{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T23:04:16Z","timestamp":1767913456890,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,6,7]],"date-time":"2015-06-07T00:00:00Z","timestamp":1433635200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/s13638-015-0384-4","type":"journal-article","created":{"date-parts":[[2015,6,6]],"date-time":"2015-06-06T03:29:51Z","timestamp":1433561391000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A futuristic trust coefficient-based semi-Markov prediction model for mitigating selfish nodes in MANETs"],"prefix":"10.1186","volume":"2015","author":[{"given":"Janakiraman","family":"Sengathir","sequence":"first","affiliation":[]},{"given":"Rajendiran","family":"Manoharan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,7]]},"reference":[{"issue":"3","key":"384_CR1","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1109\/TDSC.2008.71","volume":"7","author":"F Xing","year":"2010","unstructured":"F Xing, W Wang, On the survivability of wireless ad hoc networks with node misbehaviors and failures. IEEE Transactions On Dependable And Secure Computing 7(3), 284\u2013299 (2010)","journal-title":"IEEE Transactions On Dependable And Secure Computing"},{"issue":"3","key":"384_CR2","first-page":"25","volume":"1","author":"A Md","year":"2008","unstructured":"A Md, AK Akhtar, G Sahoo, Mathematical model for the detection of selfish nodes in MANETs. International Journal of Computer science and Informatics 1(3), 25\u201328 (2008)","journal-title":"International Journal of Computer science and Informatics"},{"key":"384_CR3","volume-title":"Nodes bearing Grudges: Towards routing security, Fairness and Robustness in Mobile Ad-Hoc Network (presented at tenth Eurominicro workshop on Parallel, Distributed and Network based Processing","author":"S Buchegger","year":"2002","unstructured":"S Buchegger, J-Y Boudec, Nodes bearing Grudges: Towards routing security, Fairness and Robustness in Mobile Ad-Hoc Network (presented at tenth Eurominicro workshop on Parallel, Distributed and Network based Processing (Canary Islands, Spain, 2002)"},{"issue":"1","key":"384_CR4","first-page":"255","volume":"1","author":"S Marti","year":"2000","unstructured":"S Marti, TJ Giuli, K Lai, M Baker, Mitigating routing misbehavior in mobile ad hoc networks. Mobile Computing and Networking 1(1), 255\u2013265 (2000)","journal-title":"Mobile Computing and Networking"},{"issue":"1\u20132","key":"384_CR5","first-page":"51","volume":"34","author":"SK Hwang","year":"2006","unstructured":"SK Hwang, DS Kim et al., Markov model of link connectivity in mobile ad hoc networks. Telecommunication Systems 34(1\u20132), 51\u201358 (2006)","journal-title":"Telecommunication Systems"},{"issue":"3","key":"384_CR6","first-page":"125","volume":"57","author":"L Guang","year":"2008","unstructured":"L Guang, M Chadi, A Benslimane, Enhancing IEEE 802.11 random backoff in selfish environments. IEEE Transactions On Vehicular Technology 57(3), 125\u2013132 (2008)","journal-title":"IEEE Transactions On Vehicular Technology"},{"issue":"1","key":"384_CR7","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1023\/B:MCAP.0000017715.28371.85","volume":"6","author":"G Corradi","year":"2004","unstructured":"G Corradi, J Janssen, R Manca, Numerical treatment of homogenous semi-Markov processes in transient case\u2014a straightforward approach. Methodology and Computing in Applied Probability 6(1), 233\u2013246 (2004)","journal-title":"Methodology and Computing in Applied Probability"},{"issue":"2","key":"384_CR8","doi-asserted-by":"publisher","first-page":"147","DOI":"10.5121\/ijnsa.2010.2212","volume":"2","author":"T Sundarajan","year":"2010","unstructured":"T Sundarajan, A Shanmugam, Modeling the behavior of selfish forwarding nodes to simulate cooperation in MANET. International Journal of Network Security and Its Application 2(2), 147\u2013160 (2010)","journal-title":"International Journal of Network Security and Its Application"},{"issue":"3\/4","key":"384_CR9","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1504\/IJICT.2014.063223","volume":"6","author":"J Sengathir","year":"2014","unstructured":"J Sengathir, R Manoharan, A reliability factor based mathematical model for isolating selfishness in MANETs\u2019. International Journal of Information