{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T13:38:36Z","timestamp":1762781916307},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,5,23]],"date-time":"2015-05-23T00:00:00Z","timestamp":1432339200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2015,5,23]],"date-time":"2015-05-23T00:00:00Z","timestamp":1432339200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2015,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Recent years have witnessed the increasing efforts toward making architecture standardization for the secured wireless mobile ad hoc networks. In this scenario when a node actively utilizes the other node resources for communicating and refuses to help other nodes in their transmission or reception of data, it is called a selfish node. As the entire mobile ad hoc network (MANETs) depends on cooperation from neighboring nodes, it is very important to detect and eliminate selfish nodes from being part of the network. In this paper, token-based umpiring technique (TBUT) is proposed, where every node needs a token to participate in the network and the neighboring nodes act as umpire. This proposed TBUT is found to be very efficient with a reduced detection time and less overhead. The security analysis and experimental results have shown that TBUT is feasible for enhancing the security and network performance of real applications.<\/jats:p>","DOI":"10.1186\/s13638-015-0370-x","type":"journal-article","created":{"date-parts":[[2015,5,22]],"date-time":"2015-05-22T14:13:28Z","timestamp":1432304008000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT"],"prefix":"10.1186","volume":"2015","author":[{"given":"Jebakumar Mohan Singh Pappaji","family":"Josh Kumar","sequence":"first","affiliation":[]},{"given":"Ayyaswamy","family":"Kathirvel","sequence":"additional","affiliation":[]},{"given":"Namaskaram","family":"Kirubakaran","sequence":"additional","affiliation":[]},{"given":"Perumal","family":"Sivaraman","sequence":"additional","affiliation":[]},{"given":"Muthusamy","family":"Subramaniam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,23]]},"reference":[{"issue":"1\/2","key":"370_CR1","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1504\/IJCNDS.2011.040983","volume":"7","author":"A Kathirvel","year":"2011","unstructured":"A Kathirvel, R Srinivasan, ETUS: enhanced triple umpiring system for security and robustness of wireless mobile ad hoc networks. International Journal of Communication Networks and Distributed Systems 7(1\/2), 153\u2013187 (2011)","journal-title":"International Journal of Communication Networks and Distributed Systems"},{"key":"370_CR2","unstructured":"Yu CW, Wu T-K, Cheng RH, Chang SC, \u201cA distributed and cooperative black hole node detection and elimination mechanism for ad hoc network\u201d, PAKDD workshops, Nanjing, China, 22\u201325, May 2007."},{"issue":"2","key":"370_CR3","first-page":"68","volume":"13","author":"N Kirubakaran","year":"2014","unstructured":"N Kirubakaran, A Kathirvel, Performance improvement of security attacks in wireless mobile adhoc networks. Asian Journal of Information Technology 13(2), 68\u201376 (2014)","journal-title":"Asian Journal of Information Technology"},{"issue":"4","key":"370_CR4","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1109\/JSAC.2009.090512","volume":"27","author":"X Naixue","year":"2009","unstructured":"X Naixue, AV Vasilakos, T Laurence, LS Yang, Y Pan, R Kannan, Y Li, Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems. IEEE Journal on Selected Areas in Communications 27(4), 495\u2013509 (2009)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"5","key":"370_CR5","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1002\/nem.761","volume":"21","author":"A Kathirvel","year":"2011","unstructured":"A Kathirvel, R Srinivasan, ETUS: an enhanced triple umpiring system for security and performance improvement of mobile ad hoc networks. International Journal of Network Management 21(5), 341\u2013359 (2011)","journal-title":"International Journal of Network