{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T07:07:00Z","timestamp":1773212820324,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,4,29]],"date-time":"2023-04-29T00:00:00Z","timestamp":1682726400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,4,29]],"date-time":"2023-04-29T00:00:00Z","timestamp":1682726400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"The project was supported by the Department of Culture Studies, Religious Studies and Educational Sciences, University of G\u00e4vle, G\u00e4vle, Sweden"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Cloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access and deliver cloud services to MANET users through their smart devices. MANETs is a pool of self-organized mobile gadgets that can communicate with each other with no support from a central authority or infrastructure. The main advantage of MANETs is its ability to manage mobility while data communication between different users in the system occurs. In MANETs, clustering is an active technique used to manage mobile nodes. The security of MANETs is a key aspect for the fundamental functionality of the network. Addressing the security-related problems ensures that the confidentiality and integrity of the data transmission is secure. MANETs are highly prone to attacks because of their properties.In clustering schemes, the network is broken down to sub-networks called clusters. These clusters can have overlapping nodes or be disjointed. An enhanced node referred to asthe Cluster Head (CH) is chosen from each set to overseetasks related to routing. It decreases the member nodes\u2019 overhead and improvesthe performance of the system. The relationship between the nodes and CH may vary randomly, leading to re-associations and re-clustering in a MANET that is clustered. An efficient and effective routing protocol is required to allow networking and to find the most suitable paths between the nodes. The networking must be spontaneous, infrastructure-less, and provide end-to-end interactions. The aim of routing is the provision of maximum network load distribution and robust networks. This study focused on the creation of a maximal route between a pair of nodes, and to ensure the appropriate and accurate delivery of the packet. The proposed solution ensured that routing can be carried out with the lowest bandwidth consumption. Compared to existing protocols, the proposed solution had a control overhead of 24, packet delivery ratio of 81, the lowest average end-to-end delay of 6, and an improved throughput of 80,000, thereby enhancing the output of the network. Our result shows that multipath routing enables the network to identify alternate paths connecting the destination and source. Routing is required to conserve energy and for optimum bandwidth utilization.<\/jats:p>","DOI":"10.1186\/s13677-023-00443-5","type":"journal-article","created":{"date-parts":[[2023,4,29]],"date-time":"2023-04-29T16:20:22Z","timestamp":1682785222000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Enhanced security using multiple paths routine scheme in cloud-MANETs"],"prefix":"10.1186","volume":"12","author":[{"given":"Tao","family":"Hai","sequence":"first","affiliation":[]},{"given":"Jincheng","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Dayang","family":"Jawawi","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4067-3256","authenticated-orcid":false,"given":"Edeh Michael","family":"Onyema","sequence":"additional","affiliation":[]},{"given":"Cresantus","family":"Biamba","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,29]]},"reference":[{"issue":"8","key":"443_CR1","doi-asserted-by":"publisher","first-page":"3769","DOI":"10.1109\/TVT.2008.919606","volume":"56","author":"E