{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:35:15Z","timestamp":1742988915234,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030061609"},{"type":"electronic","value":"9783030061616"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-06161-6_64","type":"book-chapter","created":{"date-parts":[[2019,1,14]],"date-time":"2019-01-14T19:47:15Z","timestamp":1547495235000},"page":"656-664","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Misbehavior Constraint MAC Protocol (MC-MAC) for Wireless Networks"],"prefix":"10.1007","author":[{"given":"Yupeng","family":"Ma","sequence":"first","affiliation":[]},{"given":"Yonggang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhizhong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Haixing","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,15]]},"reference":[{"key":"64_CR1","doi-asserted-by":"crossref","unstructured":"Diwanji, H., Shah, J.: Effect of MAC layer protocol in building trust and reputation scheme in mobile ad hoc network. In: 2013 Nirma University International Conference on Engineering (NUiCONE), p. 1C3 (2013)","DOI":"10.1109\/NUiCONE.2013.6780091"},{"key":"64_CR2","unstructured":"Han M.K. Qiu, L.: Greedy receivers in IEEE 802.11 hotspots: impacts and detection. IEEE Trans. Dependable Secur. Comput. 7(4), 410\u2013423 (2010)"},{"key":"64_CR3","doi-asserted-by":"crossref","unstructured":"Nagarjun, P., Kumar, V., Kumar, C., Ravi, A.: Simulation and analysis of RTS\/CTS DoS attack variants in 802.11 networks. In: 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, pp. 258\u2013263 (2013)","DOI":"10.1109\/ICPRIME.2013.6496483"},{"key":"64_CR4","unstructured":"Alocious, C., Xiao, H., Christianson, B.: Analysis of dos attacks at mac layer in mobile adhoc networks. In: Wireless Communications and Mobile Computing Conference (IWCMC), 2015 International, pp. 811\u2013816 (2015)"},{"key":"64_CR5","unstructured":"Kyasanur, P., Vaidya, N.H.: Detection and handling of MAC layer misbehavior in wireless networks. In: Proceedings of the IEEE International Conference on Dependable Systems and Networks (DSN 03), pp. 173\u2013182 (2003)"},{"key":"64_CR6","doi-asserted-by":"crossref","unstructured":"Szott, S., Natkaniec, M., Canonico, R., Pach, A.R.: Impact of contention window cheating on single-hop. In: IEEE 802.11e MANETs, Proceedings of the IEEE Wireless Communication and Networking Conference on (WCNC 08), pp. 1356\u20131361 (2008)","DOI":"10.1109\/WCNC.2008.244"},{"issue":"8","key":"64_CR7","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1109\/TMC.2011.164","volume":"11","author":"Z Lu","year":"2012","unstructured":"Lu, Z., Wang, W., Wang, C.: Modeling and evaluation of backoff misbehaving nodes in CSMA\/CA networks. IEEE Trans. Mob. Comput. 11(8), 1331\u20131344 (2012)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"7","key":"64_CR8","doi-asserted-by":"publisher","first-page":"1728","DOI":"10.1109\/TMC.2015.2478436","volume":"15","author":"P Patras","year":"2013","unstructured":"Patras, P., et al.: Policing 802.11 MAC misbehaviours. IEEE Trans. Mob. Comput. 15(7), 1728\u20131742 (2013)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"64_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lazos, L.: Countering selfish misbehavior in multi-channel MAC protocols. In: Proceedings - IEEE INFOCOM12.11, pp. 2787\u20132795 (2013)","DOI":"10.1109\/INFCOM.2013.6567088"},{"key":"64_CR10","doi-asserted-by":"crossref","unstructured":"Cao, X., et al.: A two-step selfish misbehavior detector for IEEE 802.11-based Ad Hoc networks. In: IEEE Global Communications Conference on IEEE, pp. 1\u20136 (2015)","DOI":"10.1109\/GLOCOM.2015.7417822"},{"issue":"5","key":"64_CR11","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1109\/TMC.2005.71","volume":"4","author":"P. Kyasanur","year":"2005","unstructured":"Kyasanur, P., Vaidya, N.H.: Selfish MAC layer misbehavior in wireless networks. IEEE Trans. Mob. Comput. 4(5), 502\u2013516 (2005)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"64_CR12","unstructured":"Knuth, D.E.: The Art of Computer Programming, chapter 3, vol. 2, 3rd edn., pp. 10\u201317. Addison-Wesley, Boston (2000)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-06161-6_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T01:16:17Z","timestamp":1558401377000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-06161-6_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030061609","9783030061616"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-06161-6_64","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ChinaCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Communications and Networking in China","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chengdu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"chinacom2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/chinacom.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}