{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T00:51:56Z","timestamp":1771980716038,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030150341","type":"print"},{"value":"9783030150358","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-15035-8_63","type":"book-chapter","created":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T12:30:46Z","timestamp":1552566646000},"page":"651-661","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Machine Learning Based Approach to Detect Wormhole Attack in VANETs"],"prefix":"10.1007","author":[{"given":"Pranav Kumar","family":"Singh","sequence":"first","affiliation":[]},{"given":"Rahul Raj","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Sunit Kumar","family":"Nandi","sequence":"additional","affiliation":[]},{"given":"Sukumar","family":"Nandi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,15]]},"reference":[{"key":"63_CR1","doi-asserted-by":"crossref","unstructured":"Albouq, S.S., Fredericks, E.M.: Detection and avoidance of wormhole attacks in connected vehicles. In: Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, pp. 107\u2013116. ACM (2017)","DOI":"10.1145\/3132340.3132346"},{"issue":"3","key":"63_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.3390\/computers5030016","volume":"5","author":"KM Ali Alheeti","year":"2016","unstructured":"Ali Alheeti, K.M., Gruebler, A., McDonald-Maier, K.: Intelligent intrusion detection of grey hole and rushing attacks in self-driving vehicular networks. Computers 5(3), 16 (2016)","journal-title":"Computers"},{"issue":"3","key":"63_CR3","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/00031305.1992.10475879","volume":"46","author":"NS Altman","year":"1992","unstructured":"Altman, N.S.: An introduction to kernel and nearest-neighbor nonparametric regression. Am. Stat. 46(3), 175\u2013185 (1992)","journal-title":"Am. Stat."},{"issue":"1\u20134","key":"63_CR4","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2005.1610547","volume":"7","author":"PG Argyroudis","year":"2005","unstructured":"Argyroudis, P.G., O\u2019mahony, D.: Secure routing for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 7(1\u20134), 2\u201321 (2005)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"6","key":"63_CR5","doi-asserted-by":"publisher","first-page":"1971","DOI":"10.1016\/j.jnca.2011.06.010","volume":"34","author":"M Bakhouya","year":"2011","unstructured":"Bakhouya, M., Gaber, J., Lorenz, P.: An adaptive approach for information dissemination in vehicular ad hoc networks. J. Netw. Comput. Appl. 34(6), 1971\u20131978 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"63_CR6","unstructured":"Behrisch, M., Bieker, L., Erdmann, J., Krajzewicz, D.: SUMO\u2013simulation of urban mobility. In: The Third International Conference on Advances in System Simulation (SIMUL 2011), Barcelona, Spain, vol. 42 (2011)"},{"issue":"3","key":"63_CR7","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"key":"63_CR8","doi-asserted-by":"crossref","unstructured":"Grover, J., Prajapati, N.K., Laxmi, V., Gaur, M.S.: Machine learning approach for multiple misbehavior detection in VANET. In: International Conference on Advances in Computing and Communications, pp. 644\u2013653. Springer (2011)","DOI":"10.1007\/978-3-642-22720-2_68"},{"issue":"Mar","key":"63_CR9","first-page":"1157","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3(Mar), 1157\u20131182 (2003)","journal-title":"J. Mach. Learn. Res."},{"issue":"14","key":"63_CR10","first-page":"527","volume":"14","author":"TR Henderson","year":"2008","unstructured":"Henderson, T.R., Lacage, M., Riley, G.F., Dowell, C., Kopena, J.: Network simulations with the ns-3 simulator. SIGCOMM Demonstr. 14(14), 527 (2008)","journal-title":"SIGCOMM Demonstr."},{"key":"63_CR11","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, INFOCOM 2003. IEEE Societies, vol. 3, pp. 1976\u20131986 IEEE (2003)"},{"issue":"2","key":"63_CR12","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/JSAC.2005.861394","volume":"24","author":"YC Hu","year":"2006","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370\u2013380 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"63_CR13","unstructured":"IEEE Std.: IEEE standard for information technology\u2013 local and metropolitan area networks \u2013 specific requirements\u2013 Part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications amendment 6: wireless access in vehicular environments, pp. 1\u201351, July 2010"},{"key":"63_CR14","first-page":"139","volume":"5","author":"DB Johnson","year":"2001","unstructured":"Johnson, D.B., Maltz, D.A., Broch, J., et al.: DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. Ad Hoc Netw. 5, 139\u2013172 (2001)","journal-title":"Ad Hoc Netw."},{"issue":"6","key":"63_CR15","doi-asserted-by":"publisher","first-page":"e0155781","DOI":"10.1371\/journal.pone.0155781","volume":"11","author":"MJ Kang","year":"2016","unstructured":"Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PloS One 11(6), e0155781 (2016)","journal-title":"PloS One"},{"issue":"13","key":"63_CR16","doi-asserted-by":"publisher","first-page":"3750","DOI":"10.1016\/j.comnet.2007.04.001","volume":"51","author":"I Khalil","year":"2007","unstructured":"Khalil, I., Bagchi, S., Shroff, N.B.: Liteworp: detection and isolation of the wormhole attack in static multihop wireless networks. Comput. Netw. 51(13), 3750\u20133772 (2007)","journal-title":"Comput. Netw."},{"key":"63_CR17","doi-asserted-by":"publisher","first-page":"3491","DOI":"10.1109\/ACCESS.2017.2782159","volume":"6","author":"G Loukas","year":"2018","unstructured":"Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y., Gan, D.: Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access 6, 3491\u20133508 (2018)","journal-title":"IEEE Access"},{"key":"63_CR18","doi-asserted-by":"crossref","unstructured":"Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing. Technical report (2003)","DOI":"10.17487\/rfc3561"},{"key":"63_CR19","doi-asserted-by":"crossref","unstructured":"Singh, P.K., Dash, M.K., Mittal, P., Nandi, S.K., Nandi, S.: Misbehavior detection in C-ITS using deep learning approach. In: 18th International Conference on Intelligent Systems Design and Applications (ISDA). Springer (2018)","DOI":"10.1007\/978-3-030-16657-1_60"},{"key":"63_CR20","unstructured":"Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: 10th IEEE International Conference on Network Protocols, pp. 78\u201387. IEEE (2002)"},{"key":"63_CR21","first-page":"1","volume":"15","author":"PK Singh","year":"2018","unstructured":"Singh, P.K., Sharma, S., Nandi, S.K., Nandi, S.: Multipath TCP for V2I communication in SDN controlled small cell deployment of smart city. Veh. Commun. 15, 1\u201315 (2018)","journal-title":"Veh. Commun."},{"key":"63_CR22","doi-asserted-by":"crossref","unstructured":"Taylor, A., Leblanc, S., Japkowicz, N.: Anomaly detection in automobile control network data with long short-term memory networks. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 130\u2013139. IEEE (2016)","DOI":"10.1109\/DSAA.2016.20"}],"container-title":["Advances in Intelligent Systems and Computing","Web, Artificial Intelligence and Network Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-15035-8_63","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T20:12:40Z","timestamp":1721074360000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-15035-8_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030150341","9783030150358"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-15035-8_63","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WAINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Workshops of the International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Matsue","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 March 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"waina2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2019\/workshops.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}