{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:35:07Z","timestamp":1769722507348,"version":"3.49.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,11,29]],"date-time":"2014-11-29T00:00:00Z","timestamp":1417219200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1186\/1687-1499-2014-205","type":"journal-article","created":{"date-parts":[[2014,11,29]],"date-time":"2014-11-29T20:01:30Z","timestamp":1417291290000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["A distributed framework for detecting selfish nodes in MANET using Record- and Trust-Based Detection (RTBD) technique"],"prefix":"10.1186","volume":"2014","author":[{"given":"Senthilkumar","family":"Subramaniyan","sequence":"first","affiliation":[]},{"given":"William","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Karthikeyan","family":"Subramaniyan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,29]]},"reference":[{"key":"1013_CR1","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1109\/TMC.2011.57","volume":"11","author":"C Jae-Ho","year":"2012","unstructured":"Jae-Ho C, Kyu-Sun S, SangKeun L, Kun-Lung W: Handling selfishness in replica allocation over a mobile ad hoc network. IEEE Transactions on Mobile Computing 2012, 11: 278-291.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"1013_CR2","doi-asserted-by":"publisher","first-page":"2187","DOI":"10.1016\/j.adhoc.2013.05.001","volume":"11","author":"BG Ryu","year":"2013","unstructured":"Ryu BG, Choi JH, Lee S: Impact of node distance on selfish replica allocation in a mobile ad-hoc network. Ad Hoc Netw. 2013, 11: 2187-2202. 10.1016\/j.adhoc.2013.05.001","journal-title":"Ad Hoc Netw"},{"issue":"2","key":"1013_CR3","first-page":"6","volume":"2","author":"H Sedghi","year":"2013","unstructured":"Sedghi H, Pakravan MR, Aref MR: A misbehavior-tolerant multipath routing protocol for wireless ad hoc networks. Int J Res Wireless Syst 2013, 2(2):6-15.","journal-title":"Int J Res Wireless Syst"},{"key":"1013_CR4","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.jnca.2010.09.007","volume":"34","author":"M Mejia","year":"2011","unstructured":"Mejia M, Pe\u00f1a N, Mu\u00f1oz JL, Esparza O, Alzate MA: A game theoretic trust model for on-line distributed evolution of cooperation in MANETs. J. Netw. Comput. Appl. 2011, 34: 39-51. 10.1016\/j.jnca.2010.09.007","journal-title":"J. Netw. Comput. Appl"},{"key":"1013_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-014-0007-9","volume":"4","author":"R Singh","year":"2014","unstructured":"Singh R, Singh P, Duhan M: An effective implementation of security based algorithmic approach in mobile adhoc networks. Hum Centric Comput Inf Sci 2014, 4: 1-14. 06\/19 2014 10.1186\/2192-1962-4-1","journal-title":"Hum Centric Comput Inf Sci"},{"key":"1013_CR6","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1007\/s11277-013-1346-y","volume":"74","author":"E Hern\u00e1ndez-Orallo","year":"2014","unstructured":"Hern\u00e1ndez-Orallo E, Olmos MS, Cano J-C, Calafate C, Manzoni P: A fast model for evaluating the detection of selfish nodes using a collaborative approach in MANETs. Wirel. Pers. Commun. 2014, 74: 1099-1116. 02\/01 2014 10.1007\/s11277-013-1346-y","journal-title":"Wirel. Pers. Commun"},{"key":"1013_CR7","first-page":"392","volume-title":"Global Trends in Computing and Communication Systems. vol. 269","author":"V Manoj","year":"2012","unstructured":"Manoj V, Raghavendiran N, Aaqib M, Vijayan R: Trust based certificate authority for detection of malicious nodes in MANET. In Global Trends in Computing and Communication Systems. vol. 269. Edited by: Krishna PV. Springer, Berlin; 2012:392-401."