{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T12:40:09Z","timestamp":1728477609841},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T00:00:00Z","timestamp":1727308800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T00:00:00Z","timestamp":1727308800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s11277-024-11566-6","type":"journal-article","created":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T18:02:39Z","timestamp":1727373759000},"page":"1649-1670","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detection of Wormhole Attack Via Bio-Inspired Ant Colony Optimization Based Trust Model in WSN Assisted IoT Network"],"prefix":"10.1007","volume":"138","author":[{"given":"Harmeet","family":"Singh","sequence":"first","affiliation":[]},{"given":"Manju","family":"Bala","sequence":"additional","affiliation":[]},{"given":"Sukhvinder Singh","family":"Bamber","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9506-5864","authenticated-orcid":false,"given":"Mohit","family":"Angurala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,26]]},"reference":[{"issue":"1","key":"11566_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S1570-8705(03)00043-X","volume":"2","author":"M Abolhasan","year":"2004","unstructured":"Abolhasan, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 1\u201322.","journal-title":"Ad Hoc Networks"},{"issue":"1","key":"11566_CR2","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1109\/JSEN.2022.3224128","volume":"23","author":"TN Nguyen","year":"2023","unstructured":"Nguyen, T. N., Tran, D.-H., Chien, T. V., Phan, V.-D., Nguyen, N.-T., Voznak, M., Chatzinotas, S., Ottersten, B., & Poor, H. V. (2023). Physical layer security in AF-based cooperative SWIPT sensor networks. IEEE Sensors Journal, 23(1), 689\u2013705. https:\/\/doi.org\/10.1109\/JSEN.2022.3224128","journal-title":"IEEE Sensors Journal"},{"issue":"2","key":"11566_CR3","doi-asserted-by":"publisher","first-page":"199","DOI":"10.23919\/ICN.2020.0016","volume":"1","author":"J Liu","year":"2020","unstructured":"Liu, J., Zhao, Z., Ji, J., & Hu, M. (2020). Research and application of wireless sensor network technology in power transmission and distribution system. Intelligent and Converged Networks, 1(2), 199\u2013220. https:\/\/doi.org\/10.23919\/ICN.2020.0016","journal-title":"Intelligent and Converged Networks"},{"issue":"7","key":"11566_CR4","doi-asserted-by":"publisher","first-page":"6495","DOI":"10.1109\/JIOT.2019.2957396","volume":"7","author":"X Liu","year":"2020","unstructured":"Liu, X., Yu, J., Li, F., Lv, W., Wang, Y., & Cheng, X. (2020). Data aggregation in wireless sensor Networks: From the perspective of security. IEEE Internet of Things Journal, 7(7), 6495\u20136513. https:\/\/doi.org\/10.1109\/JIOT.2019.2957396","journal-title":"IEEE Internet of Things Journal"},{"key":"11566_CR5","unstructured":"Chiu, H.S., & Lui, K., (2006). DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks. In In 1st international symposium on wireless pervasive computing. IEEE. phuket: IEEE, pp. 1\u20136. Available at: http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=1613586"},{"key":"11566_CR6","doi-asserted-by":"crossref","unstructured":"Eriksson, J., Krishnamurthy, S. V., & Faloutsos, M., (2006). TrueLink: A practical countermeasure to the wormhole attack in wireless networks. Proceedings - International Conference on Network Protocols, ICNP, pp.75\u201384","DOI":"10.1109\/ICNP.2006.320200"},{"key":"11566_CR7","doi-asserted-by":"crossref","unstructured":"Jain, S., Ta, T., & Baras, J.S., (2012). Wormhole detection using channel characteristics. 2012 IEEE International Conference on Communications (ICC), pp.6699\u20136704. Available at: http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=6364768.Jamshidi","DOI":"10.1109\/ICC.2012.6364768"},{"issue":"1","key":"11566_CR8","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s11277-018-6107-5","volume":"105","author":"M Zangeneh","year":"2019","unstructured":"Zangeneh, M., Esnaashari, E., Darwesh, M., & Meybodi, M. R. (2019). A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it. Wireless Personal Communications, 105(1), 145\u2013173. https:\/\/doi.org\/10.1007\/s11277-018-6107-5","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"11566_CR9","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/s11277-017-4643-z","volume":"2","author":"D Kaur","year":"2017","unstructured":"Kaur, D., & Kaur, M. R. (2017). Wormhole attack detection in mobile Ad Hoc networks. Wireless Personal Communications, 2(2), 174\u2013179. https:\/\/doi.org\/10.1007\/s11277-017-4643-z","journal-title":"Wireless Personal Communications"},{"key":"11566_CR10","doi-asserted-by":"publisher","first-page":"2221","DOI":"10.1007\/s11227-018-2680-3","volume":"75","author":"FA Khan","year":"2019","unstructured":"Khan, F. A., Farooqi, A. H., & Derhab, A. (2019). A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks. Journal of Supercomputing, 75, 2221\u20132242.","journal-title":"Journal of Supercomputing"},{"issue":"13","key":"11566_CR11","doi-asserted-by":"publisher","first-page":"3750","DOI":"10.1016\/j.comnet.2007.04.001","volume":"51","author":"I Khalil","year":"2007","unstructured":"Khalil, I., Bagchi, S., & Shroff, N. B. (2007). L ITE W ORP\u202f: Detection and isolation of the wormhole attack in static multihop wireless networks. Computer Networks, 51(13), 3750\u20133772.","journal-title":"Computer Networks"},{"issue":"3","key":"11566_CR12","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1016\/j.adhoc.2007.02.001","volume":"6","author":"I