Management"},{"key":"370_CR6","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.comnet.2013.08.020","volume":"58","author":"H Yang","year":"2014","unstructured":"H Yang, Y Zhang, Y Zhou, F Xiaoming, H Liu, AV Vasilakos, Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks 58, 29\u201338 (2014)","journal-title":"Computer Networks"},{"issue":"1","key":"370_CR7","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/TSMCC.2003.818500","volume":"34","author":"P Demestichas","year":"2004","unstructured":"P Demestichas, VA Stavroulaki, L Magdalene, AV Vasilakos, M Theologou, Service configuration and traffic distribution in composite radio environments. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 34(1), 69\u201381 (2004)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews"},{"issue":"7","key":"370_CR8","doi-asserted-by":"publisher","first-page":"1358","DOI":"10.1109\/JSAC.2011.110803","volume":"29","author":"L Zhou","year":"2011","unstructured":"L Zhou, H-C Chao, AV Vasilakos, Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE Journal on Selected Areas in Communications 29(7), 1358\u20131367 (2011)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"370_CR9","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z Yan","year":"2014","unstructured":"Z Yan, P Zhang, AV Vasilakos, A survey on trust management for Internet of Things. Journal Network and Computer Applications 42, 120\u2013134 (2014)","journal-title":"Journal Network and Computer Applications"},{"key":"370_CR10","doi-asserted-by":"crossref","unstructured":"Peng Li, Song Guo, Shui Yu and Vasilakos A.V, \u201cCodePipe: an opportunistic feeding and routing protocol for reliable multicast with pipelined network coding\u201d, in the Proceedings IEEE INFOCOM, pp.100\u2013108, 2012.","DOI":"10.1109\/INFCOM.2012.6195456"},{"issue":"11\u201312","key":"370_CR11","doi-asserted-by":"publisher","first-page":"2238","DOI":"10.1016\/j.mcm.2010.10.008","volume":"53","author":"Y-S Yen","year":"2011","unstructured":"Y-S Yen, H-C Chao, R-S Chang, A Vasilakos, Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling 53(11\u201312), 2238\u20132250 (2011)","journal-title":"Mathematical and Computer Modelling"},{"key":"370_CR12","unstructured":"Athanasios V. Vasilakos, Yan Zhang, Thrasyvoulos Spyropoulos, Delay tolerant networks: protocols and applications, CRC Press, 2011."},{"key":"370_CR13","doi-asserted-by":"crossref","unstructured":"Wei Quan, Changqiao Xu, Vasilakos A.V, and Jianfeng Guan, \u201cTB2F: Tree-bitmap and bloom-filter for a scalable and efficient name lookup in content-centric networking\u201d, IFIP Networking, pp.1\u20139, 2014.","DOI":"10.1109\/IFIPNetworking.2014.6857122"},{"issue":"1","key":"370_CR14","doi-asserted-by":"publisher","first-page":"129","DOI":"10.7763\/IJCTE.2010.V2.128","volume":"2","author":"A Kathirvel","year":"2010","unstructured":"A Kathirvel, R Srinivasan, Enhanced self umpiring system for security using salvaging route reply. International Journal of Computer Theory and Engineering 2(1), 129\u2013134 (2010)","journal-title":"International Journal of Computer Theory and Engineering"},{"issue":"9","key":"370_CR15","doi-asserted-by":"publisher","first-page":"1270","DOI":"10.1109\/TC.2011.145","volume":"61","author":"C Busch","year":"2012","unstructured":"C Busch, R Kannan, AV Vasilakos, Approximating congestion + dilation in networks via \"quality of routing\" games. IEEE Transactions on Computers 61(9), 1270\u20131283 (2012)","journal-title":"IEEE Transactions on Computers"},{"issue":"4","key":"370_CR16","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1109\/TITB.2012.2194788","volume":"16","author":"D He","year":"2012","unstructured":"D He, C Chen, S Chan, J Bu, AV Vasilakos, ReTrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine 16(4), 623\u2013632 (2012)","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"key":"370_CR17","unstructured":"Network Simulator. Scalable networks technologies: QualNet simulator version 5.0.2. http:\/\/web.scalable-networks.com\/"},{"key":"370_CR18","unstructured":"A