{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T22:35:14Z","timestamp":1761950114916,"version":"build-2065373602"},"reference-count":33,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2008,3,1]],"date-time":"2008-03-01T00:00:00Z","timestamp":1204329600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1016\/j.comcom.2007.10.021","type":"journal-article","created":{"date-parts":[[2007,11,8]],"date-time":"2007-11-08T19:34:03Z","timestamp":1194550443000},"page":"760-769","source":"Crossref","is-referenced-by-count":49,"title":["Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing"],"prefix":"10.1016","volume":"31","author":[{"given":"Prayag","family":"Narula","sequence":"first","affiliation":[]},{"given":"Sanjay Kumar","family":"Dhurandher","sequence":"additional","affiliation":[]},{"given":"Sudip","family":"Misra","sequence":"additional","affiliation":[]},{"given":"Isaac","family":"Woungang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2007.10.021_bib1","series-title":"The Handbook of Wireless Ad-Hoc Networks","article-title":"Security in wireless ad-hoc networks","author":"Mishra","year":"2003"},{"key":"10.1016\/j.comcom.2007.10.021_bib2","doi-asserted-by":"crossref","unstructured":"C.E. Perkins, P. Bhagwat, Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers, in: Proceedings of the Conference on Communications Architectures, Protocols and Applications, London, UK, 1994, pp. 234\u2013244 (August 31\u2013September 2).","DOI":"10.1145\/190314.190336"},{"key":"10.1016\/j.comcom.2007.10.021_bib3","series-title":"Book Chapter in Mobile Computing","first-page":"131","article-title":"Dynamic source routing in ad hoc wireless networks","author":"Johnson","year":"1996"},{"key":"10.1016\/j.comcom.2007.10.021_bib4","doi-asserted-by":"crossref","unstructured":"C.E. Perkins, E.M. Royer, Ad-Hoc On demand distance vector routing, in: Proceedings of IEEE WMCSA\u201999, New Orleans, LA, February 1999, pp. 90\u2013100.","DOI":"10.1109\/MCSA.1999.749281"},{"key":"10.1016\/j.comcom.2007.10.021_bib5","first-page":"4187","article-title":"Security enhancement through multiple path transmission in ad hoc networks","author":"Haniotakis","year":"2004","journal-title":"IEEE International Conference on Communications"},{"key":"10.1016\/j.comcom.2007.10.021_bib6","doi-asserted-by":"crossref","unstructured":"A. Abdul-Rahman, S. Hailes, A distributed trust model, in: Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, UK, September 23\u201326, 1997, ACM Press, NY, pp. 48\u201360.","DOI":"10.1145\/283699.283739"},{"key":"10.1016\/j.comcom.2007.10.021_bib7","doi-asserted-by":"crossref","unstructured":"A.A. Pirzada, A. Datta, C. McDonald, Propagating trust in ad-hoc networks for reliable routing, in: Proceedings of 2004 International Workshop on Wireless Ad-Hoc Networks, May\u2013June 2004, pp. 58\u201362.","DOI":"10.1109\/IWWAN.2004.1525541"},{"key":"10.1016\/j.comcom.2007.10.021_bib8","unstructured":"A.A. Pirzada, C. McDonald, Establishing trust in pure ad-hoc networks, in: Estivill-Castro (Ed.), Proceedings of the 27th Australasian Conference on Computer Science, Dunedin, New Zealand, pp. 47\u201354."},{"key":"10.1016\/j.comcom.2007.10.021_bib9","unstructured":"L. Buttyan, L., J.-P. Hubaux, Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. Technical Report DSC\/2001\/046, EPFL-DI-ICA, August 2001."