Sakhaee","year":"2008","unstructured":"Sakhaee E, Jamalipour A (2008) Stable clustering and communications in pseudolinear highly mobile ad hoc networks. IEEE Trans Veh Technol 56(8):3769\u20133777","journal-title":"IEEE Trans Veh Technol"},{"issue":"3","key":"443_CR2","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/JAS.2021.1003862","volume":"8","author":"L Silva","year":"2021","unstructured":"Silva L et al (2021) Computing paradigms in emerging vehicular environments: a review. IEEE\/CAA J Autom Sin 8(3):491\u2013511. https:\/\/doi.org\/10.1109\/JAS.2021.1003862","journal-title":"IEEE\/CAA J Autom Sin"},{"key":"443_CR3","first-page":"405","volume-title":"A cluster-based multipath routing for MANET","author":"A Huiyao","year":"2004","unstructured":"Huiyao A, Xicheng L, Wei P (2004) A cluster-based multipath routing for MANET. Computer School, National University of Defense Technology, Changsha, China, pp 405\u2013413"},{"issue":"2","key":"443_CR4","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1109\/JAS.2019.1911813","volume":"7","author":"H Huang","year":"2020","unstructured":"Huang H, Huang C, Ma D (2020) A method for deploying the minimal number of UAV base stations in cellular networks. IEEE\/CAA J Autom Sin 7(2):559\u2013567. https:\/\/doi.org\/10.1109\/JAS.2019.1911813","journal-title":"IEEE\/CAA J Autom Sin"},{"key":"443_CR5","first-page":"511","volume":"1970","author":"M Chatterjee","year":"2009","unstructured":"Chatterjee M, Das SK, Turgut D (2009) A weight based distributed clustering algorithm for mobile ad hoc networks. HiPC, LNCS 1970:511\u2013521","journal-title":"HiPC, LNCS"},{"key":"443_CR6","first-page":"133","volume":"6785","author":"W Asif","year":"2011","unstructured":"Asif W, Qaisar S (2011) \u201cEnergy and path aware clustering algorithm for mobile ad hoc networks. ICCSA, Part IV, LNCS 6785:133\u2013147","journal-title":"ICCSA, Part IV, LNCS"},{"key":"443_CR7","first-page":"413","volume-title":"A mobility based metric for clustering in mobile ad hoc networks,\" in International conference on Distributed computing systems workshop","author":"P Basu","year":"2012","unstructured":"Basu P, Naidu W (2012) A mobility based metric for clustering in mobile ad hoc networks,\" in International conference on Distributed computing systems workshop. pp 413\u2013418"},{"issue":"1","key":"443_CR8","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1109\/JAS.2019.1911846","volume":"7","author":"J Zhong","year":"2020","unstructured":"Zhong J, Huang Z, Feng L, Du W, Li Y (2020) A hyper-heuristic framework for lifetime maximization in wireless sensor networks with a mobile sink. IEEE\/CAA J Autom Sin 7(1):223\u2013236. https:\/\/doi.org\/10.1109\/JAS.2019.1911846","journal-title":"IEEE\/CAA J Autom Sin"},{"key":"443_CR9","volume-title":"in International Journal of Computer Applications (0975\u20138887), National Conference on Recent Trends in Engineering and Management \u201cNCRTEM-2013","author":"N Shukla","year":"2013","unstructured":"Shukla N (2013) Mobile Ad-Hoc Network (MANET): Security Issues Regarding Attacks. in International Journal of Computer Applications (0975\u20138887), National Conference on Recent Trends in Engineering and Management \u201cNCRTEM-2013"},{"issue":"1","key":"443_CR10","first-page":"101","volume":"15","author":"K Sudha","year":"2015","unstructured":"Sudha K, Ranjith JP, Ganapathy S, Sasidharan MSR (2015) Secure transmission over remote group: a new key management prototype. Int J Comput Sci Netw Secur (IJCSNS) 15(1):101","journal-title":"Int J Comput Sci Netw Secur (IJCSNS)"},{"key":"443_CR11","volume-title":"Proc. of 9th ACM SIGOPS European Workshop, Kolding, Denmark","author":"R Morris","year":"2010","unstructured":"Morris R, Jannotti J, Kaashoek F, Li J, Decouto D (2010) CarNet: A Scalable Ad