{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T11:31:45Z","timestamp":1773055905080,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T00:00:00Z","timestamp":1611273600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T00:00:00Z","timestamp":1611273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Mobile ad hoc network (MANET) is an infrastructure-less, self-motivated, arbitrary, self-configuring, rapidly changing, multi-hop network that is self-possessing wireless bandwidth-conscious links without centrally managed router support. In such a network, wireless media is easy to snoop. It is firm to the surety to access any node, easier to insertion of bad elements or attackers for malicious activities in the network. Therefore, security issues become one of the significant considerations for such kind of networks. The deployment of an effective intrusion detection system is important in order to provide protection against various attacks. In this paper, a Digitally Signed Secure Acknowledgement Method (DSSAM) with the use of the RSA digital signature has been proposed and simulated. Three different parameters are considered, namely secure acknowledgment, node authentication, and packet authentication for study. This article observes the DSSAM performance and compares it with two existing standard methods, namely Watchdog and 2-ACK under standard Dynamic Source Routing (DSR) routing environment. In the end, it is noticed that the rate of detection of malicious behaviour is better in the case of the proposed method. However, associated overheads are high. A trade-off between performance and overhead has been considered.<\/jats:p>","DOI":"10.1186\/s13638-021-01894-7","type":"journal-article","created":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T02:03:21Z","timestamp":1611281001000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["DSSAM: digitally signed secure acknowledgement method for mobile ad hoc network"],"prefix":"10.1186","volume":"2021","author":[{"given":"Ashutosh","family":"Srivastava","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8270-5853","authenticated-orcid":false,"given":"Sachin Kumar","family":"Gupta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohd","family":"Najim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nitesh","family":"Sahu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Geetika","family":"Aggarwal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bireshwar Dass","family":"Mazumdar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,1,22]]},"reference":[{"key":"1894_CR1","unstructured":"Internet Engineering Task Force, MANET Working Group Charter, Available from: IETF MANET Group Character Sector (2013). https:\/\/tools.ietf.org\/html\/draft-ietf-manet-term [Last Access: 13 January 2020]."},{"key":"1894_CR2","doi-asserted-by":"publisher","unstructured":"B. Wu, J. Chen, J. Wu, M. Cardei, A survey of attacks and countermeasures in MANET, in Wireless Network Security, Signals and Communication Technology, Springer, Boston, MA, 103\u2013135 (2007). https:\/\/doi.org\/10.1007\/978-0-387-33112-6_5","DOI":"10.1007\/978-0-387-33112-6_5"},{"key":"1894_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1002\/spy2.5","volume":"1","author":"S Tanwar","year":"2018","unstructured":"S. Tanwar, J. Vora, S. Tyagi, N. Kumar, M.S. Obaidat, A systematic review on security issues in vehicular ad hoc network. Secur Privacy 1, 5 (2018)","journal-title":"Secur Privacy"},{"key":"1894_CR4","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/978-981-10-6005-2_49","volume":"2018","author":"J Singh","year":"2018","unstructured":"J. Singh, K. Singh, Congestion control in vehicular ad hoc network: a review. Next-Gener Netw 2018, 489\u2013496 (2018)","journal-title":"Next-Gener Netw"},{"key":"1894_CR5","doi-asserted-by":"publisher","first-page":"102242","DOI":"10.1016\/j.adhoc.2020.102242","volume":"106","author":"K Kumar","year":"2020","unstructured":"K. Kumar, S. Kumar, O. Kaiwartya, P.K. Kashyap, J. Lloret, H. Song, Drone assisted flying ad-hoc networks: mobility and service-oriented modeling using neuro-fuzzy. Ad Hoc Netw. 106, 102242 (2020)","journal-title":"Ad Hoc Netw."