Skip to main content

2020 | OriginalPaper | Buchkapitel

On the Secure Routing Protocols, Selfishness Mitigation, and Trust in Mobile Ad Hoc Networks

verfasst von : Uttam Ghosh, Pushpita Chatterjee, Al-Sakib Khan Pathan

Erschienen in: Combating Security Challenges in the Age of Big Data

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the era of big data, the data are produced by numerous sources. Though, Mobile Ad hoc Network (MANET) would not be directly related to big data technology, there are at least two issues that relate MANET with big data scenario which are: (i) collecting reliable data securely from MANET (ii) obtaining meaningful data from the huge data sets and transmission of that securely through MANET. This is why it is needed to talk about the secure routing protocols in MANET as in some way; such network setting also would be related to contributing to the big data environment. The intent of this chapter is to present a survey on the secure routing protocols in MANET.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Perkins C, Royer EB, Das S (2003) Ad hoc on demand distance vector (aodv) routing. IETF RFC 3561 Perkins C, Royer EB, Das S (2003) Ad hoc on demand distance vector (aodv) routing. IETF RFC 3561
2.
Zurück zum Zitat Hu YC, Perrig A, Johnson D (2004) The dynamic source routing protocol for mobile ad hoc networks (dsr), draft-ietf-manet-dsr-10.txt Hu YC, Perrig A, Johnson D (2004) The dynamic source routing protocol for mobile ad hoc networks (dsr), draft-ietf-manet-dsr-10.txt
3.
Zurück zum Zitat Perkins EC, Bhagwat P (1994) Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. Proc ACM SIGCOMM 24:234–244CrossRef Perkins EC, Bhagwat P (1994) Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. Proc ACM SIGCOMM 24:234–244CrossRef
4.
Zurück zum Zitat Haas Z, Pearlman M (1998) The performance of query control schemes for the zone routing protocol. Proc ACM SIGCOMM:167–177CrossRef Haas Z, Pearlman M (1998) The performance of query control schemes for the zone routing protocol. Proc ACM SIGCOMM:167–177CrossRef
5.
Zurück zum Zitat Hu YC, Perrig A, JohnsonDB (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. In: Proceedings of the 8th ACM MOBICOM 2002, September 2002 Hu YC, Perrig A, JohnsonDB (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. In: Proceedings of the 8th ACM MOBICOM 2002, September 2002
6.
Zurück zum Zitat Papadimitratos P, Haas ZJ (2002) Secure routing for mobile ad hoc networks. In: Proceedings of SCS communication networks and distributed systems modeling and simulation conference (CNDS 2002), pp 1–12 Papadimitratos P, Haas ZJ (2002) Secure routing for mobile ad hoc networks. In: Proceedings of SCS communication networks and distributed systems modeling and simulation conference (CNDS 2002), pp 1–12
7.
Zurück zum Zitat Papadimitratos P, Haas Z (2003) Secure message transmission in mobile ad hoc networks. Elsevier Ad Hoc Netw J 1:193–209CrossRef Papadimitratos P, Haas Z (2003) Secure message transmission in mobile ad hoc networks. Elsevier Ad Hoc Netw J 1:193–209CrossRef
8.
Zurück zum Zitat Sanzgiri K, Dahill B, Levine B, Shields C, Royer EB (2002) A secure routing protocol for ad hoc networks. In: Proceedings of 10th IEEE ICNP 2002, pp 78–87 Sanzgiri K, Dahill B, Levine B, Shields C, Royer EB (2002) A secure routing protocol for ad hoc networks. In: Proceedings of 10th IEEE ICNP 2002, pp 78–87
9.
Zurück zum Zitat Zapata MG, Asokan N (2002) Securing ad hoc routing protocols. In: Proceedings of the ACM WiSe, pp 1–10 Zapata MG, Asokan N (2002) Securing ad hoc routing protocols. In: Proceedings of the ACM WiSe, pp 1–10
11.
Zurück zum Zitat Pathan A-SK (2014, Inderscience Publishers) On the Boundaries of Trust and Security in Computing and Communications Systems. Int J Trust Manag Comput Commun 2(1):1–6MathSciNetCrossRef Pathan A-SK (2014, Inderscience Publishers) On the Boundaries of Trust and Security in Computing and Communications Systems. Int J Trust Manag Comput Commun 2(1):1–6MathSciNetCrossRef
12.