Hoc Wireless Network System. Proc. of 9th ACM SIGOPS European Workshop, Kolding, Denmark"},{"key":"443_CR12","first-page":"1360","volume-title":"Proc. of INFOCOM\u201901","author":"M Grossglauser","year":"2001","unstructured":"Grossglauser M, Tse D (2001) Mobility increases the capacity of ad-hoc wireless networks. Proc. of INFOCOM\u201901. pp 1360\u20131369"},{"key":"443_CR13","volume-title":"Chapter 4, Ad Hoc Networking, edited by C. E. Perkins, Addison-Wesley","author":"M Steenstrup","year":"2001","unstructured":"Steenstrup M (2001) Cluster-Based Networks. Chapter 4, Ad Hoc Networking, edited by C. E. Perkins, Addison-Wesley"},{"key":"443_CR14","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.procs.2015.06.007","volume":"54","author":"V Neethu","year":"2015","unstructured":"Neethu V, Singh AK (2015) Mobility aware loose clustering for mobile ad hoc network. Procedia Comput Sci 54:57\u201364","journal-title":"Procedia Comput Sci"},{"key":"443_CR15","first-page":"954","volume":"3982","author":"S Sung","year":"2010","unstructured":"Sung S, Seo Y, Shin Y (2010) Hierarchical clustering algorithm based in mobile ad hoc networks. ICCSA, LNCS 3982:954\u2013963","journal-title":"ICCSA, LNCS"},{"key":"443_CR16","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s12243-013-0411-6","volume":"69","author":"A Loutfi","year":"2014","unstructured":"Loutfi A (2014) An energy aware algorithm for OLSR clustering. Ann Telecommun 69:201\u2013207","journal-title":"Ann Telecommun"},{"key":"443_CR17","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.adhoc.2014.09.010","volume":"25","author":"SS Basurra","year":"2015","unstructured":"Basurra SS, De Vos M, Padget J, Ji Y, Lewis T, Armour S (2015) Energy efficient zonebased routing protocol for MANETs. Ad Hoc Netw 25:16\u201337","journal-title":"Ad Hoc Netw"},{"key":"443_CR18","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jpdc.2020.0.2.010","volume":"142","author":"SP RM","year":"2020","unstructured":"RM SP, Bhattacharya S, Maddikunta PKR, Somayaji SRK, Lakshmanna K, Kaluri R, Hussien A, Gadekallu TR (2020) Load balancing of energy cloud using wind driven and firefly algorithms in internet of everything. J Parallel Distrib Comput 142:16\u201326. https:\/\/doi.org\/10.1016\/j.jpdc.2020.0.2.010","journal-title":"J Parallel Distrib Comput"},{"key":"443_CR19","doi-asserted-by":"publisher","first-page":"01","DOI":"10.9790\/0661-1804040105","volume":"18","author":"SB Kulkarni","year":"2016","unstructured":"Kulkarni SB, Yuvaraju B (2016) Challenges and issues of cluster based security in MANET. IOSR J Comput Eng (IOSR-JCE) 18:01\u201305","journal-title":"IOSR J Comput Eng (IOSR-JCE)"},{"key":"443_CR20","first-page":"21","volume":"167","author":"I Kaur","year":"2017","unstructured":"Kaur I, Rao A (2017) A framework to improve the network security with less mobility in MANET. Int J Comput Appl 167:21\u20134","journal-title":"Int J Comput Appl"},{"issue":"8","key":"443_CR21","doi-asserted-by":"publisher","first-page":"2781","DOI":"10.1007\/s11276-015-0945-9","volume":"21","author":"RH Jhaveri","year":"2015","unstructured":"Jhaveri RH, Patel NM (2015) A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Netw 21(8):2781\u20132798","journal-title":"Wireless Netw"},{"issue":"2","key":"443_CR22","first-page":"381","volume":"20","author":"P Kavitha","year":"2018","unstructured":"Kavitha P, Mukesh R (2018) Detection of impersonation attack in MANET using polynomial reduction algorithm. IJ Network Security 20(2):381\u2013389","journal-title":"IJ Network Security"},{"key":"443_CR23","unstructured":"Singh M, Gagangeet S (2015) A secure and efficient cluster head selection algorithm for MANET. J Netw Commun Emerg Technol (JNCET);2. www.jncet.org"},{"key":"443_CR24","doi-asserted-by":"crossref","unstructured":"Chakeres ID, Belding-Royer EM (2004) AODV routing protocol implementation design. In 24th International Conference on Distributed Computing Systems Workshops. USA, 2004. Proceedings. 