{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T07:06:27Z","timestamp":1746860787185},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,9,4]],"date-time":"2013-09-04T00:00:00Z","timestamp":1378252800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1186\/1687-1499-2013-220","type":"journal-article","created":{"date-parts":[[2013,9,4]],"date-time":"2013-09-04T00:14:24Z","timestamp":1378253664000},"source":"Crossref","is-referenced-by-count":7,"title":["SPAWN: a secure privacy-preserving architecture in wireless mobile ad hoc networks"],"prefix":"10.1186","volume":"2013","author":[{"given":"Muthumanickam","family":"Gunasekaran","sequence":"first","affiliation":[]},{"given":"Kandhasamy","family":"Premalatha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,9,4]]},"reference":[{"key":"799_CR1","first-page":"78","volume-title":"Evolution to 4G wireless: problems, solutions, and challenges","author":"J Qaddour","year":"2005","unstructured":"Qaddour J, Barbour R: Evolution to 4G wireless: problems, solutions, and challenges. Cairo, Egypt: Paper presented in the 3rd ACS\/IEEE international conference on computer systems and applications; 2005:78-I."},{"issue":"5","key":"799_CR2","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MWC.2004.1351677","volume":"11","author":"D Axiotis","year":"2004","unstructured":"Axiotis D, Al-Gizawi T, Peppas K, Protonotarios E, Lazarakis F, Papadias C, Philippopoulos P: Services in interworking 3G and WLAN environments. IEEE Wirel Commun 2004, 11(5):14-20. 10.1109\/MWC.2004.1351677","journal-title":"IEEE Wirel Commun"},{"issue":"5","key":"799_CR3","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1049\/ip-com:20040600","volume":"151","author":"M Lott","year":"2004","unstructured":"Lott M, Siebert M, Bonjour S, von Hugo D, Weckerle M: Interworking of WLAN and 3G systems. IEE Proc Comm 2004, 151(5):507-513. 10.1049\/ip-com:20040600","journal-title":"IEE Proc Comm"},{"issue":"1","key":"799_CR4","first-page":"28","volume":"4","author":"N Komninos","year":"2007","unstructured":"Komninos N, Vergados DD, Douligeris C: A two\u2012step authentication framework for mobile ad hoc networks. China Commun J 2007, 4(1):28-39.","journal-title":"China Commun J"},{"issue":"10","key":"799_CR5","doi-asserted-by":"publisher","first-page":"1926","DOI":"10.1109\/JSAC.2011.111203","volume":"29","author":"K El Defrawy","year":"2011","unstructured":"El Defrawy K, Tsudik G: Privacy-preserving location-based on-demand routing in MANETs. IEEE J Sel Area Comm 2011, 29(10):1926-1934.","journal-title":"IEEE J Sel Area Comm"},{"issue":"4","key":"799_CR6","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/SURV.2008.080407","volume":"10","author":"A Loay","year":"2008","unstructured":"Loay A, Ashfaq K, Mohsen G: A survey of secure mobile ad hoc routing protocols. IEEE Commun Surv Tutorials 2008, 10(4):78-93.","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"7","key":"799_CR7","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2011.5936152","volume":"49","author":"P Jianli","year":"2011","unstructured":"Jianli P, Subharthi P, Raj J: A survey of the research on future internet architectures. IEEE Commun Mag 2011, 49(7):26-36.","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"799_CR8","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/COMST.2007.358969","volume":"9","author":"FM Abduljalil","year":"2007","unstructured":"Abduljalil FM, Bodhe SK: A survey of integrating IP mobility protocols and mobile ad hoc networks. IEEE Commun Surv Tutorials 2007, 9(1):14-30.","journal-title":"IEEE Commun Surv Tutorials"},{"key":"799_CR9","first-page":"476","volume-title":"International Conference on Emerging Technologies","author":"A Irshad","year":"2009","unstructured":"Irshad A, Shafiq M, Rahman A, Khurram S, Usman M, Irshad E: A secure interaction among nodes from different MANET groups using 4G technologies. In International Conference on Emerging Technologies. Islamabad; 2009:476-481."},{"issue":"14","key":"799_CR10","doi-asserted-by":"publisher","first-page":"3537","DOI":"10.1016\/j.comcom.2008.04.014","volume":"31","author":"D Shuo","year":"2008","unstructured":"Shuo D: A Survey on Integrating MANETs with the Internet: Challenges and Designs. Comput Comm 2008, 31(14):3537-3551. 