Zurück zum Zitat Ghosh U, Datta R (2014) Sdrp: secure and dynamic routing protocol for mobile adhoc networks. IET Netw 3(3):235–243CrossRef Ghosh U, Datta R (2014) Sdrp: secure and dynamic routing protocol for mobile adhoc networks. IET Netw 3(3):235–243CrossRef
13.
Zurück zum Zitat Ghosh U, Datta R (2011) Identity based secure aodv and tcp for mobile ad hoc networks. In: Proceedings of the 1st international conference on wireless Technologies for Humanitarian Relief, ACM, pp 339–346CrossRef Ghosh U, Datta R (2011) Identity based secure aodv and tcp for mobile ad hoc networks. In: Proceedings of the 1st international conference on wireless Technologies for Humanitarian Relief, ACM, pp 339–346CrossRef
14.
Zurück zum Zitat Hu Y-C, Perrig A, Johnson DB (2002) Sead: secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE WMCSA 2002, pp 3–13 Hu Y-C, Perrig A, Johnson DB (2002) Sead: secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE WMCSA 2002, pp 3–13
15.
Zurück zum Zitat Zhao S, Aggarwal A, Liu S, Wu H (2008) A secure routing protocol in proactive security approach for mobile Ad-Hoc networks. In: 2008 IEEE wireless communications and networking conference, 31 March–3 April 2008 Zhao S, Aggarwal A, Liu S, Wu H (2008) A secure routing protocol in proactive security approach for mobile Ad-Hoc networks. In: 2008 IEEE wireless communications and networking conference, 31 March–3 April 2008
16.
Zurück zum Zitat Papadimitratos P, Haas Z (2003) Secure link state routing for mobile ad hoc networks. In: Proceedings of the IEEE workshop on security and Assurance in Ad Hoc networks, pp 27–31 Papadimitratos P, Haas Z (2003) Secure link state routing for mobile ad hoc networks. In: Proceedings of the IEEE workshop on security and Assurance in Ad Hoc networks, pp 27–31
17.
Zurück zum Zitat Buchegger S, Boudec J (2002) Performance analysis of the confidant protocol cooperation of nodes fairness in dynamic ad-hoc networks. In: Proceedings of ACM MOBIHOC 2002, pp 226–236 Buchegger S, Boudec J (2002) Performance analysis of the confidant protocol cooperation of nodes fairness in dynamic ad-hoc networks. In: Proceedings of ACM MOBIHOC 2002, pp 226–236
18.
Zurück zum Zitat Buchegger S, Boudec JYL (2003) The effect of rumour spreading in reputation systems for mobile ad-hoc networks. In: Proceedings of WiOpt03, March 2003 Buchegger S, Boudec JYL (2003) The effect of rumour spreading in reputation systems for mobile ad-hoc networks. In: Proceedings of WiOpt03, March 2003
19.
Zurück zum Zitat Buchegger S, Boudec JYL (2003) Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks. Technical report IC/2003/31, Ecole Polytechnique Federale de Lausanne, May 2003 Buchegger S, Boudec JYL (2003) Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks. Technical report IC/2003/31, Ecole Polytechnique Federale de Lausanne, May 2003
20.
Zurück zum Zitat Buchegger S, Boudec J (2004) A robust reputation system for p2p and mobile ad-hoc networks. In: Second workshop on the economics of peer-to-peer systems, June 2004 Buchegger S, Boudec J (2004) A robust reputation system for p2p and mobile ad-hoc networks. In: Second workshop on the economics of peer-to-peer systems, June 2004
21.
Zurück zum Zitat Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of CMS 2002, pp 107–121CrossRef Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of CMS 2002, pp 107–121CrossRef
22.
Zurück zum Zitat Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of 6th ACM MOBICOM 2000, pp 255–265 Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of 6th ACM MOBICOM 2000, pp 255–265
23.
Zurück zum Zitat Marias G, Georgiadis P, Flitzanis D, Mandalas K (2006) Cooperation enforcement schemes for manets: a survey. Wiley’s J Wirel Commun Mobile Comput 6:319–332CrossRef Marias G, Georgiadis P, Flitzanis D, Mandalas K (2006) Cooperation enforcement schemes for manets: a survey. Wiley’s J Wirel Commun Mobile Comput 6:319–332CrossRef
24.