},{"key":"1013_CR8","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s11235-013-9753-7","volume":"55","author":"I Jawhar","year":"2014","unstructured":"Jawhar I, Trabelsi Z, Al-Jaroodi J: Towards more reliable and secure source routing in mobile ad hoc and sensor networks. Telecommun. Syst. 2014, 55: 81-91. 10.1007\/s11235-013-9753-7","journal-title":"Telecommun. Syst"},{"key":"1013_CR9","first-page":"1","volume-title":"Telecommun. Syst","author":"A Rodriguez-Mayol","year":"2013","unstructured":"Rodriguez-Mayol A, Gozalvez J: Reputation based selfishness prevention techniques for mobile ad-hoc networks. Telecommun. Syst. 2013, 1-15."},{"key":"1013_CR10","doi-asserted-by":"publisher","first-page":"1877","DOI":"10.1007\/s11235-011-9471-y","volume":"52","author":"F Afghah","year":"2013","unstructured":"Afghah F, Razi A, Abedi A: Stochastic game theoretical model for packet forwarding in relay networks. Telecommun. Syst. 2013, 52: 1877-1893. 10.1007\/s11235-011-9471-y","journal-title":"Telecommun. Syst"},{"key":"1013_CR11","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1109\/LCOMM.2012.030912.112482","volume":"16","author":"E Hernandez-Orallo","year":"2012","unstructured":"Hernandez-Orallo E, Serrat MD, Cano JC, Calafate CT, Manzoni P: Improving selfish node detection in MANETs using a collaborative watchdog. Commun Letters IEEE 2012, 16: 642-645.","journal-title":"Commun Letters IEEE"},{"issue":"1","key":"1013_CR12","first-page":"221","volume":"3","author":"S Padiya","year":"2013","unstructured":"Padiya S, Pandit R, Patel S: Survey of innovated techniques to detect selfish nodes in MANET. IJCNWMC 2013, 3(1):221-230.","journal-title":"IJCNWMC"},{"issue":"4","key":"1013_CR13","doi-asserted-by":"publisher","first-page":"225","DOI":"10.5121\/ijwmn.2011.3416","volume":"3","author":"DB Roy","year":"2011","unstructured":"Roy DB: R Chaki, MADSN: mobile agent based detection of selfish node in MANET. Int J Wireless Mobile Networks (IJWMN) 2011, 3(4):225-235. 10.5121\/ijwmn.2011.3416","journal-title":"Int J Wireless Mobile Networks (IJWMN)"},{"issue":"4","key":"1013_CR14","first-page":"190","volume":"1","author":"D Koshti","year":"2011","unstructured":"Koshti D, Kamoji S: Comparative study of techniques used for detection of selfish nodes in mobile ad hoc networks. Int J Soft Comput Eng (IJSCE) 2011, 1(4):190-194.","journal-title":"Int J Soft Comput Eng (IJSCE)"},{"key":"1013_CR15","first-page":"77","volume":"1","author":"R Patil","year":"2012","unstructured":"Patil R, Kallimath S: Cross layer approach for selfish node detection in MANET. Int J Adv Res Electronics Commun Eng 2012, 1: 77-81.","journal-title":"Int J Adv Res Electronics Commun Eng"},{"key":"1013_CR16","first-page":"88","volume-title":"Int J Comput Sci Manage Res","author":"A Kurkure","year":"2013","unstructured":"Kurkure A, Chaudhari B: Selfish node detection techniques in MANET: a review. Int J Comput Sci Manage Res 2013, 88-94."},{"key":"1013_CR17","volume-title":"ICTACT J Commun Technol","author":"N Nandhini","year":"2013","unstructured":"Nandhini N, Ramesh S, Kumar PG: Effective ant based routing algorithm for data replication in manets. ICTACT J Commun Technol 2013., 4:"},{"key":"1013_CR18","first-page":"1161","volume-title":"International Symposium on Integrated Network Management (IM 2013), 2013 IFIP\/IEEE","author":"R-I Ciobanu","year":"2013","unstructured":"Ciobanu R-I, Dobre C, Dascalu M, Trausan-Matu S, Cristea V: Collaborative selfish node detection with an incentive mechanism for opportunistic networks. In International Symposium on Integrated Network Management (IM 2013), 2013 IFIP\/IEEE. Ghent; 2013:1161-1166."