{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T23:36:31Z","timestamp":1768606591491,"version":"3.49.0"},"reference-count":0,"publisher":"Slovenian Association Informatika","issue":"37","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJCAI"],"abstract":"<jats:p>Mobile Ad Hoc Networks (MANETs) are widely used in diverse situations where secure communication and reliability are necessary. MANETs without a centralized infrastructure are prone to various security threats. This paper presents an Enhanced Lightweight Trusted Routing Protocol (ELRP) to ensure secure connectivity and reliability in MANETs. The primary goal of ELRP is to prevent the inclusion of malicious hosts in the route and reliably convey data. Trust metrics provide secure communication by leveraging quality of service parameters to optimize trust computation. Opportunistic routing enhances data reliability and consistency. It allows each node to choose an intermediate node dynamically based on trust levels. Depending on the trust factor, ELRP enables nodes to select the forwarder at runtime. ELRP features an Intrusion Detection System (IDS) designed to recognize and mitigate black and grey hole attacks. ELRP is scalable as it uses local information and does not consume computational resources. Simulations conducted in NS2 demonstrate that ELRP improves throughput by approximately 22%, increases packet delivery ratio by 14.4%, and reduces end-to-end delay by 37.1% compared to standard AODV under malicious attack scenarios.<\/jats:p>","DOI":"10.31449\/inf.v49i37.12267","type":"journal-article","created":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T11:55:51Z","timestamp":1768564551000},"source":"Crossref","is-referenced-by-count":0,"title":["ELRP: A Trust and IDS-Integrated Opportunistic Routing Protocol for MANETs with NS2-Based Evaluation"],"prefix":"10.31449","volume":"49","author":[{"given":"Jidong","family":"Zhang","sequence":"first","affiliation":[]}],"member":"16141","published-online":{"date-parts":[[2025,12,25]]},"container-title":["Informatica"],"original-title":[],"link":[{"URL":"https:\/\/www.informatica.si\/index.php\/informatica\/article\/download\/12267\/6392","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.informatica.si\/index.php\/informatica\/article\/download\/12267\/6392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T11:55:51Z","timestamp":1768564551000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.informatica.si\/index.php\/informatica\/article\/view\/12267"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,25]]},"references-count":0,"journal-issue":{"issue":"37","published-online":{"date-parts":[[2026,1,11]]}},"URL":"https:\/\/doi.org\/10.31449\/inf.v49i37.12267","relation":{},"ISSN":["1854-3871","0350-5596"],"issn-type":[{"value":"1854-3871","type":"electronic"},{"value":"0350-5596","type":"print"}],"subject":[],"published":{"date-parts":[[2025,12,25]]}}}