Zurück zum Zitat Bansal S, Baker M (2003) Observation-based cooperation enforcement in ad-hoc networks. Techical Report, Stanford University Bansal S, Baker M (2003) Observation-based cooperation enforcement in ad-hoc networks. Techical Report, Stanford University
25.
Zurück zum Zitat He Q, Wu D, Khosla P (2004) Sori: a secure and objective reputation based incentive scheme for ad-hoc networks. In: Proceedings of IEEE WCNC 2004, vol. 2, pp 825–830 He Q, Wu D, Khosla P (2004) Sori: a secure and objective reputation based incentive scheme for ad-hoc networks. In: Proceedings of IEEE WCNC 2004, vol. 2, pp 825–830
26.
Zurück zum Zitat Dewan P, Dasgupta P, Bhattacharya A (2004) On using reputations in ad hoc networks to counter malicious nodes. In: Proceedings of tenth international conference on parallel and distributed systems ICPADS 2004, pp 665–672 Dewan P, Dasgupta P, Bhattacharya A (2004) On using reputations in ad hoc networks to counter malicious nodes. In: Proceedings of tenth international conference on parallel and distributed systems ICPADS 2004, pp 665–672
27.
Zurück zum Zitat Zhong S, Chen J, Yang YR (2003) Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of IEEE INFOCOM 2003, pp 1987–1997 Zhong S, Chen J, Yang YR (2003) Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of IEEE INFOCOM 2003, pp 1987–1997
28.
Zurück zum Zitat Y. H, M. X, and L. S (2002) Self-organized network-layer security in mobile ad hoc networks. In: Proceedings of ACM WiSe 2002, pp 11–20, September 2002 Y. H, M. X, and L. S (2002) Self-organized network-layer security in mobile ad hoc networks. In: Proceedings of ACM WiSe 2002, pp 11–20, September 2002
29.
Zurück zum Zitat Anderegg L, Eidenbenz S (2003) Ad hoc-vcg: a truthful and cost efficient routing protocol for mobile ad hoc networks with selfish agents. In: Proceedings of MOBICOM 2003, pp. 245–259 Anderegg L, Eidenbenz S (2003) Ad hoc-vcg: a truthful and cost efficient routing protocol for mobile ad hoc networks with selfish agents. In: Proceedings of MOBICOM 2003, pp. 245–259
30.
Zurück zum Zitat Nekkanti RK, Lee C (2004) Trust-based adaptive on demand ad hoc routing protocol. In: Proceedings of 42th annual ACM southeast regional conference, pp 88–93 Nekkanti RK, Lee C (2004) Trust-based adaptive on demand ad hoc routing protocol. In: Proceedings of 42th annual ACM southeast regional conference, pp 88–93
31.
Zurück zum Zitat Pirzada AA, McDonald C (2004) Establishing trust in pure ad-hoc networks. In: Proceedings of 27th conference on Australasian computer science CRPIT 2004, pp 47–54 Pirzada AA, McDonald C (2004) Establishing trust in pure ad-hoc networks. In: Proceedings of 27th conference on Australasian computer science CRPIT 2004, pp 47–54
32.
Zurück zum Zitat Ghosh T, Pissinou N, Makki K (2004) Collaborative trust-based routing in multi-hop ad hoc networks. In: Proceedings of 3rd International IFIPTC06 Networking Conference, pp 1446–1451, Lecture Notes in Computer Science, May 2004 Ghosh T, Pissinou N, Makki K (2004) Collaborative trust-based routing in multi-hop ad hoc networks. In: Proceedings of 3rd International IFIPTC06 Networking Conference, pp 1446–1451, Lecture Notes in Computer Science, May 2004
33.
Zurück zum Zitat Ghosh T, Pissinou N, Makki K (2005) Towards designing a trust routing solution in mobile ad hoc networks. Mobile Netw Appl 10:985–995CrossRef Ghosh T, Pissinou N, Makki K (2005) Towards designing a trust routing solution in mobile ad hoc networks. Mobile Netw Appl 10:985–995CrossRef
34.
Zurück zum Zitat Zouridaki BL Mark MH, Thomas RK (2005) A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Proceedings of 3rd ACM workshop on security for Ad Hoc and sensor networks, pp 1–10 Zouridaki BL Mark MH, Thomas RK (2005) A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Proceedings of 3rd ACM workshop on security for Ad Hoc and sensor networks, pp 1–10
35.