Kathirvel, Introduction to GloMoSim (LAP Lambert Academic Publishing GmbH & Co. Germany, Europe, 2011)"},{"key":"370_CR19","first-page":"1","volume":"2015","author":"KC Suresh","year":"2015","unstructured":"KC Suresh, S Prakash, AE Priya, A Kathirvel, Primary path reservation using enhanced slot assignment in TDMA for session admission\u201d. The Scientific World Journal 2015, 1\u201311 (2015)","journal-title":"The Scientific World Journal"},{"issue":"3","key":"370_CR20","first-page":"1","volume":"3","author":"L Sudha Rani","year":"2012","unstructured":"L Sudha Rani, R Raja Sekhar, Detection and prevention of wormhole attack in stateless multicasting. International Journal of Scientific & Engineering Research 3(3), 1\u20135 (2012)","journal-title":"International Journal of Scientific & Engineering Research"},{"issue":"1","key":"370_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/1300000001","volume":"1","author":"L Georgiadia","year":"2006","unstructured":"L Georgiadia, MJ Neely, L Tassiulas, Resource allocation and cross-layer control in wireless networks. Foundations and Trends in Networking 1(1), 1\u2013444 (2006)","journal-title":"Foundations and Trends in Networking"},{"key":"370_CR22","first-page":"54","volume":"2","author":"PN Raj","year":"2009","unstructured":"PN Raj, PB Swadas, DPRAODV: a dynamic learning system against blackhole attack in AODV based MANET\u201d. International Journal of Computer Science 2, 54\u201359 (2009)","journal-title":"International Journal of Computer Science"},{"key":"370_CR23","unstructured":"Tsou P-C, Chang J-M, Lin Y-H, Chao H-C, Chen J-L, \u201cDeveloping a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs\u201d 13th International Conference on Advanced Communication Technology, Phoenix Park, Korea, 13\u201316, Feb. 2011."},{"issue":"7","key":"370_CR24","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/JSAC.2011.110808","volume":"29","author":"AL Soldo","year":"2011","unstructured":"AL Soldo, A Markopoulou, Blacklisting recommendation system: using spatio-temporal patterns to predict future attacks. IEEE Journals on Selected Areas in Communications 29(7), 1423\u20131437 (2011)","journal-title":"IEEE Journals on Selected Areas in Communications"},{"issue":"3","key":"370_CR25","doi-asserted-by":"publisher","first-page":"264","DOI":"10.4236\/wsn.2010.23036","volume":"2","author":"A Kathirvel","year":"2010","unstructured":"A Kathirvel, R Srinivasan, Self umpiring system for security in wireless mobile ad-hoc network. Journal of Wireless Sensor Network 2(3), 264\u2013266 (2010)","journal-title":"Journal of Wireless Sensor Network"},{"issue":"4","key":"370_CR26","first-page":"129","volume":"1","author":"A Kathirvel","year":"2010","unstructured":"A Kathirvel, R Srinivasan, A system of umpires for security of wireless mobile ad hoc network. International Arab Journal of e-Technology 1(4), 129\u2013134 (2010)","journal-title":"International Arab Journal of e-Technology"},{"issue":"2\/1","key":"370_CR27","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1007\/s11277-013-1346-y","volume":"74","author":"E Hernandez orallo","year":"2014","unstructured":"E Hernandez orallo, JC Cano, C Calafate, P Manzoni, A fast model for evaluating the detection of selfish nodes using a collaborative approach in MANETs. Wireless Personal Communication 74(2\/1), 1099\u20131116 (2014)","journal-title":"Wireless Personal Communication"},{"issue":"6","key":"370_CR28","first-page":"1","volume":"4","author":"R Singh","year":"2014","unstructured":"R Singh, P Singh, M Duhan, An effective implementation of security based algorithmic approach in mobile adhoc network. Human centric Computer Information Science 4(6), 1\u201314 (2014)","journal-title":"Human centric Computer Information Science"},{"issue":"3","key":"370_CR29","first-page":"272","volume":"1","author":"G Jyoshna","year":"2012","unstructured":"G Jyoshna, K Yoga Prasad, Removal of byzantine attacks in ad hoc networks. International Journal of Advanced Research in Computer Engineering & Technology 1(3), 272\u2013276 (2012)","journal-title":"International Journal of Advanced Research in Computer Engineering & Technology"},{"issue":"10","key":"370_CR30","doi-asserted-by":"publisher","first-page":"21","DOI":"10.5120\/3337-4592","volume":"27","author":"M Arya","year":"2011","unstructured":"M Arya, YK Jain, Grayhole attack and prevention in mobile adhoc network. International Journal of Computer Applications 27(10), 21\u201326 (2011)","journal-title":"International Journal of Computer Applications"},{"issue":"1 & 2","key":"370_CR31","first-page":"67","volume":"2","author":"A Kathirvel","year":"2010","unstructured":"A Kathirvel, R Srinivasan, Double umpiring system for security in mobile ad hoc networks. International Journal of Wireless Networks and Communications 2(1 & 2), 67\u201378 (2010)","journal-title":"International Journal of Wireless Networks and Communications"},{"issue":"2","key":"370_CR32","first-page":"77","volume":"2","author":"A Kathirvel","year":"2010","unstructured":"A Kathirvel, R Srinivasan, Enhanced triple umpiring system for security and performance improvement in wireless MANETS. International Journal of Communication Networks and Information Security 2(2), 77\u201384 (2010)","journal-title":"International Journal of Communication Networks and Information Security"},{"issue":"2","key":"370_CR33","first-page":"196","volume":"2","author":"A Kathirvel","year":"2010","unstructured":"A Kathirvel, R Srinivasan, Self_USS: a self umpiring system for security in mobile ad-hoc network. International Journal of Engineering and Technology 2(2), 196\u2013203 (2010)","journal-title":"International Journal of Engineering and Technology"},{"issue":"2","key":"370_CR34","doi-asserted-by":"publisher","first-page":"151","DOI":"10.7763\/IJET.2009.V1.28","volume":"1","author":"A Kathirvel","year":"2009","unstructured":"A Kathirvel, R Srinivasan, A study on salvaging route reply for AODV protocol in the presence of malicious nodes. International Journal of Engineering and Technology 1(2), 151\u2013155 (2009)","journal-title":"International Journal of Engineering and Technology"},{"issue":"1","key":"370_CR35","first-page":"15","volume":"2","author":"BB Jayasingh","year":"2010","unstructured":"BB Jayasingh, B Swathi, A novel metric for detection of jellyfish reorder attack on ad hoc network. BVICAM\u2019s International Journal of Information Technology 2(1), 15\u201320 (2010)","journal-title":"BVICAM\u2019s International Journal of Information Technology"},{"key":"370_CR36","unstructured":"Timothy X Brown, Jesse E. James and Amita Sethi, \u201cJamming and sensing of encrypted wireless ad hoc networks\u201d, University of Colorado at Boulder, Technical Report CU-CS-1005-06, pp. 1\u201313, 2010."},{"issue":"1","key":"370_CR37","first-page":"88","volume":"1","author":"A Kurkure","year":"2013","unstructured":"A Kurkure, B Chaudhari, Selfish node detection techniques in MANET: a review. International Journal of Comput Science and Management Research. 1(1), 88\u201394 (2013)","journal-title":"International Journal of Comput Science and Management Research."},{"issue":"1","key":"370_CR38","first-page":"24","volume":"1","author":"L Sahu","year":"2013","unstructured":"L Sahu, C Sinha, A cooperative approach for understanding behavior of intrusion detection system in mobile ad hoc networks. International Journal of Comput Science 1(1), 24\u201330 (2013)","journal-title":"International Journal of Comput Science"},{"issue":"2","key":"370_CR39","first-page":"860","volume":"4","author":"DG Patel","year":"2014","unstructured":"DG Patel, PA Pandey, MC Patel, Trust based routing in ad-hoc networks. International Journal of Current Engineering Technology 4(2), 860\u2013863 (2014)","journal-title":"International Journal of Current Engineering Technology"},{"issue":"1","key":"370_CR40","first-page":"1","volume":"1","author":"A Kathirvel","year":"2009","unstructured":"A Kathirvel, R Srinivasan, \u201cPerformance analysis of propagation model using wireless mobile ad hoc network routing protocols\u201d. International Journal of