and Communication Technology 6(3\/4), 403\u2013421 (2014)","journal-title":"International Journal of Information and Communication Technology"},{"key":"384_CR10","unstructured":"J Sengathir, R Manoharan, Selfish conscious mathematical model based on reliable conditional survivability coefficient in MANET routing, in 3rd Third International Conference on Advances in Information Technology and Mobile Communication (AIM 2013). Bangalore, India, April, Proceeding published by Elsevier 1(1), 31\u201340 (2013)"},{"key":"384_CR11","doi-asserted-by":"crossref","unstructured":"F Xing, W Wang, Modeling and analysis of connectivity in mobile ad hoc networks with misbehaving nodes (Paper presented at the IEEE international conference on communications, IEEE, Istanbul, June, 2006)","DOI":"10.1109\/ICC.2006.254994"},{"key":"384_CR12","doi-asserted-by":"crossref","unstructured":"A Alvaro, Cardenas, R Svetlana, S John Baras, Evaluation of detection algorithms for MAC layer misbehavior. Theory and Experiments. IEEE Transactions on Networking 17(2), 605\u2013617 (2009)","DOI":"10.1109\/TNET.2008.926510"},{"key":"384_CR13","unstructured":"Rohith Dwarakanath Vallam, Antony Franklin A, Siva RamMurthy C, Modelling co-operative MAC layer misbehaviour in IEEE 802.11 ad hoc networks with heterogeneous loads. Paper presented at the 6th international symposium on modeling and optimization in mobile, ad hoc, and wireless networks and workshops, IEEE, WIOPT Berlin, Germany, 1\u20133 April 2008."},{"issue":"5","key":"384_CR14","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1109\/LCOMM.2012.030912.112482","volume":"16","author":"E Hernandez-Orallo","year":"2012","unstructured":"E Hernandez-Orallo, MD Serraty, J-C Cano, T Calafate, P Manzoni, Improving selfish node detection in MANETs using a collaborative watchdog. IEEE Letters 16(5), 642\u2013645 (2012)","journal-title":"IEEE Letters"},{"key":"384_CR15","volume-title":"Modeling, Design, and Analysis on the Resilience of Large-scale Wireless Multi-Hop Networks","author":"X Fie","year":"2009","unstructured":"X Fie, Modeling, Design, and Analysis on the Resilience of Large-scale Wireless Multi-Hop Networks (North Carolina State University, Raleigh (North Carolina, USA, Department Of Engineering, 2009)"},{"issue":"3","key":"384_CR16","doi-asserted-by":"publisher","first-page":"1806","DOI":"10.1109\/TVT.2007.909291","volume":"57","author":"L Guang","year":"2008","unstructured":"L Guang, M Chadi, A Benslimane, Enhancing IEEE 802.11 random backoff in selfish environments. IEEE Transactions on Vehicular Technology 57(3), 1806\u20131822 (2008)","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"7","key":"384_CR17","first-page":"77","volume":"7","author":"K Komathy","year":"2007","unstructured":"K Komathy, P Narayanasamy, A probabilistic behavioral model for selfish neighbors in a wireless ad hoc network. International Journal of Computer Science and Network Security 7(7), 77\u201382 (2007)","journal-title":"International Journal of Computer Science and Network Security"},{"issue":"1","key":"384_CR18","first-page":"25","volume":"9","author":"AH Azni","year":"2013","unstructured":"AH Azni, A Rabiah, N Zul, M Azri, B Abd SamadHasan, H Burairah, Correlated node behavior model based on semi Markov process for MANETS. International Journal of Computer Science 9(1), 25\u201332 (2013)","journal-title":"International Journal of Computer Science"},{"issue":"1","key":"384_CR19","doi-asserted-by":"crossref","first-page":"22","DOI":"10.20533\/ijcc.2046.3359.2013.0003","volume":"1","author":"AH Azni","year":"2013","unstructured":"AH Azni, A Rabiah, N Zul, M Azri, B Abd SamadHasan, H Burairah, Epidermic modelling for correlated node behavior in ad hoc networks. International Journal of Chaotic Computing 1(1), 22\u201330 (2013)","journal-title":"International Journal of Chaotic Computing"},{"issue":"1","key":"384_CR20","first-page":"215","volume":"8","author":"AP Patil","year":"2013","unstructured":"AP Patil, KDK Rajani, S Bathey, MP Dinesh Kumar, J Malavika, Design of energy efficient routing protocol for MANETs based on AODV. IJCSI 8(1), 215\u2013220 (2013)","journal-title":"IJCSI"},{"key":"384_CR21","unstructured":"Srinivasan V, Nuggehali, Chiasserini, C.F., Rao, R.R., (2003). Stimulating Cooperation in Wireless ad hoc