Zurück zum Zitat Zouridaki BL, Mark MH, Thomas RK (2006) Robust cooperative trust establishment for manets. In: Proceedings of 4th ACM workshop on security of Ad Hoc and sensor networks, pp 23–34 Zouridaki BL, Mark MH, Thomas RK (2006) Robust cooperative trust establishment for manets. In: Proceedings of 4th ACM workshop on security of Ad Hoc and sensor networks, pp 23–34
36.
Zurück zum Zitat Ruidong L, Jie L, Peng L, Chen HH (2007) An objective trust management framework for mobile ad hoc networks. In: Proceedings of IEEE 65th vehicular technology conference 2007, pp 56–60 Ruidong L, Jie L, Peng L, Chen HH (2007) An objective trust management framework for mobile ad hoc networks. In: Proceedings of IEEE 65th vehicular technology conference 2007, pp 56–60
37.
Zurück zum Zitat Sun YL, Yu W, Han Z, Liu KJR (2006) Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE JSAC 24:305–317 Sun YL, Yu W, Han Z, Liu KJR (2006) Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE JSAC 24:305–317
38.
Zurück zum Zitat Abusalah L, Khokhar A, Guizani M (2008) A survey of secure mobile ad hoc routing protocols. IEEE Commun Surv Tutorials 19:78–93CrossRef Abusalah L, Khokhar A, Guizani M (2008) A survey of secure mobile ad hoc routing protocols. IEEE Commun Surv Tutorials 19:78–93CrossRef
39.
Zurück zum Zitat Balakrishnnan V, Varadharajan V, Tupakula UK, Lucs P (2007) Trust and recommendations in mobile ad hoc networks. In: Proceedings of 10th IEEE international conference on networking and services, pp 64–69 Balakrishnnan V, Varadharajan V, Tupakula UK, Lucs P (2007) Trust and recommendations in mobile ad hoc networks. In: Proceedings of 10th IEEE international conference on networking and services, pp 64–69
40.
Zurück zum Zitat Reidt S, Wolthusen SD, Balfe S (2009) Robust and efficient communication overlays for trust authority computations. In: Proceedings of 32nd IEEE Sarnoff symposium 2009, pp 88–92 Reidt S, Wolthusen SD, Balfe S (2009) Robust and efficient communication overlays for trust authority computations. In: Proceedings of 32nd IEEE Sarnoff symposium 2009, pp 88–92
41.
Zurück zum Zitat Wang X, Liu L, Su J (2010) Rlm: a general model for trust representation and aggregation. IEEE Trans Serv Comput 5:131–143CrossRef Wang X, Liu L, Su J (2010) Rlm: a general model for trust representation and aggregation. IEEE Trans Serv Comput 5:131–143CrossRef
42.
Zurück zum Zitat Weimerskirch A, Thonet G (2001) A distributed light-weight authentication model for ad-hoc networks. In: Proceedings of 4th international conference on information security and cryptology, pp 77–82 Weimerskirch A, Thonet G (2001) A distributed light-weight authentication model for ad-hoc networks. In: Proceedings of 4th international conference on information security and cryptology, pp 77–82
43.
Zurück zum Zitat Verma RRS, O’Mahony D, Tewari H (2001) Ntm – progressive trust negotiation in ad hoc networks. In: Proceedings of 1st joint IEI/IEE symposium on telecommunications Systems Research Verma RRS, O’Mahony D, Tewari H (2001) Ntm – progressive trust negotiation in ad hoc networks. In: Proceedings of 1st joint IEI/IEE symposium on telecommunications Systems Research
44.
Zurück zum Zitat Pirzada AA, McDonald C, Datta A (2006) Performance comparison of trust-based reactive routing protocols. IEEE Trans Mobile Comput 5:695–710CrossRef Pirzada AA, McDonald C, Datta A (2006) Performance comparison of trust-based reactive routing protocols. IEEE Trans Mobile Comput 5:695–710CrossRef
45.
Zurück zum Zitat Ngai ECH, Lyu MR (2004) Trust and clustering-based authentication services in mobile ad hoc network. In: Proceedings of 24th IEEE ICDCS workshops, pp 582–587 Ngai ECH, Lyu MR (2004) Trust and clustering-based authentication services in mobile ad hoc network. In: Proceedings of 24th IEEE ICDCS workshops, pp 582–587
46.
