{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:44:18Z","timestamp":1726037058546},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030231613"},{"type":"electronic","value":"9783030231620"}],"license":[{"start":{"date-parts":[[2019,7,11]],"date-time":"2019-07-11T00:00:00Z","timestamp":1562803200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-23162-0_39","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T04:12:15Z","timestamp":1562731935000},"page":"429-441","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Work-in-Progress: A Novel Approach to Detection and Avoid Sybil Attack in MANET"],"prefix":"10.1007","author":[{"given":"Anitha S.","family":"Sastry","sequence":"first","affiliation":[]},{"given":"Sadhana S.","family":"Chitlapalli","sequence":"additional","affiliation":[]},{"given":"S.","family":"Akhila","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"39_CR1","doi-asserted-by":"crossref","unstructured":"Douceur, J.R.: The Sybil attack. In International Workshop On Peer-To- Peer Systems, Mar 2002","DOI":"10.1007\/3-540-45748-8_24"},{"key":"39_CR2","unstructured":"Johnson, D., Maltz, D.: Dynamic source routing in ad hoc wireless networks. In: Mobile Computing, vol. 353. Kluwer Academic Publishers (1996)"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Hu, Y., Perrig, A., Johnson, D.: Ariadne: a secure on-demand routing protocol for ad hoc networks. In: Proceedings of International Conference on Mobile Computing and Networking, Sept 2002","DOI":"10.1145\/570646.570648"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of International Symposium on Information Processing in Sensor Networks (2004)","DOI":"10.1145\/984622.984660"},{"key":"39_CR5","unstructured":"Nadeem, A., Howarth, M.P.: A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Commun. Surv. Tutorials 1\u201319 (2012)"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of the third international symposium on Information processing in sensor networks. ACM, Berkeley, California, USA (2004)","DOI":"10.1145\/984622.984660"},{"key":"39_CR7","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"John R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The Sybil attack. Presented at the Revised Papers from the first International Workshop on Peer-to-Peer Systems, pp. 251\u2013260 (2002)"},{"issue":"2","key":"39_CR8","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1109\/JSYST.2012.2221912","volume":"7","author":"Sohail Abbas","year":"2013","unstructured":"Abbas, S., Merabti, M., Llewellyn Jones, D., Kifayat, K.: Lightweight Sybil attack detection in MANETs. IEEE Syst. J. 7(2) (June 2013)","journal-title":"IEEE Systems Journal"},{"key":"39_CR9","unstructured":"Kavitha, P., Keerthana, C., Niroja, V., Vivekanandhan, V.: Mobile-id based Sybil attack detection on the Mobile ADHOC Network. Int. Journal of Communication and Computer Technologies 2(2) (Mar 2014)"}],"container-title":["Lecture Notes in Networks and Systems","Cyber-physical Systems and Digital Twins"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23162-0_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T04:30:38Z","timestamp":1562733038000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-23162-0_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,11]]},"ISBN":["9783030231613","9783030231620"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23162-0_39","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2019,7,11]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"REV2019","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Remote Engineering and Virtual Instrumentation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Banglore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 February 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 February 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rev2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.rev-conference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}