7:698\u2013703. IEEE","DOI":"10.1109\/ICDCSW.2004.1284108"},{"key":"443_CR25","first-page":"1","volume":"3","author":"T Panke","year":"2013","unstructured":"Panke T (2013) Clustering based certificate revocation scheme for malicious nodes in MANET. Int J Sci Res Publ 3:1\u20135","journal-title":"Int J Sci Res Publ"},{"key":"443_CR26","first-page":"1","volume-title":"In: TENCON 2008\u20132008 IEEE Region 10 Conference","author":"K Ammayappan","year":"2008","unstructured":"Ammayappan K, Sastry VN, Negi A (2008) Cluster based multihop security protocol in MANET using ECC. In: TENCON 2008\u20132008 IEEE Region 10 Conference. Hyderabad, India, IEEE, pp 1\u20136"},{"issue":"02","key":"443_CR27","first-page":"95","volume":"03","author":"P Gupta","year":"2016","unstructured":"Gupta P (2016) A literature survey of MANET. Int Res J Eng Technol 03(02):95\u20139","journal-title":"Int Res J Eng Technol"},{"key":"443_CR28","first-page":"251","volume":"3","author":"DS Dhenakaran","year":"2013","unstructured":"Dhenakaran DS, Parvathavarthini A (2013) An Overview of Routing Protocols in Mobile Ad-Hoc Network. Int J Adv Res Computer Sci Softw Eng. 3:251\u2013259","journal-title":"Int J Adv Res Computer Sci Softw Eng."},{"issue":"3","key":"443_CR29","first-page":"279","volume":"1","author":"S Taneja","year":"2010","unstructured":"Taneja S (2010) A survey of routing protocols in mobile ad hoc networks. Int J Innov Manag Technol 1(3):279","journal-title":"Int J Innov Manag Technol"},{"issue":"2","key":"443_CR30","first-page":"215","volume":"2","author":"L ALGhafran","year":"2015","unstructured":"ALGhafran L, Yusof ZBM (2015) An efficient load balancing clustering algorithm for mobile ad hoc networks. Int J Comput Commun Instrum Eng (UCCIE) 2(2):215\u20139","journal-title":"Int J Comput Commun Instrum Eng (UCCIE)"},{"key":"443_CR31","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1023\/A:1013941929408","volume":"5","author":"M Chatterjee","year":"2002","unstructured":"Chatterjee M, Das SK, Turgut D (2002) WCA: a weighted clustering algorithm for mobile ad hoc networks. Clust Comput 5:193\u2013204","journal-title":"Clust Comput"},{"issue":"5","key":"443_CR32","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1002\/wcm.72","volume":"2","author":"T Camp","year":"2002","unstructured":"Camp T, Boleng J, Davies V (2002) A survey of mobility models for ad hoc network research. Wirel Commun Mob Comput 2(5):483\u2013502","journal-title":"Wirel Commun Mob Comput"},{"key":"443_CR33","first-page":"1","volume":"1","author":"X Zhang","year":"2016","unstructured":"Zhang X (2016) A street-centric opportunistic routing protocol based on link correlation for urban manets. IEEE Trans Mob Comput 1:1\u20131","journal-title":"IEEE Trans Mob Comput"},{"key":"443_CR34","first-page":"697","volume":"5","author":"D Grover","year":"2015","unstructured":"Grover D, Saini S (2015) A survey on unicast routing protocols in mobile ad-hoc networks. Int J Adhoc Ubiquitous Comput 5:697\u2013702","journal-title":"Int J Adhoc Ubiquitous Comput"},{"key":"443_CR35","first-page":"1","volume-title":"In: SENSORS","author":"F Djemili","year":"2013","unstructured":"Djemili F, Tolba C (2013) A mixed approach load balancing and efficient energy for multi-path routing in mobile ad hoc networks. In: SENSORS, IEEE, Baltimore, MD, USA, IEEE, pp 1\u20134"},{"key":"443_CR36","first-page":"49","volume-title":"In Proc. MobiHoc \u201906: 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing","author":"T Spyropoulos","year":"2010","unstructured":"Spyropoulos T, Psounis K, Raghavendra C (2010) Performance