},{"key":"1894_CR6","unstructured":"H. Miranda, L. Rodrigues, Preventing selfishness in open mobile ad-hoc networks, in IEEE Proceeding Seventh CaberNet Radicals Workshop, 1\u20136 (October 2002)."},{"key":"1894_CR7","doi-asserted-by":"crossref","unstructured":"M. Faisal, S. Abbasa, and H. U. Rahman, \"Identity attack detection system for 802.11-based ad hoc networks\", EURASIP Journal on Wireless Communications and Networking, 128, (2018).","DOI":"10.1186\/s13638-018-1143-0"},{"key":"1894_CR8","doi-asserted-by":"crossref","unstructured":"L. M. Feeney, M. Nilsson, Investigating the energy consumption of a wireless network interface in an ad-hoc networking environment, in IEEE INFOCOM, Conference on Computer Communications, Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213), Anchorage, AK, USA, 1548\u20131557 (2001).","DOI":"10.1109\/INFCOM.2001.916651"},{"key":"1894_CR9","unstructured":"A. U Makarfi, K. M Rabie, O. Kaiwartya, X. Li, R. Kharel, Physical layer security in vehicular networks with reconfigurable intelligent surfaces (2019). arXiv preprint arXiv:1912.12183."},{"key":"1894_CR10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815102","volume-title":"Security and Cooperation in Wireless Networks. A Graduate Text Book","author":"L Buttyan","year":"2007","unstructured":"L. Buttyan, J.P. Hubaux, Security and Cooperation in Wireless Networks. A Graduate Text Book (. Cambridge University Press, Cambridge, 2007)."},{"key":"1894_CR11","doi-asserted-by":"publisher","unstructured":"S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad-hoc networks, in 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, USA, 255\u2013265 (August 2000). https:\/\/doi.org\/10.1145\/345910.345955.","DOI":"10.1145\/345910.345955"},{"key":"1894_CR12","doi-asserted-by":"publisher","first-page":"774","DOI":"10.1016\/j.compeleceng.2017.12.015","volume":"72","author":"KN Qureshi","year":"2018","unstructured":"K.N. Qureshi, A.H. Abdullah, O. Kaiwartya, S. Iqbal, R.A. Butt, F. Bashir, A Dynamic congestion control scheme for safety applications in vehicular ad hoc networks. Comput. Electr. Eng. 72, 774\u2013788 (2018)","journal-title":"Comput. Electr. Eng."},{"key":"1894_CR13","doi-asserted-by":"publisher","unstructured":"L. Buttyan, J. P. Hubaux, Enforcing service availability in mobile ad-hoc WANs, IEEE First Annual Workshop on Mobile and Ad-hoc Networking and Computing (Cat. No.00EX444), Boston, MA, USA, USA, 87\u201396 (August 2000). https:\/\/doi.org\/10.1109\/MOBHOC.2000.869216.","DOI":"10.1109\/MOBHOC.2000.869216"},{"issue":"1","key":"1894_CR14","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/35.894385","volume":"39","author":"JP Hubaux","year":"2001","unstructured":"J.P. Hubaux, T. Gross, J.Y. LeBoudec, M. Vetterli, Toward self-organized mobile ad-hoc networks: the terminodes project. IEEE Commun. Mag. 39(1), 118\u2013124 (2001). https:\/\/doi.org\/10.1109\/35.894385","journal-title":"IEEE Commun. Mag."},{"issue":"12","key":"1894_CR15","doi-asserted-by":"publisher","first-page":"22342","DOI":"10.3390\/s141222342","volume":"14","author":"O Kaiwartya","year":"2014","unstructured":"O. Kaiwartya, S. Kumar, D.K. Lobiyal, A.H. Abdullah, A.N. Hassan, Performance improvement in geographic routing for vehicular ad hoc networks. Sens. MDPI AG, Basel, Switzerland 14(12), 22342\u201322371 (2014). https:\/\/doi.org\/10.3390\/s141222342","journal-title":"Sens. MDPI AG, Basel, Switzerland"},{"key":"1894_CR16","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1186\/s13638-018-1337-5","volume":"2019","author":"M Alotaibi","year":"2019","unstructured":"M. Alotaibi, Security to wireless sensor networks against malicious attacks using Hamming residue method. EURASIP J. Wirel. Commun. Network. 2019, 8 (2019)","journal-title":"EURASIP J. Wirel. Commun. Network."