Wireless Communication 1(1), 1\u20138 (2009)","journal-title":"International Journal of Wireless Communication"},{"issue":"1","key":"370_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1364\/JOCN.1.000001","volume":"1","author":"A Kathirvel","year":"2009","unstructured":"A Kathirvel, R Srinivasan, \u201cA system of umpires for security of MANET\u201d. International Journal of Networking and Communication Engineering 1(1), 1\u20135 (2009)","journal-title":"International Journal of Networking and Communication Engineering"},{"issue":"2","key":"370_CR42","first-page":"141","volume":"2","author":"A Kathirvel","year":"2009","unstructured":"A Kathirvel, R Srinivasan, Single umpiring system for security of mobile ad hoc networks. Journal of Advances in Wireless and Mobile Communications 2(2), 141\u2013152 (2009)","journal-title":"Journal of Advances in Wireless and Mobile Communications"},{"issue":"2","key":"370_CR43","first-page":"95","volume":"1","author":"A Kathirvel","year":"2009","unstructured":"A Kathirvel, R Srinivasan, Triple umpiring system for security of mobile ad hoc networks. International Journal of Engineering and Information technology 1(2), 95\u2013100 (2009)","journal-title":"International Journal of Engineering and Information technology"},{"issue":"1","key":"370_CR44","first-page":"1","volume":"1","author":"A Kathirvel","year":"2009","unstructured":"A Kathirvel, R Srinivasan, \u201cGlobal mobile information system simulator in Fedora Linux\u201d. ACM Computer Communication Review 1(1), 1\u201310 (2009)","journal-title":"ACM Computer Communication Review"},{"key":"370_CR45","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s11235-013-9753-7","volume":"55","author":"I Jawhar","year":"2014","unstructured":"I Jawhar, Z Trabelsi, J Al-Jaroodi, Towards more reliable and secure source routing in mobile ad hoc and sensor networks. Telecommunication System 55, 81\u201391 (2014)","journal-title":"Telecommunication System"},{"issue":"12","key":"370_CR46","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1109\/JPROC.2011.2165330","volume":"99","author":"Z Shen","year":"2011","unstructured":"Z Shen, J Luo, R Zimmermann, AV Vasilakos, Peer-to-peer media streaming: insights and new developments. Proceedings of the IEEE 99(12), 2089\u20132109 (2011)","journal-title":"Proceedings of the IEEE"},{"issue":"3","key":"370_CR47","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.comcom.2010.01.021","volume":"34","author":"Y Wang","year":"2011","unstructured":"Y Wang, A Nakaob, AV Vasilakosd, J Mae, P2P soft security: on evolutionary dynamics of P2P incentive mechanism. Computer Communications 34(3), 241\u2013249 (2011)","journal-title":"Computer Communications"},{"issue":"3","key":"370_CR48","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1109\/TIFS.2013.2296437","volume":"9","author":"B Liu","year":"2014","unstructured":"B Liu, J Bi, AV Vasilakos, Toward incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security 9(3), 436\u2013450 (2014)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"370_CR49","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"J Qi","year":"2014","unstructured":"J Qi, AV Vasilakos, W Jiafu, L Jingwei, D Qiu, Security of the Internet of Things: perspectives and challenges. Wireless Networks 20, 2481\u20132501 (2014)","journal-title":"Wireless Networks"},{"issue":"1","key":"370_CR50","first-page":"05","volume":"3","author":"M Kiranmayi","year":"2015","unstructured":"M Kiranmayi, A Kathirvel, Underwater wireless sensor networks: applications, challenges and design issues of the network layer - a review\u201d. International Journal of Emerging Trends in Engineering Research 3(1), 05\u201311 (2015)","journal-title":"International Journal of Emerging Trends in Engineering Research"},{"key":"370_CR51","first-page":"11","volume":"2015","author":"D Mohanageetha","year":"2015","unstructured":"D Mohanageetha, SK Muthusundar, M Subramaniam, A Kathirvel, Temporary redundant transmission mechanism for SCTP multihomed hosts. The Scientific World Journal 2015, 