analysis of mobility-assisted routing. In Proc. MobiHoc \u201906: 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing. pp 49\u201360"},{"issue":"11","key":"443_CR37","first-page":"3077","volume":"20","author":"Z Xinming","year":"2010","unstructured":"Xinming Z, Dong S, Fengfu Z (2010) Integrated routing metric for mobile ad hoc networks. J Softw 20(11):3077\u20133085","journal-title":"J Softw"},{"key":"443_CR38","first-page":"1","volume":"135","author":"G He","year":"2002","unstructured":"He G (2002) Destination-Sequenced Distance Vector (DSDV) Protocol. Helsinki University of Technology Finland Magazine 135:1\u20139","journal-title":"Helsinki University of Technology Finland Magazine"},{"key":"443_CR39","doi-asserted-by":"publisher","unstructured":"Li X, Cuthbert L (2014) Stable node-disjoint multipath routing with low overhead in mobile ad hoc networks. In The IEEE Computer Society's 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems Volendam, The Netherlands: IEEE, pp. 184-191. \nhttps:\/\/doi.org\/10.1109\/MASCOT.2004.1348196","DOI":"10.1109\/MASCOT.2004.1348196"},{"key":"443_CR40","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/j.comnet.2016.12.017","volume":"113","author":"M Gharib","year":"2015","unstructured":"Gharib M, Moradlou Z, Doostari MA, Movaghar A (2015) Fully distributed ECC-based key management for mobile ad hoc networks. Comput Netw 113:269\u2013283","journal-title":"Comput Netw"},{"key":"443_CR41","first-page":"96","volume-title":"In: 2013 IEEE 10th International Conference on Ubiquitous Intelligence","author":"Z Moradlu","year":"2013","unstructured":"Moradlu Z, Doostari MA, Gharib M, Movaghar A (2013) Fully distributed self certified key management for large-scale MANETs. In: 2013 IEEE 10th International Conference on Ubiquitous Intelligence. Vietri sul Mare, IEEE, pp 96\u2013102"},{"issue":"6","key":"443_CR42","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1016\/j.adhoc.2008.09.007","volume":"7","author":"J Kim","year":"2012","unstructured":"Kim J, Tsudik G (2012) SRDP: Secure route discovery for dynamic source routing in MANETs. Ad Hoc Netw 7(6):1097\u20131109","journal-title":"Ad Hoc Netw"},{"key":"443_CR43","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1109\/JSAC.2004.826932","volume":"22","author":"B Tavli","year":"2004","unstructured":"Tavli B, Heinzelman WB (2004) MH-TRACE: multihop time reservation using adaptive control for energy efficiency. IEEE J Sel Areas Commun 22:942\u2013953","journal-title":"IEEE J Sel Areas Commun"},{"key":"443_CR44","doi-asserted-by":"publisher","first-page":"102613","DOI":"10.1016\/j.seta.2022.102613","volume":"53, Part b","author":"S Bharany","year":"2022","unstructured":"Bharany S, Badotra S, Sharma S, Rani S, Alazab M, Jhaveri RH, Gadekallu TR (2022) Energy efficient fault tolerance techniques in green cloud computing: a systematic survey and taxonomy. Sustain Energy Technol Assess 53, Part b:102613. https:\/\/doi.org\/10.1016\/j.seta.2022.102613","journal-title":"Sustain Energy Technol Assess"},{"key":"443_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/7359210","volume":"7359210","author":"B Ruby","year":"2022","unstructured":"Ruby B, Onyema EM, Khalid KA, Celestine I, Shahab SB, Tripti S, Amir M (2022) Assessment of dynamic swarm heterogeneous clustering in cognitive radio sensor networks. Wirel Commun Mob Comput 7359210:1\u201315. https:\/\/doi.org\/10.1155\/2022\/7359210","journal-title":"Wirel Commun Mob Comput"},{"issue":"1","key":"443_CR46","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1515\/pjbr-2022-0005","volume":"13","author":"Y Zhao","year":"2022","unstructured":"Zhao Y, Gupta RK, Onyema EM (2022) Robot visual navigation estimation and target localization based on neural network. Paladyn J Behav Robot 