McGraw-Hill Companies, Inc. , New York 0-07-063414-9 Hardcover, pp. 666 -- 671 . Behrouz A. Forouzan. Data Communications and Networking Special Indian Fourth edition 2006 McGraw-Hill Companies, Inc., New York 0-07-063414-9 Hardcover, pp. 666--671."},{"key":"e_1_3_2_1_18_1","unstructured":"Haas Z.J. Pearlman M.R. and Samar P. 2002. Intrazone routing protocol (iarp). IETF Internet Draft. http:\/\/www.ietf.org.  Haas Z.J. Pearlman M.R. and Samar P. 2002. Intrazone routing protocol (iarp). IETF Internet Draft. http:\/\/www.ietf.org."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Chlamtac I. Conti M. and Liu J.J.N. 2003. Mobile ad hoc networking: imperatives and challenges. Ad hoc networks 1(1) pp. 13--64.  Chlamtac I. Conti M. and Liu J.J.N. 2003. Mobile ad hoc networking: imperatives and challenges. Ad hoc networks 1(1) pp. 13--64.","DOI":"10.1016\/S1570-8705(03)00013-1"},{"volume-title":"Network Protocols, 2002. Proceedings. 10th IEEE International Conference on (pp. 78--87)","author":"Sanzgiri K.","key":"e_1_3_2_1_20_1","unstructured":"Sanzgiri , K. , Dahill , B. , Levine , B.N. , Shields , C. and Royer , E.M.B. , 2002, November. A secure routing protocol for ad hoc networks . In Network Protocols, 2002. Proceedings. 10th IEEE International Conference on (pp. 78--87) . IEEE. Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C. and Royer, E.M.B., 2002, November. A secure routing protocol for ad hoc networks. In Network Protocols, 2002. Proceedings. 10th IEEE International Conference on (pp. 78--87). IEEE."},{"key":"e_1_3_2_1_21_1","unstructured":"Haas Z.J. Pearlman M.R. and Samar P. 2002. The bordercast resolution protocol (BRP) for ad hoc networks. draft-ietf-manet-zone-brp-02. txt pp. 14853--13801.  Haas Z.J. Pearlman M.R. and Samar P. 2002. The bordercast resolution protocol (BRP) for ad hoc networks. draft-ietf-manet-zone-brp-02. txt pp. 14853--3801."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Kharche M.H. and Chouhan M.D.S. 2012. Building trust in cloud using public key infrastructure. International Journal of Advanced Computer Science and Applications 3(3).  Kharche M.H. and Chouhan M.D.S. 2012. Building trust in cloud using public key infrastructure. International Journal of Advanced Computer Science and Applications 3(3).","DOI":"10.14569\/IJACSA.2012.030305"},{"key":"e_1_3_2_1_23_1","unstructured":"http:\/\/www.isi.edu\/nsam\/ns  http:\/\/www.isi.edu\/nsam\/ns"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905204","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905204","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:50Z","timestamp":1750221530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905204"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":23,"alternative-id":["10.1145\/2905055.2905204","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905204","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}