},{"key":"10.1016\/j.comcom.2007.10.021_bib10","first-page":"3431","article-title":"Encryption of wavelet-coded imagery using random permutations","volume":"5","author":"Norcen","year":"2004","journal-title":"Proceedings of 2004 International Conference on Image Processing"},{"key":"10.1016\/j.comcom.2007.10.021_bib11","doi-asserted-by":"crossref","unstructured":"S. Buchegger, J.-Y. LeBoudec, Performance analysis of the CONFIDANT protocol: cooperation of nodes\u2014fairness in dynamic ad-hoc networks, in: Proceedings of IEEE\/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, Switzerland, June 2002.","DOI":"10.1145\/513800.513828"},{"key":"10.1016\/j.comcom.2007.10.021_bib12","doi-asserted-by":"crossref","unstructured":"P. Michiardi, R. Molva, CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in: Proceedings of the IFIP TC6\/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, 2002, pp. 107\u2013121.","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"10.1016\/j.comcom.2007.10.021_bib13","doi-asserted-by":"crossref","unstructured":"S.D. Kamvar, M.T. Schlosser, H.Garcia-Molina, The EigenTrust Algorithm for reputation management in P2P networks, in: Proceedings of the Twelfth International World Wide Web Conference, Budapest, Hungary, 2003, pp. 640\u2013651.","DOI":"10.1145\/775240.775242"},{"key":"10.1016\/j.comcom.2007.10.021_bib14","unstructured":"Y.-C. Hu, A. Perrig, Johnson D.B. Ariadne, A secure on-emand routing protocol for ad hoc networks, in: Proceedings of MOBICOM 2002, Atlanta, Georgia, USA."},{"issue":"6","key":"10.1016\/j.comcom.2007.10.021_bib15","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1109\/90.811453","article-title":"Analysis of multi-path routing","volume":"7","author":"Cidon","year":"1999","journal-title":"IEEE\/ACM Tranactions on Networking"},{"key":"10.1016\/j.comcom.2007.10.021_bib16","doi-asserted-by":"crossref","unstructured":"W. Lou, W. Liu, Y. Fang, SPREAD: enhancing data confidentiality in mobile ad hoc networks, in: Proceedings of the Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2004, March 2004, pp. 2404\u20132413.","DOI":"10.1109\/INFCOM.2004.1354662"},{"key":"10.1016\/j.comcom.2007.10.021_bib17","first-page":"2137","article-title":"Self-managed heterogeneous certification in mobile ad hoc networks","author":"Wang","year":"2003","journal-title":"Proceedings of the Vehicular Technology Conference"},{"key":"10.1016\/j.comcom.2007.10.021_bib18","doi-asserted-by":"crossref","unstructured":"A.A. Pirzada, A. Datta, C. McDonald, Trust-based routing for ad-hoc wireless networks, in: Proceedingsof the Twelvth IEEE International Conference on Networks, 2004. (ICON 2004)., pp. 326\u2013330, Nov. 2004.","DOI":"10.1109\/ICON.2004.1409162"},{"key":"10.1016\/j.comcom.2007.10.021_bib19","unstructured":"M. Takai, L. Bajaj, R. Ahuja, R. Bargrodia, M. Gerla, GloMoSim: a scalable network simulation environment, Technical Report 990027, Department of Computer Science, University of California, Los Angeles, USA, 1999."},{"issue":"10","key":"10.1016\/j.comcom.2007.10.021_bib20","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/2.722293","article-title":"PARSEC: A Parallel Simulation Environment for Complex Systems","volume":"31","author":"Bargodia","year":"1998","journal-title":"IEEE Computer"},{"key":"10.1016\/j.comcom.2007.10.021_bib21","unstructured":"IEEE Computer Society LAN MAN Standards Committee, Wireless LAN Medium Access Protocol (MAC) and Physical Layer (PHY), IEEE Std. 802.11\u20131997. The Institute of Electrical and Electronic Engineers, 1997."