},{"key":"1894_CR17","doi-asserted-by":"publisher","unstructured":"S. Buchegger, J. Y. Le Boudec, Performance analysis of the CONFIDANT protocol: cooperation of nodes, fairness in dynamic ad-hoc networks, in 3rd ACM International Symposium on Mobile Ad-hoc Networking and Computing, Switzerland, 226\u2013236, June 2002. https:\/\/doi.org\/10.1145\/513800.513828","DOI":"10.1145\/513800.513828"},{"key":"1894_CR18","first-page":"1","volume-title":"\u201cSprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad Hoc Networks\u201d, IEEE INFOCOM","author":"S Zhong","year":"2003","unstructured":"S. Zhong, J. Chen, Y.R. Yang, Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad Hoc Networks, IEEE INFOCOM IEEE INFOCOM (San Francisco, USA, 2003), pp. 1\u201311"},{"issue":"4","key":"1894_CR19","doi-asserted-by":"publisher","first-page":"2657","DOI":"10.1007\/s11277-015-2562-4","volume":"83","author":"O Kaiwartya","year":"2015","unstructured":"O. Kaiwartya, S. Kumar, Guaranteed geocast routing protocol for vehicular adhoc networks in highway traffic environment. Wireless Pers. Commun. 83(4), 2657\u20132682 (2015)","journal-title":"Wireless Pers. Commun."},{"key":"1894_CR20","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-540-45126-6_2","volume":"2742","author":"M Jakobsson","year":"2003","unstructured":"M. Jakobsson, J.P. Hubaux, L. Buttyan, A micropayment scheme encouraging collaboration in multi-hop cellular networks. Financial Cryptography, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg 2742, 15\u201333 (January 2003). https:\/\/doi.org\/10.1007\/978-3-540-45126-6_2","journal-title":"Financial Cryptography, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg"},{"issue":"4","key":"1894_CR21","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1080\/09720529.2019.1642625","volume":"22","author":"B Chaudhary","year":"2019","unstructured":"B. Chaudhary, K. Singh, Pseudonym generation using genetic algorithm in vehicular ad hoc networks. J. Discrete Math. Sci. Cryptograp. 22(4), 661\u2013677 (2019)","journal-title":"J. Discrete Math. Sci. Cryptograp."},{"key":"1894_CR22","unstructured":"A. U Makarfi, K. M Rabie, O. Kaiwartya, K. Adhikari, X. Li, M. Quiroz-Castellanos, R. Kharel, Reconfigurable intelligent surfaces-enabled vehicular networks: a physical layer security perspective (2020). arXiv preprint arXiv:2004.11288"},{"issue":"5","key":"1894_CR23","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1109\/TMC.2007.1036","volume":"6","author":"K Liu","year":"2007","unstructured":"K. Liu, J. Deng, P.K. Varshney, K. Balakrishnan, An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mobile Comput. 6(5), 536\u2013550 (2007)","journal-title":"IEEE Trans. Mobile Comput."},{"key":"1894_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/GLOCOM.2006.264","volume-title":"\u201cTrust Aware Routing in Mobile Ad-hoc Networks\u201d, IEEE GLOBECOM, Communications Society, San Francisco","author":"L Abusalah","year":"2006","unstructured":"L. Abusalah, A. Khokhar, M. Guizani, Trust Aware Routing in Mobile Ad-Hoc Networks, IEEE GLOBECOM, Communications Society, San Francisco IEEE GLOBECOM, Communications Society, San Francisco (CA, USA, December 2006), pp. 1\u20135. https:\/\/doi.org\/10.1109\/GLOCOM.2006.264"},{"key":"1894_CR25","unstructured":"N. Soganile, T. Baletlwa, B. Moyo, Hybrid Watchdog and Pathrater Algorithm for Improved Security in Mobile Ad-hoc Networks, in International Conference on Wireless Networks, ICWN'15, 162\u2013167 (July 2015)."},{"issue":"6","key":"1894_CR26","doi-asserted-by":"publisher","first-page":"294","DOI":"10.3923\/ijscomp.2012.294.301","volume":"7","author":"R Murugan","year":"2012","unstructured":"R. Murugan, A. Shanmugam, Cluster based trust mechanism for mitigation of internal attacks in mobile ad-hoc networks. Int. J. Soft Comput. 7(6), 294\u2013301 (2012). https:\/\/doi.org\/10.3923\/ijscomp.2012.294.301","journal-title":"Int. J. Soft Comput."},{"issue":"6","key":"1894_CR27","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L Zhou","year":"1999","unstructured":"L. Zhou, Z. Haas, Securing Ad-hoc Networks. IEEE Network Mag. 13(6), 24\u201330 (1999)","journal-title":"IEEE Network Mag."