10.1016\/j.comcom.2008.04.014","journal-title":"Comput Comm"},{"issue":"1","key":"799_CR11","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S1570-8705(03)00013-1","volume":"1","author":"C Imrich","year":"2003","unstructured":"Imrich C, Marco C, Jennifer L: Mobile ad hoc networking: imperatives and challenges. Ad Hoc Netw 2003, 1(1):13-64. 10.1016\/S1570-8705(03)00013-1","journal-title":"Ad Hoc Netw"},{"issue":"2","key":"799_CR12","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1023\/A:1015399632291","volume":"9","author":"Y Sun","year":"2002","unstructured":"Sun Y, Royer E, Perkins CE: Internet connectivity for ad hoc mobile networks. Int J Wireless Inform Network 2002, 9(2):75-78. 10.1023\/A:1015399632291","journal-title":"Int J Wireless Inform Network"},{"key":"799_CR13","first-page":"308","volume-title":"Proceedings of ASIACRYPT","author":"I Teranishi","year":"2004","unstructured":"Teranishi I, Furukawa J, Sako K: K-times anonymous authentication. In Proceedings of ASIACRYPT. Jeju Island; 2004:308-322."},{"key":"799_CR14","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1145\/778415.778449","volume-title":"Proceedings of 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing","author":"J Kong","year":"2003","unstructured":"Kong J, Hong X: ANODR: Anonymous On-Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks. In Proceedings of 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing. Annapolis; 2003:291-302."},{"key":"799_CR15","first-page":"17","volume-title":"Proceedings of 4th International Conference on Networking","author":"R Wakikawa","year":"2005","unstructured":"Wakikawa R, Matsutani H, Koodli R, Nilsson A, Murai J: Mobile Gateways for Mobile Ad-Hoc Networks with Network Mobility Support. In Proceedings of 4th International Conference on Networking. Reunion Island, France; 2005:17-21."},{"key":"799_CR16","first-page":"75","volume-title":"MIPMANET Mobile IP for Mobile Ad Hoc Networks","author":"U Jonsson","year":"2000","unstructured":"Jonsson U, Alriksson F, Larsson T, Johansson P, Maguire J: MIPMANET Mobile IP for Mobile Ad Hoc Networks. Boston, MA: Paper presented in the 1st annual workshop on mobile and ad hoc networking and computing; 2000:75-85."},{"key":"799_CR17","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/ISPAN.1999.778966","volume-title":"Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks","author":"J Broch","year":"1999","unstructured":"Broch J, Maltz DA, Johnson DB: Supporting Hierarchy and Heterogeneous Interfaces in Multi-hop Wireless Ad Hoc Networks. In Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks. Perth; 1999:370-375."},{"key":"799_CR18","first-page":"130","volume-title":"Dynamic Mobile IP Routers in Ad Hoc Networks","author":"BA Kock","year":"2004","unstructured":"Kock BA, Schmidt JR: Dynamic Mobile IP Routers in Ad Hoc Networks. Netherlands: Paper presented in the international workshop on wireless ad-hoc networks; 2004:130-134."},{"issue":"5","key":"799_CR19","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MC.2003.1198236","volume":"36","author":"Y Tseng","year":"2003","unstructured":"Tseng Y, Shen C, Chen W: Integrating mobile IP with ad hoc networks. IEEE Comput Soc 2003, 36(5):48-55.","journal-title":"IEEE Comput Soc"},{"key":"799_CR20","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/CMPSAC.1996.544615","volume-title":"Proceedings of 20th International Conference on Computer Software and Applications Conference","author":"J CE Perkins","year":"1996","unstructured":"CE Perkins J, Thomas NY: Yorktown Heights, Mobile-IP, Ad-hoc Networking, and Nomadicity. In Proceedings of 20th International Conference on Computer Software and Applications Conference. Seoul; 1996:472-476."},{"issue":"4","key":"799_CR21","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/49.668972","volume":"16","author":"MG Reed","year":"1998","unstructured":"Reed MG, Syverson PF, Goldschlag DM: Anonymous connections and onion routing. IEEE J Sel Area Comm 1998, 16(4):482-494. 10.1109\/49.668972","journal-title":"IEEE J Sel Area Comm"},{"key":"799_CR22","first-page":"145","volume-title":"Proceedings of the International Conference on Advanced Information Networking and Applications","author":"S Seys","year":"2009","unstructured":"Seys S, Preneel B: ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks. In Proceedings of the International Conference on Advanced Information Networking and Applications. Switzerland: IEEE Computer Society, Washington, DC; 2009:145-155."