},{"key":"10.1016\/j.comcom.2007.10.021_bib22","doi-asserted-by":"crossref","unstructured":"P. Papadimitratos, Z.J. Haas, Secure routing for mobile ad hoc networks, in: Proceedings of SCS CNDS, San Antonio, TX, January 27\u201331, 2002, pp. 193\u2013204.","DOI":"10.1201\/9781420040401.ch31"},{"issue":"1","key":"10.1016\/j.comcom.2007.10.021_bib23","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/S1570-8705(03)00019-2","article-title":"Secure efficient distance vector routing for mobile wireless ad hoc networks","volume":"1","author":"Hu","year":"2003","journal-title":"Ad Hoc Networks"},{"key":"10.1016\/j.comcom.2007.10.021_bib24","unstructured":"P. Papadimitratos, Z.J. Haas, Secure QoS-aware route discovery in ad hoc networks, in: Proceedings of 2005 IEEE Sarnoff Symposium, Princeton, NJ, April 2005, pp. 176\u2013179."},{"key":"10.1016\/j.comcom.2007.10.021_bib25","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Secure and Fault-Tolerant Communication in Mobile Ad Hoc Networks, Ph.D. Thesis, Cornell University, Ithaca, NY, January 2005.","DOI":"10.1007\/978-1-4613-0223-0_12"},{"key":"10.1016\/j.comcom.2007.10.021_bib26","doi-asserted-by":"crossref","unstructured":"S. Marti, T.J. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of Sixth MobiCom, Boston, MA, August 2000, pp. 255\u2013265.","DOI":"10.1145\/345910.345955"},{"key":"10.1016\/j.comcom.2007.10.021_bib27","unstructured":"B. Dahill, B. Neil, E. Royer, C. Sheilds, A secure protocol for ad hoc networks, in: Proceedings of IEEE ICNP, 2002."},{"key":"10.1016\/j.comcom.2007.10.021_bib28","unstructured":"V. Gupta, S. Krishnamurthy, M. Faloutsos, Denial of Service attacks at the mac layer in wireless ad hoc networks, in: Proceedings of IEEE MILCOM, 2002."},{"key":"10.1016\/j.comcom.2007.10.021_bib29","doi-asserted-by":"crossref","unstructured":"Y. Hu, D. Johnson, A. Perrig, Sead: Secure Efficient Distance vector routing for mobile wireless ad hoc networks, in: Proceedings of IEEE WMCSA, 2002.","DOI":"10.1016\/S1570-8705(03)00019-2"},{"key":"10.1016\/j.comcom.2007.10.021_bib30","doi-asserted-by":"crossref","unstructured":"B. Awerbuch, D. Holmer, C. Nita-Rotaru, H. Rubens, An on-demand secure routing protocol resilient to byzantine failures, in: Proceedings of ACM Workshop on Wireless Security (WiSe), 2002.","DOI":"10.1145\/570681.570684"},{"key":"10.1016\/j.comcom.2007.10.021_bib31","doi-asserted-by":"crossref","unstructured":"H. Yang, X. Meng, S. Lu, Self-organized network layer security in mobile ad hoc networks, in: Proceedings of ACM Workshop on Wireless Security (WiSe), 2002.","DOI":"10.1145\/570681.570683"},{"key":"10.1016\/j.comcom.2007.10.021_bib32","unstructured":"Y. Hu, A. Perrig, D. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, in: Proceedings of IEEE INFOCOM, 2002."},{"key":"10.1016\/j.comcom.2007.10.021_bib33","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/98.760423","article-title":"A review of current routing protocols for ad hoc mobile wireless networks","volume":"6","author":"Royer","year":"1999","journal-title":"IEEE Personal Communications"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366407004276?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366407004276?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T05:19:17Z","timestamp":1737523157000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366407004276"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2008,3]]}},"alternative-id":["S0140366407004276"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2007.10.021","relation":{},"ISSN":["0140-3664"],"issn-type":[{"type":"print","value":"0140-3664"}],"subject":[],"published":{"date-parts":[[2008,3]]}}}