},{"key":"1894_CR28","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/978-3-642-20573-6_67","volume":"147","author":"A Singh","year":"2011","unstructured":"A. Singh, M. Maheshwari, N. Kumar, \u201cSecurity and Trust Management in MANET\u201d, Information Technology and Mobile Communication, AIM 2011. Communications in Computer and Information Science, New York: Springer-Verlag. 147, 384\u2013387 (2011). https:\/\/doi.org\/10.1007\/978-3-642-20573-6_67","journal-title":"Communications in Computer and Information Science, New York: Springer-Verlag."},{"issue":"3","key":"1894_CR29","first-page":"645","volume":"1","author":"F Daryabar","year":"2011","unstructured":"F. Daryabar, A. Dehghantanha, H. Broujerdi, Investigation of malware defense and detection techniques. Int. J. Digit. Inf. Wirel. Commun. 1(3), 645\u2013650 (2011)","journal-title":"Int. J. Digit. Inf. Wirel. Commun."},{"key":"1894_CR30","doi-asserted-by":"publisher","unstructured":"T. Anantvalee, J. Wu, A survey on intrusion detection in mobile ad-hoc networks, in Wireless Network Security, Springer, Boston, MA, 159\u2013180 (2008). https:\/\/doi.org\/10.1007\/978-0-387-33112-6_7","DOI":"10.1007\/978-0-387-33112-6_7"},{"key":"1894_CR31","unstructured":"Y. Zhang, W. Lee, Y. Huang, Intrusion detection techniques for mobile wireless networks. Mobile Networks and Applications, 1\u201316 (2003)."},{"issue":"1","key":"1894_CR32","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"C Modi","year":"2013","unstructured":"C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, M. Rajarajan, A Survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42\u201357 (January 2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"1894_CR33","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.adhoc.2014.11.018","volume":"27","author":"S Kumari","year":"2015","unstructured":"S. Kumari, M.K. Khan, M. Atiquzzaman, User authentication schemes for wireless sensor networks: a review. Ad-hoc Netw. 27, 159\u2013194 (2015). https:\/\/doi.org\/10.1016\/j.adhoc.2014.11.018","journal-title":"Ad-hoc Netw."},{"key":"1894_CR34","doi-asserted-by":"publisher","unstructured":"K. Wong, Y. Zheng, J. Cao, S. Wang, A dynamic user authentication scheme for wireless sensor networks, in International Conference on Sensor Networks, Ubiquitous, Trustworthy Computing, IEEE Computer Society, Taichung, Taiwan, 244\u2013251, (June 2006). https:\/\/doi.org\/10.1109\/SUTC.2006.1636182","DOI":"10.1109\/SUTC.2006.1636182"},{"issue":"2","key":"1894_CR35","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1002\/sec.517","volume":"9","author":"B Vaidya","year":"2012","unstructured":"B. Vaidya, D. Makrakis, H. Mouftah, Two-factor mutual authentication with key agreement in wireless sensor networks. Secur. Commun. Netw. 9(2), 171\u2013183 (2012). https:\/\/doi.org\/10.1002\/sec.517","journal-title":"Secur. Commun. Netw."},{"key":"1894_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2012\/382810","volume":"2012","author":"SG Yoo","year":"2012","unstructured":"S.G. Yoo, K.Y. Park, J. Kim, A security-performance-balanced user authentication scheme for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2012, 1\u201311 (2012). https:\/\/doi.org\/10.1155\/2012\/382810","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"1894_CR37","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1109\/GLOCOM.2007.190","volume-title":"An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks, in IEEE Global Communications Conference, Washington","author":"HR Tseng","year":"2007","unstructured":"H.R. Tseng, R.H. Jan, W. Yang, An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks, in IEEE Global Communications Conference, Washington (DC, USA, November 2007), pp. 985\u2013990. https:\/\/doi.org\/10.1109\/GLOCOM.2007.190"},{"issue":"3","key":"1894_CR38","doi-asserted-by":"publisher","first-page":"2450","DOI":"10.3390\/s100302450","volume":"10","author":"MK Khan","year":"2010","unstructured":"M.K. Khan, K. Alghathbar, Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3), 2450\u20132459 (2010). https:\/\/doi.org\/10.3390\/s100302450","journal-title":"Sensors"},{"key":"1894_CR39","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1016\/j.future.2017.10.026","volume":"92","author":"S Athmani","year":"2017","unstructured":"S. Athmani, A. Bilami, D.E. Boubiche, EDAK: an efficient dynamic authentication and key management mechanism for heterogeneous WSNs. Future Gener. Comput. Syst. 92, 789\u2013799 (2017). https:\/\/doi.org\/10.1016\/j.future.2017.10.026","journal-title":"Future Gener. Comput. Syst."