{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T19:30:28Z","timestamp":1775935828024,"version":"3.50.1"},"reference-count":40,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:00:00Z","timestamp":1598227200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2020,8,24]]},"abstract":"<jats:p>Over the past decade, distributed hash table- (DHT-) based routing protocols have been adopted in wireless ad hoc networks (WANETs) to achieve scalability in the route discovery phase by avoiding the flooding mechanism. The security aspects of the routing protocols based on the DHT mechanism are crucial to address and have not been discussed in the existing literature. Therefore, addressing the security issues in DHT-based routing protocols would prevent the service disruption, decrease the traffic overhead, and reduce the packet loss in the network. In this paper, several security issues are identified and elaborated through an example scenario. Moreover, a novel DHT-based routing protocol is proposed that uses a digital signature and the user\u2019s trust in order to swap securely the logical identifiers (LIDs). Trust between nodes is established by the user\u2019s acquaintance and the first visual contact. The proposed protocol vindicates its effectiveness via simulation results in terms of computation time, normalized overhead, percent improvement, and packet delivery ratio.<\/jats:p>","DOI":"10.1155\/2020\/2740654","type":"journal-article","created":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T23:31:06Z","timestamp":1598311866000},"page":"1-32","source":"Crossref","is-referenced-by-count":13,"title":["A Secure Data Dissemination in a DHT-Based Routing Paradigm for Wireless Ad Hoc Network"],"prefix":"10.1155","volume":"2020","author":[{"given":"Rukhsana","family":"Kousar","sequence":"first","affiliation":[{"name":"Computer Science Department, COMSATS University Islamabad, 44000, Pakistan"}]},{"given":"Majed","family":"Alhaisoni","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of Ha\u2019il, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3558-470X","authenticated-orcid":true,"given":"Shahbaz Abid","family":"Akhtar","sequence":"additional","affiliation":[{"name":"Computer Science Department, COMSATS University Islamabad, 44000, Pakistan"}]},{"given":"Nadir","family":"Shah","sequence":"additional","affiliation":[{"name":"Computer Science Department, COMSATS University Islamabad, 44000, Pakistan"}]},{"given":"Aamir","family":"Qamar","sequence":"additional","affiliation":[{"name":"Computer Science Department, COMSATS University Islamabad, 44000, Pakistan"}]},{"given":"Ahmad","family":"Karim","sequence":"additional","affiliation":[{"name":"Institute of Computing Department, Bahauddin Zakariya University, Multan, 66000, Pakistan"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2016.7464122"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.12.013"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.091113.131256"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxu004"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.986"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.218"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2524575"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.05.033"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2969"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1403-6"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2814017"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2008.923683"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.168"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)80687-X"},{"key":"21","year":"2006"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080407"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61520-701-5.ch012"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.01.004"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/2632296"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.11.014"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.2478\/jee-2018-0026"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.12.005"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1599-4"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.839"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.10.026"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.07.334"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-00766-8"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1282-9"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-017-0912-z"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.08.012"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896001"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4252"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.890092"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-34738-7_12"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2018.2823312"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00879-5"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.034"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.2715"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1109\/5.24143"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10452-7_3"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2020\/2740654.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2020\/2740654.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2020\/2740654.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T23:31:07Z","timestamp":1598311867000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/wcmc\/2020\/2740654\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,24]]},"references-count":40,"alternative-id":["2740654","2740654"],"URL":"https:\/\/doi.org\/10.1155\/2020\/2740654","relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,24]]}}}