networks. Presented at 22nd Annual Joint Conference of the IEEE Computer and Communication Societies (INFOCOM\u201903), 2003"},{"issue":"1","key":"384_CR22","first-page":"299","volume":"1","author":"N Sadagopan","year":"2003","unstructured":"N Sadagopan, F Bai, B Krihnamachari, A Helmy, PATHS: analysis of PATH duration statistics and their impact on reactive MANET routing protocols. In prod. ACM MobiHoc 1(1), 299\u2013307 (2003)","journal-title":"In prod. ACM MobiHoc"},{"key":"384_CR23","doi-asserted-by":"crossref","unstructured":"K Paul, RR Choudhuri, Bandyopadhyay, Survivability analysis of ad hoc wireless network architecture. In prod IFIP-TC6\/ European Commission, International Workshop Mobile and Wireless Communication Networks 1(1), 31\u201346 (2000)","DOI":"10.1007\/3-540-45494-2_3"},{"issue":"1","key":"384_CR24","first-page":"1","volume":"1","author":"P Manohar","year":"2010","unstructured":"P Manohar, M Vereshechaka, D Manjanth, Survivability, analysis under non-uniform stochastically dependent node damages. National Conference on Communications 1(1), 1\u20135 (2010)","journal-title":"National Conference on Communications"},{"issue":"11","key":"384_CR25","first-page":"1","volume":"56","author":"Y Xu","year":"2010","unstructured":"Y Xu, W Wang, Characterizing the spread of correlated failures in larger wireless networks. In proc. IEEE INFOCOM 56(11), 1\u20139 (2010)","journal-title":"In proc. IEEE INFOCOM"},{"issue":"6","key":"384_CR26","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1109\/TITB.2012.2206115","volume":"16","author":"Z Zhang","year":"2012","unstructured":"Z Zhang et al., ECG-cryptography and authentication in body area networks. IEEE Transactions on Information Technology in Biomedicine 16(6), 1070\u20131078 (2012)","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"issue":"12","key":"384_CR27","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1109\/JPROC.2011.2165330","volume":"99","author":"Z Shen","year":"2011","unstructured":"Z Shen et al., Peer-to-peer media streaming: insights and new developments. Proceedings of the IEEE 99(12), 2089\u20132109 (2011)","journal-title":"Proceedings of the IEEE"},{"issue":"12","key":"384_CR28","doi-asserted-by":"publisher","first-page":"3172","DOI":"10.1109\/JPROC.2012.2208211","volume":"100","author":"A Attar","year":"2012","unstructured":"A Attar et al., A survey of security challenges in cognitive radio networks: solutions and future research directions. Proceedings of the IEEE 100(12), 3172\u20133186 (2012)","journal-title":"Proceedings of the IEEE"},{"key":"384_CR29","doi-asserted-by":"crossref","unstructured":"Z Wan et al., Adaptive unequal protection for wireless video transmission over IEEE 802.11e networks. Multimedia Tools and Applications 1(1), 345\u2013352 (2013)","DOI":"10.1007\/s11042-013-1378-z"},{"issue":"4","key":"384_CR30","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1109\/TITB.2012.2194788","volume":"16","author":"D He","year":"2012","unstructured":"D He et al., Retrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine 16(4), 623\u2013632 (2012)","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"issue":"4","key":"384_CR31","first-page":"123","volume":"20","author":"J Zhou","year":"2013","unstructured":"J Zhou et al., Securing m-healthcare social networks: challenges, countermeasures and future directions. IEEE Wireless Communications 20(4), 123\u2013134 (2013)","journal-title":"IEEE Wireless Communications"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-015-0384-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0384-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0384-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0384-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T08:28:44Z","timestamp":1566808124000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-015-0384-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,7]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["384"],"URL":"https:\/\/doi.org\/10.1186\/s13638-015-0384-4","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,7]]},"assertion":[{"value":"2 March 2015","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2015","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2015","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"158"}}