},{"key":"1894_CR40","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1002\/sec.630","volume":"6","author":"P Ballarini","year":"2013","unstructured":"P. Ballarini, L. Mokdad, Q. Monnet, Modeling tools for detecting DoS attacks in WSNS. Secur. Commun. Netw. 6, 420\u2013436 (2013). https:\/\/doi.org\/10.1002\/sec.630","journal-title":"Secur. Commun. Netw."},{"key":"1894_CR41","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.jnca.2017.10.017","volume":"101","author":"MA Ferrag","year":"2018","unstructured":"M.A. Ferrag, L. Maglaras, A. Argyriou, D. Kosmanos, H. Janicke, Security for 4G and 5G cellular networks: a survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appl. 101, 55\u201382 (2018). https:\/\/doi.org\/10.1016\/j.jnca.2017.10.017","journal-title":"J. Netw. Comput. Appl."},{"issue":"5","key":"1894_CR42","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s00530-009-0166-0","volume":"15","author":"T Sheltami","year":"2009","unstructured":"T. Sheltami, A. Al-Roubaiey, E. Shakshuki, A. Mahmoud, Video transmission enhancement in presence of misbehaving nodes in MANETs. Int. J. Multimedia Syst. 15(5), 273\u2013282 (2009)","journal-title":"Int. J. Multimedia Syst."},{"key":"1894_CR43","unstructured":"A. Patwardhan, J. Parker, A. Joshi, M. Iorga, T. Karygiannis, Secure routing and intrusion detection in ad-hoc networks, in 3rd International Conference on Pervasive Computing Communication, 191\u2013199 (August 2005)."},{"issue":"2","key":"1894_CR44","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"1894_CR45","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-0-585-29603-6_5","volume":"5","author":"D Johnson","year":"1996","unstructured":"D. Johnson, D. Maltz, Dynamic source routing in ad-hoc wireless networks . Mobile Comput. 5, 153\u2013181 (1996)","journal-title":"Mobile Comput."},{"key":"1894_CR46","first-page":"139","volume-title":"Ad-hoc Networking Chapter 5","author":"DB Johnson","year":"2001","unstructured":"D.B. Johnson, D.A. Maltz, J. Broch, DSR: the dynamic source routing protocol for multi-hop wireless ad-hoc networks, in Ad-hoc Networking Chapter 5. ed. by C.E. Perkins (Addison-Wesley, London, 2001), pp. 139\u2013172"},{"issue":"3","key":"1894_CR47","first-page":"591","volume":"1","author":"S Om","year":"2011","unstructured":"S. Om, M. Talib, Wireless Ad-hoc network under black-hole attack. Int. J. Dig. Inf. Wirel. Commun. Soc. Dig. Inf. Wirel. Commun. 1(3), 591\u2013596 (2011)","journal-title":"Int. J. Dig. Inf. Wirel. Commun. Soc. Dig. Inf. Wirel. Commun."},{"key":"1894_CR48","unstructured":"Botan: Crypto and TLS for Modern C++ Library. http:\/\/botan.randombit.net\/. [Last Access: October 2019]."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-021-01894-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-021-01894-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-021-01894-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T16:48:06Z","timestamp":1724345286000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-021-01894-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,22]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["1894"],"URL":"https:\/\/doi.org\/10.1186\/s13638-021-01894-7","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-40371\/v2","asserted-by":"object"},{"id-type":"doi","id":"10.21203\/rs.3.rs-40371\/v1","asserted-by":"object"}]},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,22]]},"assertion":[{"value":"2 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"12"}}