{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,7,6]],"date-time":"2022-07-06T12:27:44Z","timestamp":1657110464480},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,10,6]],"date-time":"2014-10-06T00:00:00Z","timestamp":1412553600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1186\/1687-1499-2014-161","type":"journal-article","created":{"date-parts":[[2014,10,6]],"date-time":"2014-10-06T09:01:29Z","timestamp":1412586089000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["The energy-efficient group key management protocol for strategic mobile scenario of MANETs"],"prefix":"10.1186","volume":"2014","author":[{"given":"Xiao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jing","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zetao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Handong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,6]]},"reference":[{"issue":"1","key":"1062_CR1","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1016\/j.jnca.2011.08.008","volume":"35","author":"M Omar","year":"2012","unstructured":"Omar M, Challal Y, Bouabdallah A: Certification-based trust models in mobile ad hoc networks: a survey and taxonomy. J. Netw. Comput. Appl 2012, 35(1):268-286. 10.1016\/j.jnca.2011.08.008","journal-title":"J. Netw. Comput. Appl"},{"issue":"1","key":"1062_CR2","doi-asserted-by":"publisher","first-page":"80","DOI":"10.4103\/0256-4602.93141","volume":"29","author":"MA Moharrum","year":"2012","unstructured":"Moharrum MA, Al-Daraiseh AA: Toward secure vehicular ad-hoc networks: a survey. IETE Tech. Rev 2012, 29(1):80-89. 10.4103\/0256-4602.93141","journal-title":"IETE Tech. Rev"},{"issue":"1","key":"1062_CR3","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1109\/TR.2010.2040534","volume":"59","author":"JH Cho","year":"2010","unstructured":"Cho JH, Chen IR, Feng PG: Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad-hoc networks. IEEE Trans. Reliab 2010, 59(1):231-241.","journal-title":"IEEE Trans. Reliab"},{"key":"1062_CR4","first-page":"97","volume-title":"1st Annual IEEE Communications Society Conference on Sensor and Ad-hoc Communications and Networks","author":"D Subhadrabandhu","year":"2004","unstructured":"Subhadrabandhu D, Sarkar S, Anjum F: Efficacy of misuse detection in ad-hoc networks. In 1st Annual IEEE Communications Society Conference on Sensor and Ad-hoc Communications and Networks. Santa Clara; 2004:97-107."},{"issue":"1","key":"1062_CR5","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.comcom.2010.08.007","volume":"34","author":"MY Su","year":"2011","unstructured":"Su MY: Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput. Commun 2011, 34(1):107-117. 10.1016\/j.comcom.2010.08.007","journal-title":"Comput. Commun"},{"issue":"2","key":"1062_CR6","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.3390\/s110201345","volume":"11","author":"F Renjian","year":"2011","unstructured":"Renjian F, Xiaofeng X, Xiang Z: A trust evaluation algorithm based on node behaviors and D-S evidence theory for wireless sensor networks. Sensors 2011, 11(2):1345-1360.","journal-title":"Sensors"},{"issue":"3","key":"1062_CR7","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1016\/j.adhoc.2011.08.003","volume":"10","author":"A Rehan","year":"2012","unstructured":"Rehan A, Turgay K, Raju GV: EMLTrust: an enhanced machine learning based reputation system for MANETs. Ad Hoc Netw 2012, 10(3):435-457. 10.1016\/j.adhoc.2011.08.003","journal-title":"Ad Hoc Netw"},{"issue":"3","key":"1062_CR8","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1109\/TNSM.2010.1009.I9P0339","volume":"7","author":"PB Velloso","year":"2010","unstructured":"Velloso PB, Laufer RP, de o Cunha D, Duarte OCMB, Pujolle G: Trust management in mobile ad hoc networks using a scalable maturity-based model. IEEE Trans. Netw. Serv. Manag 2010, 7(3):172-185.","journal-title":"IEEE Trans. Netw. Serv. Manag"},{"issue":"4","key":"1062_CR9","first-page":"S1, 1207","volume":"8","author":"D Chen","year":"2011","unstructured":"Chen D, Chang GR, Sun DW, Li J, Jia J, Wang X: Comput. Sci. Inform. Syst. 2011, 8(4):S1, 1207-2228.","journal-title":"Comput. Sci. Inform. Syst"},{"issue":"3","key":"1062_CR10","first-page":"1","volume":"4","author":"G Saurabh","year":"2008","unstructured":"Saurabh G, Laura KB, Mani BS: Reputation-based framework for high integrity sensor networks. ACM Trans. Sensor Networks 2008, 4(3):1-37.","journal-title":"ACM Trans. Sensor Networks"},{"issue":"1","key":"1062_CR11","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.cose.2011.09.005","volume":"31","author":"TH Lacey","year":"2012","unstructured":"Lacey TH, Mills RF, Mullins BE, Raines RA, Oxley ME, Rogers SK: RIPsec - using reputation-based multilayer security to protect MANETs. Comput. Security 2012, 31(1):122-136. 