13(1):76\u201383. https:\/\/doi.org\/10.1515\/pjbr-2022-0005","journal-title":"Paladyn J Behav Robot"},{"key":"443_CR47","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MNET.2002.1020231","volume":"16","author":"X Hong","year":"2002","unstructured":"Hong X, Xu K, Gerla M (2002) Scalable Routing Protocols for Mobile Ad Hoc Networks. IEEE Network 16:11\u201321. https:\/\/doi.org\/10.1109\/MNET.2002.1020231","journal-title":"IEEE Network"},{"key":"443_CR48","volume-title":"Proc. of the Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2001)","author":"P Sinha","year":"2001","unstructured":"Sinha P, Sivakumar R, Vaduvur B (2001) Enhancing Ad Hoc Routing with Dynamic Virtual Infrastructures. Proc. of the Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2001)"},{"key":"443_CR49","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1109\/TMC.2014.2339215","volume":"14","author":"B Karaoglu","year":"2015","unstructured":"Karaoglu B, Heinzelman W (2015) Cooperative load balancing and dynamic channel allocation for cluster-based mobile ad hoc networks. IEEE Trans Mob Comput 14:951\u2013963","journal-title":"IEEE Trans Mob Comput"},{"key":"443_CR50","volume-title":"Proc. of IEEE Infocom\u201901","author":"T Salonidis","year":"2001","unstructured":"Salonidis T, Bhagwat P, Tassiulas L, LaMaire R (2001) Distributed topology construction of Bluetooth personal area networks. Proc. of IEEE Infocom\u201901"},{"key":"443_CR51","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/35.900643","volume":"39","author":"S Chakrabarti","year":"2001","unstructured":"Chakrabarti S, Mishra A (2001) QoS issues in ad hoc wireless networks. IEEE Commun Mag 39:142\u2013148","journal-title":"IEEE Commun Mag"},{"key":"443_CR52","volume-title":"Proc. of IEEE Military Communications Conference (MILCOM \u201999)","author":"TJ Kwon","year":"2009","unstructured":"Kwon TJ, Gerla M (2009) Clustering with power control. Proc. of IEEE Military Communications Conference (MILCOM \u201999)"},{"issue":"7","key":"443_CR53","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1109\/49.622910","volume":"15","author":"CR Lin","year":"2007","unstructured":"Lin CR, Gerla M (2007) Adaptive clustering for mobile wireless networks. IEEE J Sel Areas Commun 15(7):1265\u20131275","journal-title":"IEEE J Sel Areas Commun"},{"key":"443_CR54","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1186\/s13677-022-00305-6","volume":"11","author":"EM Onyema","year":"2022","unstructured":"Onyema EM, Dalal S, Romero CAT et al (2022) Design of intrusion detection system based on cyborg intelligence for security of cloud network traffic of smart cities. Springer J Cloud Comp 11:26. https:\/\/doi.org\/10.1186\/s13677-022-00305-6","journal-title":"Springer J Cloud Comp"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00443-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00443-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00443-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,29]],"date-time":"2023-04-29T16:20:46Z","timestamp":1682785246000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00443-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,29]]},"references-count":54,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["443"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00443-5","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2011538\/v1","asserted-by":"object"}]},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,29]]},"assertion":[{"value":"30 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The research has consent for Ethical Approval and Consent to participate.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Consent has been granted by all authors and there is no conflict.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"68"}}