{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:14:18Z","timestamp":1743023658599,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030736026"},{"type":"electronic","value":"9783030736033"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-73603-3_20","type":"book-chapter","created":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T06:04:19Z","timestamp":1617948259000},"page":"217-230","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Avoiding Wormhole Attack in MANET Using an Extending Network Knowledge"],"prefix":"10.1007","author":[{"given":"Hicham","family":"Zougagh","sequence":"first","affiliation":[]},{"given":"Noureddine","family":"Idboufker","sequence":"additional","affiliation":[]},{"given":"Yousef","family":"El Mourabit","sequence":"additional","affiliation":[]},{"given":"Yousef","family":"Saadi","sequence":"additional","affiliation":[]},{"given":"Samir","family":"Elouaham","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,10]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing. IETF RFC 3561 (2003)","DOI":"10.17487\/rfc3561"},{"key":"20_CR2","unstructured":"Johnson, D.B., Maltz, D.A., Hu, Y.-C.: The dynamic source routing protocol for mobile ad hoc networks (DSR). IETF Internet Draft, draft-ietf-manet-dsr-09 (2003)"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Clausen, T., Jaquet, P.: IETF RFC 3626 Optimized Link State Routing Protocol OLSR, October 2003","DOI":"10.17487\/rfc3626"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Bhagwat, P.: Highly dynamic destination-sequenced distance vector routing (DSDV) for mobile computers. In: Proceedings of the ACM SIGCOMM 1994, London, UK, pp. 234\u2013244, October 1994","DOI":"10.1145\/190809.190336"},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.cose.2009.09.005","volume":"29","author":"M-Y Su","year":"2010","unstructured":"Su, M.-Y.: WARP: a wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. Comput. Secur. 29, 208\u2013224 (2010)","journal-title":"Comput. Secur."},{"key":"20_CR6","doi-asserted-by":"publisher","first-page":"1179","DOI":"10.1016\/j.adhoc.2012.03.004","volume":"10","author":"R Stoleru","year":"2012","unstructured":"Stoleru, R., Wu, H., Chenji, H.: Secure neighbor discovery and wormhole localization in mobile ad hoc networks. Ad Hoc Netw. 10, 1179\u20131190 (2012)","journal-title":"Ad Hoc Netw."},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Xu, Y., Chen, G., Ford, J., Makedon, F.: Detecting wormhole attacks in wireless sensor networks. In: Goetz, E., Shenoi, S. (eds.) Critical Infrastructure Protection. IFIP International Federation for Information Processing, vol. 253, pp. 267\u2013279. Springer, Boston (2008)","DOI":"10.1007\/978-0-387-75462-8_19"},{"issue":"4","key":"20_CR8","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/MCOM.2008.4481351","volume":"46","author":"F Na\u00eft-Abdesselam","year":"2008","unstructured":"Na\u00eft-Abdesselam, F., Bensaouand, B., Taleb, T.: Detecting and avoiding wormhole attacks in wireless ad hoc networks. IEEE Commun. Mag. 46(4), 127\u2013133 (2008)","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"20_CR9","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1002\/wcm.292","volume":"6","author":"W Wang","year":"2006","unstructured":"Wang, W., Bhargava, B., Lu, Y., Wu, X.: Defending against wormhole attacks in mobile ad hoc networks. Wirel. Commun. Mob. Com. 6(4), 483\u2013503 (2006)","journal-title":"Wirel. Commun. Mob. Com."},{"issue":"2","key":"20_CR10","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/JSAC.2005.861382","volume":"24","author":"Y Zhang","year":"2006","unstructured":"Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2), 247\u2013260 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"20_CR11","unstructured":"Khalil, I., Bagchi, S., Shroff, N.B.: LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. In: Proceedings of the International Conference on Dependable Systems and Networks (DSN 2005), Yokohama, Japan, pp. 612\u2013621, June 2005"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Khalil, I., Bagchi, S., Shroff, N.B.: MobiWorp: mitigation of the wormhole attack in mobile multihop wireless networks. In: Proceedings of the IEEE Secure Communication, pp. 1\u201312, September 2006","DOI":"10.1109\/SECCOMW.2006.359564"},{"key":"20_CR13","unstructured":"Song, N., Qian, L., Li, X.: Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach. In: Proceedings of 19th IEEE International Parallel and Distributed Processing Symposium (IEEE IPDPS 2005), Denver, Colo, USA, p. 289, April 2005"},{"issue":"3","key":"20_CR14","first-page":"201","volume":"9","author":"J Singh","year":"2012","unstructured":"Singh, J., Kaur, L., Gupta, S.: A cross-layer based intrusion detection technique for wireless networks. Int. Arab J. Inf. Technol. 9(3), 201\u2013207 (2012)","journal-title":"Int. Arab J. Inf. Technol."},{"issue":"3","key":"20_CR15","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TMC.2014.2324572","volume":"14","author":"S Ji","year":"2015","unstructured":"Ji, S., Chen, T., Zhong, S.: Wormhole attack detection algorithms in wireless network coding systems. IEEE Trans. Mob. Comput. 14(3), 660\u2013674 (2015)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Biswas, J., Gupta, A., Singh, D.: WADP: a wormhole attack detection and prevention technique in MANET using modified AODV routing protocol. In: Proceedings of the 9th IEEE International Conference on Industrial and Information Systems (ICIIS 2014), pp. 1\u20136, December 2014","DOI":"10.1109\/ICIINFS.2014.7036535"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Patel, M., Aggarwal, A.: Two phase wormhole detection approach for dynamic wireless sensor networks. In: Proceedings of the IEEE International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET 2016), Chennai, India pp. 2109\u20132112, March 2016","DOI":"10.1109\/WiSPNET.2016.7566514"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Hu, Y., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1976\u20131986 (2003)","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Capkun, S., Buttyan, L., Hubaux, J.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: Proceedings of the First ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 21\u201332 (2003)","DOI":"10.1145\/986858.986862"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Cho, Y., Qu, G., Wu, Y.: Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks. In: Proceedings of the 1st IEEE Security and Privacy Workshops (SPW 2012), pp. 134\u2013141, May 2012","DOI":"10.1109\/SPW.2012.32"},{"key":"20_CR21","unstructured":"Liu, D., Ning, P., Du, W.: Attack-resistant location estimation in sensor networks. In: Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, pp. 99\u2013106 (2005)"},{"issue":"1","key":"20_CR22","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s11276-006-3723-x","volume":"13","author":"R Poovendran","year":"2007","unstructured":"Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Netw. 13(1), 27\u201359 (2007)","journal-title":"Wireless Netw."},{"key":"20_CR23","unstructured":"The Network Simulator. ns-2. http:\/\/www.isi.edu\/nsnam\/ns\/. Accessed 20 June 2020"}],"container-title":["Advances in Intelligent Systems and Computing","Innovations in Bio-Inspired Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-73603-3_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T23:15:35Z","timestamp":1724800535000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-73603-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030736026","9783030736033"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-73603-3_20","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IBICA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovations in Bio-Inspired Computing and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ibica2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/ibica20\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}