10.1016\/j.cose.2011.09.005","journal-title":"Comput. Security"},{"issue":"10","key":"1062_CR12","first-page":"3","volume":"19","author":"G Tuna","year":"2013","unstructured":"Tuna G, Potirakis SM, Koulouras G: Implementing a trust and reputation model for robotic sensor networks. Elektronika lr Elektrotechinka 2013, 19(10):3-8. ISSN 1392\u20131215. doi:10.5755\/j01.eee.19.10.5884","journal-title":"Elektronika lr Elektrotechinka"},{"issue":"5","key":"1062_CR13","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1109\/TMC.2011.92","volume":"11","author":"MMEA Mahmoud","year":"2012","unstructured":"Mahmoud MMEA, Shen XM: FESCIM: fair, efficient, and secure cooperation incentive mechanism for multihop cellular networks. IEEE Trans. Mob. Comput 2012, 11(5):753-766.","journal-title":"IEEE Trans. Mob. Comput"},{"key":"1062_CR14","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.1016\/j.comcom.2010.02.007","volume":"33","author":"K Dirra","year":"2010","unstructured":"Dirra K, Seba H, Kheddouci H: ECGK: an efficient clustering scheme for group key management in MANETs. Comput Commun 2010, 33: 1094-1107. 10.1016\/j.comcom.2010.02.007","journal-title":"Comput Commun"},{"key":"1062_CR15","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1016\/j.comnet.2004.11.023","volume":"48","author":"B Zhu","year":"2005","unstructured":"Zhu B, Bao F, Deng RH, Kankanhalli MS, Wang G: Efficient and robust key management for large mobile ad hoc networks. Comput. Netw 2005, 48: 657-682. 10.1016\/j.comnet.2004.11.023","journal-title":"Comput. Netw"},{"key":"1062_CR16","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.peva.2007.07.002","volume":"65","author":"JH Cho","year":"2008","unstructured":"Cho JH, Chen IR, Wang DC: Performance optimization of region-based group key management in mobile ad hoc networks. Perform. Eval 2008, 65: 319-344. 10.1016\/j.peva.2007.07.002","journal-title":"Perform. Eval"},{"key":"1062_CR17","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.peva.2010.09.005","volume":"68","author":"JH Cho","year":"2011","unstructured":"Cho JH, Chen IR: Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks. Perform. Eval 2011, 68: 58-75. 10.1016\/j.peva.2010.09.005","journal-title":"Perform. Eval"},{"key":"1062_CR18","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1016\/j.adhoc.2007.04.006","volume":"6","author":"DJ Huang","year":"2008","unstructured":"Huang DJ, Medhi D: A secure group key management scheme for hierarchical mobile ad hoc networks. Ad Hoc Netw 2008, 6: 560-577. 10.1016\/j.adhoc.2007.04.006","journal-title":"Ad Hoc Netw"},{"issue":"2","key":"1062_CR19","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.adhoc.2009.06.002","volume":"8","author":"I Khalil","year":"2010","unstructured":"Khalil I, Bagchi S, Rotaru C, Shroff N: UnMask: utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. Ad Hoc Netw 2010, 8(2):148-164. 10.1016\/j.adhoc.2009.06.002","journal-title":"Ad Hoc Netw"},{"issue":"8","key":"1062_CR20","doi-asserted-by":"publisher","first-page":"1096","DOI":"10.1109\/TMC.2010.249","volume":"10","author":"I Khalil","year":"2011","unstructured":"Khalil I, Bagchi S: Stealthy attacks in wireless ad hoc networks: detection and countermeasure. IEEE Trans. Mob. Comput 2011, 10(8):1096-1112.","journal-title":"IEEE Trans. Mob. Comput"},{"key":"1062_CR21","volume-title":"Proceedings of 2011 IEEE International Conference on Communications","author":"F Adelantado","year":"2011","unstructured":"Adelantado F, Verikoukis C: A non-parametric statistical approach for malicious users detection in cognitive wireless ad-hoc networks. In Proceedings of 2011 IEEE International Conference on Communications. Kyoto: ICC; 2011."},{"issue":"1","key":"1062_CR22","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1504\/IJMC.2012.044525","volume":"10","author":"C-T Li","year":"2012","unstructured":"Li C-T, Yang C-C, Hwang M-S: A secure routing protocol with node selfishness resistance in MANETs. Int. J. Mobile Commun. (IJMC) 2012, 10(1):103-118. 