},{"key":"799_CR23","first-page":"267","volume-title":"Proceedings of the 3rd IEEE International Conference on Mobile Ad-hoc and Sensor Systems","author":"D Sy","year":"2006","unstructured":"Sy D, Chen R, Bao L: ODAR: On-Demand Anonymous Routing in Ad Hoc Networks. In Proceedings of the 3rd IEEE International Conference on Mobile Ad-hoc and Sensor Systems. Vancouver, BC; 2006:267-275."},{"issue":"9","key":"799_CR24","doi-asserted-by":"publisher","first-page":"2376","DOI":"10.1109\/TWC.2006.1687761","volume":"5","author":"Y Zhang","year":"2006","unstructured":"Zhang Y, Liu W, Lou W, Fang Y: MASK: anonymous on-demand routing in mobile ad hoc networks. IEEE Trans Wireless Comm 2006, 5(9):2376-2385.","journal-title":"IEEE Trans Wireless Comm"},{"issue":"4","key":"799_CR25","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/s11276-007-0067-0","volume":"15","author":"H Choi","year":"2009","unstructured":"Choi H, Enck W, Shin J, McDaniel P, La Porta T: ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks, Springer Link. Wireless Netw 2009, 15(4):525-539. 10.1007\/s11276-007-0067-0","journal-title":"Wireless Netw"},{"key":"799_CR26","first-page":"358","volume-title":"Proceedings of 28th International Conference on Distributed Computing Systems Workshops","author":"B Zhu","year":"2008","unstructured":"Zhu B, Ren K, Wang L: Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. In Proceedings of 28th International Conference on Distributed Computing Systems Workshops. Beijing: IEEE Computer Society; 2008:358-363."},{"key":"799_CR27","first-page":"1","volume-title":"Proceedings of the International Conference on Management and Service Science","author":"J Pan","year":"2009","unstructured":"Pan J, Li J: MASR: An Efficient Strong Anonymous Routing Protocol for Mobile Ad Hoc Networks. In Proceedings of the International Conference on Management and Service Science. Wuhan; 2009:1-6."},{"key":"799_CR28","volume-title":"Extended Support for Global Connectivity for IPv6 Mobile Ad Hoc Networks, Internet-Draft draft-cha-manet-extended-support-globalv6-00.txt","author":"H Cha","year":"2003","unstructured":"Cha H, Park J, Kim H: Extended Support for Global Connectivity for IPv6 Mobile Ad Hoc Networks, Internet-Draft draft-cha-manet-extended-support-globalv6-00.txt. South Korea: Mobile Ad Hoc Networking Group; 2003."},{"key":"799_CR29","volume-title":"Proceedings of International Conference on Third Generation Wireless and Beyond (3Gwireless)","author":"J Xi","year":"2002","unstructured":"Xi J, Bettstetter C: Wireless Multi-Hop Internet Access: Gateway Discovery, Routing, and Addressing. In Proceedings of International Conference on Third Generation Wireless and Beyond (3Gwireless). San Francisco; 2002."},{"key":"799_CR30","volume-title":"Ad Hoc On-Demand Distance Vector (AODV) routing, RFC 3561","author":"C Perkins","year":"2003","unstructured":"Perkins C, Belding-Royer E, Das S: Ad Hoc On-Demand Distance Vector (AODV) routing, RFC 3561. 2003."},{"issue":"3","key":"799_CR31","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1049\/iet-ifs.2012.0141","volume":"7","author":"M Gunasekaran","year":"2012","unstructured":"Gunasekaran M, Premalatha K: TEAP: trusted-enhanced anonymous on demand routing protocol for mobile ad hoc networks. IET Inf Secur 2012, 7(3):203-211.","journal-title":"IET Inf Secur"},{"issue":"1","key":"799_CR32","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson D, Menezes A, Vanstone S: The elliptic curve digital signature algorithm (ECDSA). Int J Inform Secur 2001, 1(1):36-63.","journal-title":"Int J Inform Secur"},{"key":"799_CR33","first-page":"68","volume-title":"Applications of Secure Electronic Voting to Automated privacy Preserving Troubleshooting","author":"Q Huang","year":"2005","unstructured":"Huang Q, Jao D, Wang HJ: Applications of Secure Electronic Voting to Automated privacy Preserving Troubleshooting. New York: ACM; 2005:68-80."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2013-220\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-220.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-220.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T13:13:54Z","timestamp":1646486034000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2013-220"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,4]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["799"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2013-220","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9,4]]},"article-number":"220"}}