{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T02:10:02Z","timestamp":1746324602559,"version":"3.40.4"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319103525"},{"type":"electronic","value":"9783319103532"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10353-2_29","type":"book-chapter","created":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T16:19:46Z","timestamp":1406909986000},"page":"331-344","source":"Crossref","is-referenced-by-count":0,"title":["Power-Aware Architecture to Combat Intelligent Adaptive Attacks in Ad-Hoc Wireless Networks"],"prefix":"10.1007","author":[{"given":"Joseph","family":"Soryal","sequence":"first","affiliation":[]},{"given":"Fuad A.","family":"Alnajjar","sequence":"additional","affiliation":[]},{"given":"Tarek","family":"Saadawi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"http:\/\/tools.ietf.org\/html\/rfc4728"},{"issue":"10","key":"29_CR2","first-page":"70","volume":"40","author":"H. Deng","year":"2002","unstructured":"Deng, H., Li, W., Dharma, P.: Agrawal: Routing Security in Ad Hoc Networks. IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks\u00a040(10), 70\u201375 (2002)","journal-title":"IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks"},{"key":"29_CR3","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1186\/2192-1962-1-4","volume":"1","author":"Tseng","year":"2011","unstructured":"Tseng, et al.: A survey of black hole attacks in wireless mobile ad hoc networks. Human-centric Computing and Information Sciences\u00a01, 4 (2011)","journal-title":"Human-centric Computing and Information Sciences"},{"key":"29_CR4","unstructured":"Balakrishnan, K., Deng, J., Varshney, P.K.: TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks. In: Proc. IEEE Wireless Comm. and Networking Conf. (WCNC 2005) (March 2005)"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting Black-hole Attack in Mobile Ad Hoc Networks. Paper presented at the 5th European Personal Mobile Communications Conference, April 22-25, United Kingdom, Glasgow (2003)","DOI":"10.1049\/cp:20030303"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Tamilselvan, L., Sankaranarayanan, V.: Prevention of Blackhole Attack in MANET. Paper presented at the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, Sydney, Australia, August 27-30 (2007)","DOI":"10.1109\/AUSWIRELESS.2007.61"},{"issue":"6","key":"29_CR7","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1002\/wcm.493","volume":"8","author":"D. Djenouri","year":"2008","unstructured":"Djenouri, D., Badache, N.: Struggling Against Selfishness and Black Hole Attacks in MANETs. Wireless Communications & Mobile Computing\u00a08(6), 689\u2013704 (2008), doi:10.1002\/wcm.v8:6","journal-title":"Wireless Communications & Mobile Computing"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Kozma, W., Lazos, L.: REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits. Paper presented at the Second ACM Conference on Wireless Network Security, Zurich, Switzerland, March 16-18 (2009)","DOI":"10.1145\/1514274.1514290"},{"key":"29_CR9","unstructured":"Raj, P.N., Swadas, P.B.: DPRAODV: A Dynamic Learning System Against Blackhole Attack in AODV based MANET. International Journal of Computer Science\u00a02, 54\u201359 (2009), doi: abs\/0909.2371"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Jaisankar, N., Saravanan, R., Swamy, K.D.: A Novel Security Approach for Detecting Black Hole Attack in MANET. Paper presented at the International Conference on Recent Trends in Business Administration and Information Processing, Thiruvananthapuram, India, March 26-27 (2010)","DOI":"10.1007\/978-3-642-12214-9_36"},{"key":"29_CR11","unstructured":"Mistry, N., Jinwala, D.C., Iaeng, Zaveri, M.: Improving AODV Protocol Against Blackhole Attacks. Paper presented at the International MultiConference of Engineers and Computer Scientists, Hong Kong, March 17-19 (2010)"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Al-Shurman, M., Yoo, S.-M., Park, S.: Black Hole Attack in Mobile Ad Hoc Networks. Paper presented at the 42nd Annual ACM Southeast Regional Conference (ACM-SE 42), Huntsville, Alabama, April 2-3 (2004)","DOI":"10.1145\/986537.986560"},{"issue":"1","key":"29_CR13","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.comcom.2010.08.007","volume":"34","author":"M.-Y. Su","year":"2011","unstructured":"Su, M.-Y.: Prevention of Selective Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems. IEEE Computer Communications\u00a034(1), 107\u2013117 (2011), doi:10.1016\/j.comcom.2010.08.007","journal-title":"IEEE Computer Communications"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proc. of the Sixth Annual International Conference on Mobile Computing and Networking, MobiCom (August 2000)","DOI":"10.1145\/345910.345955"},{"key":"29_CR15","unstructured":"Sharma, S., Gupta, H.M., Dharmaraja, S.: EAGR: Energy Aware Greedy Routing scheme for wireless ad hoc networks. In: International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS 2008, June 16-18, pp. 122\u2013129 (2008)"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Singh, S., Woo, M., Raghavendra, C.: Power-Aware Routing in Mobile Ad Hoc Networks. In: MobiCom, pp. 181\u2013190 (1998)","DOI":"10.1145\/288235.288286"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Ad Hoc WirelessNetworks. In: Imielinski, T., Korth, H. (eds.) Mobile Computing, ch.\u00a05, pp. 153\u2013181. Kluwer Academic Publishers (1996)","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"29_CR18","unstructured":"IEEE Standard 802.11 - Part 11: Wireless LAN Medium Access Control(MAC) and Physical Layer (PHY) specifications (1999)"},{"key":"29_CR19","unstructured":"http:\/\/www.OPNET.com"},{"key":"29_CR20","unstructured":"US (Federal Communications Commission) FCC Part 15.247"},{"key":"29_CR21","unstructured":"Adapting Transmission Power for Optimal Energy Reliable Multi-hop Wireless Communication Suman Banerjee, Archan Misra. Wireless Optimization Workshop, WiOpt 2003, Sophia-Antipolis, France (March 2003)"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10353-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T01:37:22Z","timestamp":1746322642000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10353-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319103525","9783319103532"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10353-2_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}