},{"issue":"1","key":"1013_CR19","first-page":"24","volume":"1","author":"L Sahu","year":"2013","unstructured":"Sahu L, Sinha C: A cooperative approach for understanding behavior of intrusion detection system in mobile ad hoc networks. Int. J. Comput. Sci. 2013, 1(1):24-30.","journal-title":"Int. J. Comput. Sci"},{"key":"1013_CR20","volume-title":"Int. J. Appl. Eng. Res","author":"S Goyal","year":"2012","unstructured":"Goyal S, Singh I: An improved inverted table approach to detect selfish node in mobile ad hoc network. Int. J. Appl. Eng. Res. 2012., 7:"},{"issue":"2","key":"1013_CR21","first-page":"860","volume":"4","author":"DG Patel","year":"2014","unstructured":"Patel DG, Pandey PA, Patel MC: Trust based routing in ad-hoc networks. Int J Curr Eng Technol 2014, 4(2):860-863.","journal-title":"Int J Curr Eng Technol"},{"key":"1013_CR22","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/TCOMM.2012.031912.110179","volume":"9","author":"F Bao","year":"2012","unstructured":"Bao F, Chen R, Chang M, Cho JH: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. Network Serv Manage IEEE Trans 2012, 9: 169-183.","journal-title":"Network Serv Manage IEEE Trans"},{"key":"1013_CR23","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.1016\/j.jnca.2011.03.016","volume":"35","author":"J-H Cho","year":"2012","unstructured":"Cho J-H, Swami A, Chen I-R: Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. J. Netw. Comput. Appl. 2012, 35: 1001-1012. 10.1016\/j.jnca.2011.03.016","journal-title":"J. Netw. Comput. Appl"},{"key":"1013_CR24","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1109\/TNSM.2010.1009.I9P0339","volume":"7","author":"PB Velloso","year":"2010","unstructured":"Velloso PB, Laufer RP, Cunha D d O: Trust management in mobile ad hoc networks using a scalable maturity-based model. Network Serv Manage IEEE Trans 2010, 7: 172-185.","journal-title":"Network Serv Manage IEEE Trans"},{"issue":"4","key":"1013_CR25","first-page":"3","volume":"1","author":"GM Boopathi","year":"2013","unstructured":"Boopathi GM, Insozhan N, Vinod S: Selfish nodes detection using random 2ack in MANET's. IJESE 2013, 1(4):3-5.","journal-title":"IJESE"},{"key":"1013_CR26","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/TSMCC.2003.818500","volume":"34","author":"PP Demestichas","year":"2004","unstructured":"Demestichas PP, Stavroulaki V-AG, Papadopoulou L, Vasilakos AV, Theologou ME: Service configuration and traffic distribution in composite radio environments. IEEE Trans Syst Man Cybern B Cybern 2004, 34: 69-81. 10.1109\/TSMCC.2003.818500","journal-title":"IEEE Trans Syst Man Cybern B Cybern"},{"key":"1013_CR27","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/S1389-1286(00)00090-6","volume":"34","author":"AF Atlasis","year":"2000","unstructured":"Atlasis AF, Loukas NH, Vasilakos AV: The use of learning algorithms in ATM networks call admission control problem: a methodology. Comput. Netw. 2000, 34: 341-353. 10.1016\/S1389-1286(00)00090-6","journal-title":"Comput. Netw"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2014-205\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-205.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-205.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T21:44:04Z","timestamp":1548107044000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2014-205"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,29]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["1013"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2014-205","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,29]]},"assertion":[{"value":"10 July 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"205"}}