11\u201321 (2015)","journal-title":"The Scientific World Journal"},{"issue":"12","key":"370_CR52","doi-asserted-by":"publisher","first-page":"1854","DOI":"10.3844\/jcssp.2011.1854.1858","volume":"7","author":"C Rajabhushanam","year":"2011","unstructured":"C Rajabhushanam, A Kathirvel, System of one to three umpire security system for wireless mobile ad hoc network. Journal of Computer Science 7(12), 1854\u20131858 (2011)","journal-title":"Journal of Computer Science"},{"issue":"1","key":"370_CR53","first-page":"14","volume":"62","author":"A Kathirvel","year":"2011","unstructured":"A Kathirvel, M Subramaniam, C Rajabushanam, Burglar detecting system for wireless mobile ad hoc network. European Journal of Scientific Research 62(1), 14\u201323 (2011)","journal-title":"European Journal of Scientific Research"},{"issue":"1","key":"370_CR54","first-page":"7","volume":"1","author":"A Kathirvel","year":"2010","unstructured":"A Kathirvel, R Srinivasan, Analysis of propagation model using mobile ad hoc network routing protocols. International Journal of Research and Reviews in Computer Science 1(1), 7\u201314 (2010)","journal-title":"International Journal of Research and Reviews in Computer Science"},{"issue":"4","key":"370_CR55","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1109\/TNET.2009.2039492","volume":"18","author":"ZM Fadlullah","year":"2010","unstructured":"ZM Fadlullah, T Taleb, AV Vasilakos, M Guizani, N Kato, DTRAB: combating against attacks on encrypted protocols through traffic-feature analysis. IEEE\/ACM Transactions on Networking 18(4), 1237\u20131247 (2010)","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"6","key":"370_CR56","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MWC.2013.6704479","volume":"20","author":"Z Sheng","year":"2013","unstructured":"Z Sheng, S Yang, Y Yu, AV Vasilakos, JA Mccann, KK Leung, A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities. IEEE Wireless Communications 20(6), 91\u201398 (2013)","journal-title":"IEEE Wireless Communications"},{"issue":"5","key":"370_CR57","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1016\/j.adhoc.2011.02.004","volume":"10","author":"H Cheng","year":"2012","unstructured":"H Cheng, N Xiong, AV Vasilakos, LT Yang, G Chen, X Zhuang, Nodes organization for channel assignment with topology preservation in multi-radio wireless mesh networks. Ad Hoc Networks 10(5), 760\u2013773 (2012)","journal-title":"Ad Hoc Networks"},{"issue":"12","key":"370_CR58","doi-asserted-by":"publisher","first-page":"3172","DOI":"10.1109\/JPROC.2012.2208211","volume":"100","author":"A Attar","year":"2012","unstructured":"A Attar, H Tang, AV Vasilakos, Y Richard, A survey of security challenges in cognitive radio networks: solutions and future research directions. Proceedings of the IEEE 100(12), 3172\u20133186 (2012)","journal-title":"Proceedings of the IEEE"},{"issue":"2","key":"370_CR59","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s11276-012-0457-9","volume":"19","author":"Y Zeng","year":"2013","unstructured":"Y Zeng, K Xiang, D Li, AV Vasilakos, Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks 19(2), 161\u2013173 (2013)","journal-title":"Wireless Networks"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0370-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-015-0370-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0370-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0370-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T13:23:37Z","timestamp":1630589017000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-015-0370-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,23]]},"references-count":59,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["370"],"URL":"https:\/\/doi.org\/10.1186\/s13638-015-0370-x","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,23]]},"assertion":[{"value":"29 January 2015","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2015","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2015","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"143"}}