{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:55:17Z","timestamp":1725468917499},"publisher-location":"Boston, MA","reference-count":22,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387231488"},{"type":"electronic","value":"9780387231501"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/0-387-23150-1_20","type":"book-chapter","created":{"date-parts":[[2006,1,3]],"date-time":"2006-01-03T09:08:53Z","timestamp":1136279333000},"page":"227-238","source":"Crossref","is-referenced-by-count":0,"title":["Collaboration Enforcement and Adaptive Data Redirection in Mobile Ad Hoc Networks Using Only First-Hand Experience"],"prefix":"10.1007","author":[{"given":"Ning","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Kien A.","family":"Hua","sequence":"additional","affiliation":[]},{"given":"Mounir A.","family":"Tantaoui","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"B. Awerbuch, D. Holmer, C. Nita-Rotaru and H. Rubens. An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. ACM Workshop on Wireless Security (WiSe) 2002.","DOI":"10.1145\/570681.570684"},{"key":"20_CR2","unstructured":"S. Buchegger and J. L. Boudec, IBM Research Report: The Selfish Node: Increasing Routing Security in Mobile Ad Hoc Networks. RR 3354, 2001."},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"S. Buchegger and J. L. Boudec. Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes \u2014 Fairness In Dynamic Ad Hoc Networks. In Proceedings of IEEE\/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH, June 2002.","DOI":"10.1145\/513800.513828"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"S. Buchegger, H. L. Boudec, Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks. EPFL Technical Report IC\/2003\/31.","DOI":"10.1201\/9780203504086.ch20"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"L. Buttyan and J. Hubaux. Enforcing Service Availability in Mobile Ad Hoc WANs. In Proceedings of IEEE\/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, MA, USA, August 2000.","DOI":"10.1109\/MOBHOC.2000.869216"},{"key":"20_CR6","unstructured":"L. Buttyan and J. Hubaux. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. Technical Report DSC\/2001\/046, EPFL-DI-ICA, August 2001."},{"key":"20_CR7","unstructured":"Stephan Eidenbenz and Luzi Anderegg, Ad hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents. In Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking (MobiCom 2003), September 2003."},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Y. Hu, A. Perrig, and D. B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Technical Report TR01-383, Department of Computer Science, Rice University, December 2001.","DOI":"10.1145\/570645.570648"},{"key":"20_CR9","volume-title":"Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002)","author":"Y. Hu","year":"2002","unstructured":"Y. Hu, D. B. Johnson and A. Perrig. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless AdHoc Networks. In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002). IEEE, Calicoon, NY, June 2002."},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"J. Hubaux, L. Buttyan, and S. Capkun. The Quest for Security in Mobile Ad Hoc Networks. In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) 2001.","DOI":"10.1145\/501416.501437"},{"key":"20_CR11","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/978-0-585-29603-6_5","volume-title":"Mobile Computing","author":"D. Johnson","year":"1996","unstructured":"D. Johnson and D. A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In T. Imielinski and H. F. Korth, editors, Mobile Computing, pages 153\u2013181. Kluwer Academic Publishers, Dordrecht, The Netherlands, 1996."},{"key":"20_CR12","unstructured":"V. K\u00e4rpijoki, Security in Ad Hoc Networks. In Proceedings of the Helsinki University of Technology, Seminar on Network Security, 2000."},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"S. Marti, T.J. Giuli, K. Lai, and M. Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In Proceedings of MOBICOM 2000, pages 255\u2013265, 2000.","DOI":"10.1145\/345910.345955"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"P. Michiardi and R. Molva. CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. Sixth IFIP Conference on Security Communications and Multimedia (CMS 2002), Portoroz, Slovenia, 2002.","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"20_CR15","unstructured":"P. Michiardi and R. Molva. Prevention of Denial of Service Attacks and Selfishness in Mobile Ad Hoc Networks. Research Report No RR-02-63. January 2002."},{"key":"20_CR16","unstructured":"P. Michiardi, R. Molva. Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks. European Wireless Conference, 2002."},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"X. Zeng, R. Bagrodia, and M. Gerla. GloMoSim: A library for parallel simulation of large-scale wireless networks. Proceedings of the 12th Workshop on Parallel and Distributed Simulations (PADS\u2019 98), May 26\u201329, in Banff, Alberta, Canada, 1998.","DOI":"10.1145\/278009.278027"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Y. Zhang and W. Lee. Intrusion Detection in Wireless Ad Hoc Networks. In Proceedings of MOBICOM 2000, pages 275\u2013283, 2000.","DOI":"10.1145\/345910.345958"},{"key":"20_CR19","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L. Zhou","year":"1999","unstructured":"L. Zhou and Z. Haas. Securing Ad Hoc Networks. In IEEE Network magazine, special issue on networking security, Vol. 13, No. 6, November\/December, pages 24\u201330, 1999.","journal-title":"IEEE Network magazine, special issue on networking security"},{"key":"20_CR20","unstructured":"Sheng Zhong, Jiang Chen, Yang Richard Yang, Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc networks. IEEE INFOCOM 2003."},{"key":"20_CR21","unstructured":"ANSI\/IEEE Standard 802.11, 1999 Edition. 1999. http:\/\/standards.ieee.org\/catalog\/olis\/lanman.html."},{"key":"20_CR22","unstructured":"Information Technology Laboratory, National Institute of Standards and Technology. The Keyed-Hash Message Authentication Code (HMAC)."}],"container-title":["IFIP International Federation for Information Processing","Mobile and Wireless Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-23150-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T22:05:15Z","timestamp":1683324315000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-23150-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9780387231488","9780387231501"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/0-387-23150-1_20","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2005]]}}}