Khalil","year":"2008","unstructured":"Khalil, I., Bagchi, S., & Shroff, N. B. (2008). MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Networks, 6(3), 344\u2013362.","journal-title":"Ad Hoc Networks"},{"key":"11566_CR13","doi-asserted-by":"crossref","unstructured":"Korkmaz, T., (2005). Verifying physical presence of neighbors against replay-based attacks in wireless ad hoc networks. International Conference on Information Technology: Coding and Computing (ITCC\u201905) - Volume II, Vol. 2 pp.704\u2013709","DOI":"10.1109\/ITCC.2005.291"},{"issue":"6","key":"11566_CR14","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1016\/j.adhoc.2008.09.005","volume":"7","author":"S Madria","year":"2009","unstructured":"Madria, S., & Yin, J. (2009). SeRWA: A secure routing protocol against wormhole attacks in sensor networks. Ad Hoc Networks, 7(6), 1051\u20131063. https:\/\/doi.org\/10.1016\/j.adhoc.2008.09.005","journal-title":"Ad Hoc Networks"},{"issue":"2","key":"11566_CR15","doi-asserted-by":"publisher","first-page":"89","DOI":"10.4103\/0256-4602.78089","volume":"28","author":"M Meghdadi","year":"2011","unstructured":"Meghdadi, M., Ozdemir, S., & Gueler, I. (2011). A survey of wormhole-based attacks and their countermeasures in wireless sensor networks. Iete Technical Review, 28(2), 89\u2013102.","journal-title":"Iete Technical Review"},{"key":"11566_CR16","doi-asserted-by":"crossref","unstructured":"Rajakumar, P., Prasanna, V.T., & Pitchaikkannu, A., (2014). Security attacks and detection schemes in MANET. 2014 International Conference on Electronics and Communication Systems, ICECS 2014","DOI":"10.1109\/ECS.2014.6892808"},{"key":"11566_CR17","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1007\/s11277-020-08044-0","volume":"118","author":"S Singh","year":"2021","unstructured":"Singh, S., & Saini, H. S. (2021). Learning-based security technique for selective forwarding attack in clustered WSN. Wireless Personal Communications, 118, 789\u2013814.","journal-title":"Wireless Personal Communications"},{"key":"11566_CR18","doi-asserted-by":"publisher","first-page":"5965","DOI":"10.1007\/s11276-020-02422-z","volume":"26","author":"H Singh","year":"2020","unstructured":"Singh, H., Bala, M., & Bamber, S. S. (2020). Augmenting network lifetime for heterogenous WSN assisted IoT using mobile agent. Wireless Networks, 26, 5965\u20135979. https:\/\/doi.org\/10.1007\/s11276-020-02422-z","journal-title":"Wireless Networks"},{"key":"11566_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/3330168","volume":"2022","author":"A Forestiero","year":"2022","unstructured":"Forestiero, A., Hussain, S., Sami, A., Thasin, A., & Saad, R. M. A. (2022). AI-enabled ant-routing protocol to secure communication in flying networks. Applied Computational Intelligence and Soft Computing, 2022, 1\u20139. https:\/\/doi.org\/10.1155\/2022\/3330168","journal-title":"Applied Computational Intelligence and Soft Computing"},{"key":"11566_CR20","doi-asserted-by":"crossref","unstructured":"Vimal, V., & Nigam, M.J., (2017). Plummeting Flood Based Distributed-DoS Attack to Upsurge Networks Performance in Ad-Hoc networks Using Neighborhood Table Technique. IEEE Region 10 Conference (TENCON), Nov 5\u20138, pp.139\u2013144","DOI":"10.1109\/TENCON.2017.8227851"},{"issue":"15","key":"11566_CR21","doi-asserted-by":"publisher","first-page":"2324","DOI":"10.3390\/electronics11152324","volume":"11","author":"M Hanif","year":"2022","unstructured":"Hanif, M., Ashraf, H., Jalil, Z., Jhanjhi, N. Z., Humayun, M., Saeed, S., & Almuhaideb, A. M. (2022). AI-based wormhole attack detection techniques in wireless sensor networks. Electronics, 11(15), 2324. https:\/\/doi.org\/10.3390\/electronics11152324","journal-title":"Electronics"},{"issue":"1","key":"11566_CR22","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1515\/comp-2022-0245","volume":"12","author":"C Gupta","year":"2022","unstructured":"Gupta, C., Singh, L., & Tiwari, R. (2022). Wormhole attack detection techniques in ad-hoc network: A systematic review. Open Computer Science, 12(1), 260\u2013288. https:\/\/doi.org\/10.1515\/comp-2022-0245","journal-title":"Open Computer Science"},{"issue":"2021","key":"11566_CR23","first-page":"1","volume":"248","author":"M Angurala","year":"2021","unstructured":"Angurala, M., et al. (2021). A novel technique for energy replenishment and load balancing in wireless sensor networks. Optik Journal, 248(2021), 1\u201310.","journal-title":"Optik Journal"},{"issue":"4","key":"11566_CR24","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/j.eij.2021.03.002","volume":"22","author":"M Angurala","year":"2021","unstructured":"Angurala, M., et al. (2021). MRCRLB technique on modulation schemes in wireless rechargeable sensor networks. Egyptian Informatics Journal ISSN, 22(4), 473\u2013478. https:\/\/doi.org\/10.1016\/j.eij.2021.03.002","journal-title":"Egyptian Informatics Journal ISSN"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11566-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11566-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11566-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T12:20:46Z","timestamp":1728476446000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11566-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,26]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["11566"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11566-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2024,9,26]]},"assertion":[{"value":"2 September 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}