10.1504\/IJMC.2012.044525","journal-title":"Int. J. Mobile Commun. (IJMC)"},{"key":"1062_CR23","doi-asserted-by":"publisher","first-page":"1797","DOI":"10.1016\/j.comnet.2008.01.018","volume":"52","author":"C Konstantopoulos","year":"2008","unstructured":"Konstantopoulos C, Gavalas D, Pantziou G: Clustering in mobile ad hoc networks through neighborhood stability-based mobility prediction. Comput. Netw 2008, 52: 1797-1824. 10.1016\/j.comnet.2008.01.018","journal-title":"Comput. Netw"},{"key":"1062_CR24","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1016\/j.jpdc.2009.10.002","volume":"70","author":"JA Torkestani","year":"2010","unstructured":"Torkestani JA, Meybodi MR: Clustering the wireless ad hoc networks: a distributed learning automata approach. J. Parallel Distrib. Compt 2010, 70: 394-405. 10.1016\/j.jpdc.2009.10.002","journal-title":"J. Parallel Distrib. Compt"},{"key":"1062_CR25","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/j.compeleceng.2011.05.006","volume":"37","author":"JA Torkestani","year":"2011","unstructured":"Torkestani JA, Meybodi MR: LLACA: an adaptive localized clustering algorithm for wireless ad hoc networks. Comput. Electr. Eng 2011, 37: 461-474. 10.1016\/j.compeleceng.2011.05.006","journal-title":"Comput. Electr. Eng"},{"issue":"1","key":"1062_CR26","first-page":"67","volume":"6","author":"B Mohamed Salah","year":"2008","unstructured":"Mohamed Salah B, Isabelle C, Olivier F: Group key management in MANETs. Int. J. Network Security 2008, 6(1):67-79.","journal-title":"Int. J. Network Security"},{"issue":"1","key":"1062_CR27","first-page":"90","volume":"4","author":"A Abdel-Hafez","year":"2007","unstructured":"Abdel-Hafez A, Miri A, Orozco-Barbosa L: Authenticated group key agreement protocols for ad hoc wireless networks. Int. J. Netw. Secur 2007, 4(1):90-98.","journal-title":"Int. J. Netw. Secur"},{"key":"1062_CR28","first-page":"516","volume-title":"Proceedings of 2010 IEEE Asia-Pacific Services Computing Conference (APSCC 2010)","author":"X Wang","year":"2010","unstructured":"Wang X, Wu YF, Yu N, Wan JW: A self-adaption link-quality detection algorithm for data collecting in OSN. In Proceedings of 2010 IEEE Asia-Pacific Services Computing Conference (APSCC 2010). Hangzhou; 2010:516-522."},{"key":"1062_CR29","first-page":"884","volume-title":"6th International Conference on Mobile Adhoc and Sensor Systems","author":"XL Huang","year":"2009","unstructured":"Huang XL, Ma FY, Zhang WJ: TAON: a topology-oriented active overlay network protocol. In 6th International Conference on Mobile Adhoc and Sensor Systems. Macau; 2009:884-890."},{"issue":"3","key":"1062_CR30","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/MCOM.2010.5434384","volume":"48","author":"SM George","year":"2010","unstructured":"George SM, Zhou W, Chenji H, Won M, Lee YO, Pazarloglou A, Stoleru R, Barooah P: DistressNet: a wireless ad hoc and sensor network architecture for situation management in disaster response. IEEE Commun. Mag 2010, 48(3):128-136.","journal-title":"IEEE Commun. Mag"},{"issue":"11","key":"1062_CR31","doi-asserted-by":"publisher","first-page":"5490","DOI":"10.1109\/TWC.2009.070602","volume":"8","author":"WF Liang","year":"2009","unstructured":"Liang WF, Richard B, Xu YL, Wang Q: Minimum-energy all-to-all multicasting in wireless ad hoc networks. IEEE Trans. Wirel. Commun 2009, 8(11):5490-5499.","journal-title":"IEEE Trans. Wirel. Commun"},{"issue":"4","key":"1062_CR32","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1109\/TNET.2009.2038998","volume":"18","author":"S Guo","year":"2010","unstructured":"Guo S, Leung VCM: A distributed algorithm for min-max tree and max-min cut problems in communication networks. IEEE\/ACM Trans. Networking 2010, 18(4):1067-1076.","journal-title":"IEEE\/ACM Trans. Networking"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2014-161\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-161.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-161.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T16:46:58Z","timestamp":1548089218000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2014-161"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,6]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["1062"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2014-161","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,6]]},"assertion":[{"value":"15 April 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"161"}}