Zurück zum Zitat Hegland A, Winjum E, Mjolsnes SF, Rong C, Kure O, Spilling P (2006) A survey of key management in ad hoc networks. IEEE Commun Surv Tutorials 8:48–66CrossRef Hegland A, Winjum E, Mjolsnes SF, Rong C, Kure O, Spilling P (2006) A survey of key management in ad hoc networks. IEEE Commun Surv Tutorials 8:48–66CrossRef
47.
Zurück zum Zitat Virendra M, Jadliwala M, Chandrasekaran M, Upadhyaya S (2005) Quantifying trust in mobile ad hoc networks. Proc IEEE KIMAS 2005:65–71 Virendra M, Jadliwala M, Chandrasekaran M, Upadhyaya S (2005) Quantifying trust in mobile ad hoc networks. Proc IEEE KIMAS 2005:65–71
48.
Zurück zum Zitat Li R, Li J, Liu P, Chen HH (2006) On demand public key management for mobile ad hoc networks. Wiley WCMC 6:295–306 Li R, Li J, Liu P, Chen HH (2006) On demand public key management for mobile ad hoc networks. Wiley WCMC 6:295–306
49.
Zurück zum Zitat Chang BJ, Kuo SL (2009) Markov chain trust model for trust value analysis and key management in distributed multicast manets. IEEE Trans Veh Technol 58:1846–1863CrossRef Chang BJ, Kuo SL (2009) Markov chain trust model for trust value analysis and key management in distributed multicast manets. IEEE Trans Veh Technol 58:1846–1863CrossRef
50.
Zurück zum Zitat Yan Z, Prehofer C, (2010) Autonomic trust management for a component based software system. In: IEEE transactions on dependable and secure computing, accepted on April 2010 Yan Z, Prehofer C, (2010) Autonomic trust management for a component based software system. In: IEEE transactions on dependable and secure computing, accepted on April 2010
51.
Zurück zum Zitat Jiang T, Baras JS (2004) Ant-based adaptive trust evidence distribution in manet. In: Proceedings of 2nd international conference on mobile distributed computing systems workshops, pp 588–593 Jiang T, Baras JS (2004) Ant-based adaptive trust evidence distribution in manet. In: Proceedings of 2nd international conference on mobile distributed computing systems workshops, pp 588–593
52.
Zurück zum Zitat Jiang T, Baras JS (2004) Cooperative games, phase transition on graphs and distributed trust in manets. In: Proceedings of 43th IEEE conference on decision and control, pp. 93–98 Jiang T, Baras JS (2004) Cooperative games, phase transition on graphs and distributed trust in manets. In: Proceedings of 43th IEEE conference on decision and control, pp. 93–98
53.
Zurück zum Zitat Theodorakopoulos G, Baras JS (2006) On trust models and trust evaluation metrics for ad hoc networks. IEEE JSAC 24:318–328 Theodorakopoulos G, Baras JS (2006) On trust models and trust evaluation metrics for ad hoc networks. IEEE JSAC 24:318–328
54.
Zurück zum Zitat Boukerche A, Ren Y (2008) A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks. In: Proceedings of international workshop on modeling analysis and simulation of wireless and Mobile systems, pp 88–95 Boukerche A, Ren Y (2008) A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks. In: Proceedings of international workshop on modeling analysis and simulation of wireless and Mobile systems, pp 88–95
55.
Zurück zum Zitat Cho JH, Swami A, Chen IR (2009) Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks. In: Proceedings international conference on computational science and engineering, pp 641–650, Springer LNCS, August 29–31 2009 Cho JH, Swami A, Chen IR (2009) Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks. In: Proceedings international conference on computational science and engineering, pp 641–650, Springer LNCS, August 29–31 2009
56.
Zurück zum Zitat Chatterjee P, Ghosh U, Sengupta I, Ghosh SK (2014) A trust enhanced secure clustering framework for wireless ad hoc networks. Springer Wirel Netw 20(7):1669–1684CrossRef Chatterjee P, Ghosh U, Sengupta I, Ghosh SK (2014) A trust enhanced secure clustering framework for wireless ad hoc networks. Springer Wirel Netw 20(7):1669–1684CrossRef
Metadaten
Titel
On the Secure Routing Protocols, Selfishness Mitigation, and Trust in Mobile Ad Hoc Networks
verfasst von
Uttam Ghosh
Pushpita Chatterjee
Al-Sakib Khan Pathan
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-35642-2_5