{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T05:10:10Z","timestamp":1746335410547,"version":"3.40.4"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319111933"},{"type":"electronic","value":"9783319111940"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11194-0_53","type":"book-chapter","created":{"date-parts":[[2014,8,12]],"date-time":"2014-08-12T14:25:55Z","timestamp":1407853555000},"page":"601-610","source":"Crossref","is-referenced-by-count":9,"title":["Detection and Defense Technology of Blackhole Attacks in Wireless Sensor Network"],"prefix":"10.1007","author":[{"given":"Huisheng","family":"Gao","sequence":"first","affiliation":[]},{"given":"Ruping","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Mingjing","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Can","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"12","key":"53_CR1","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","volume":"52","author":"J. Yick","year":"2008","unstructured":"Yick, J., Mukherjee, B., Ghosal, D.: Wireless Sensor Network Survey. J. Computer Networks\u00a052(12), 2292\u20132330 (2008)","journal-title":"J. Computer Networks"},{"key":"53_CR2","doi-asserted-by":"crossref","unstructured":"Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on Demand Distance Vector (AODV) Routing (RFC 3561). J. IETF MANET Working Group (2003)","DOI":"10.17487\/rfc3561"},{"issue":"2","key":"53_CR3","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/S1570-8705(03)00008-8","volume":"1","author":"C. Karlof","year":"2003","unstructured":"Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. J. Ad hoc Networks.\u00a01(2), 293\u2013315 (2003)","journal-title":"J. Ad hoc Networks."},{"key":"53_CR4","doi-asserted-by":"crossref","unstructured":"Dokurer, S., Erten, Y.M., Acar, C.E.: Performance Analysis of Ad-hoc Networks under Black hole Attacks. In: Proceedings of the IEEE SoutheastCon, pp. 148\u2013153 (2007)","DOI":"10.1109\/SECON.2007.342872"},{"issue":"3","key":"53_CR5","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1145\/581291.581312","volume":"6","author":"M.G. Zapata","year":"2002","unstructured":"Zapata, M.G.: Secure Ad hoc on-demand Distance Vector Routing. J. ACM SIGMOBILE Mobile Computing and Communications Review\u00a06(3), 106\u2013107 (2002)","journal-title":"J. ACM SIGMOBILE Mobile Computing and Communications Review"},{"key":"53_CR6","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: Proceedings of the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), pp. 193\u2013204 (2002)","DOI":"10.1016\/S1570-8705(03)00018-0"},{"issue":"1","key":"53_CR7","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/S1570-8705(03)00019-2","volume":"1","author":"Y.C. Hu","year":"2003","unstructured":"Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Nobile Wireless Ad hoc Networks. J. Ad Hoc Networks.\u00a01(1), 175\u2013192 (2003)","journal-title":"J. Ad Hoc Networks."},{"key":"53_CR8","first-page":"61801","volume":"51","author":"S. Yi","year":"2002","unstructured":"Yi, S., Naldurg, P., Kravets, R.: A Security-aware Routing Protocol for Wireless Ad hoc Networks. J. Urbana.\u00a051, 61801 (2002)","journal-title":"J. Urbana."},{"key":"53_CR9","doi-asserted-by":"crossref","unstructured":"Shurman, M., Yoo, S.M., Park, S.: Black hole Attack in Mobile Ad hoc Networks. In: Proceedings of the 42nd Annual Southeast Regional Conference, pp. 96\u201397. ACM (2004)","DOI":"10.1145\/986537.986560"},{"key":"53_CR10","doi-asserted-by":"crossref","unstructured":"Aad, I., Hubaux, J.P., Knightly, E.W.: Denial of Service Resilience in Ad hoc Networks. In: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, pp. 202\u2013215. ACM (2004)","DOI":"10.1145\/1023720.1023741"},{"key":"53_CR11","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad hoc Networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255\u2013265. ACM (2000)","DOI":"10.1145\/345910.345955"},{"issue":"2","key":"53_CR12","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/5254.850826","volume":"15","author":"K.D. Bollacker","year":"2000","unstructured":"Bollacker, K.D., Lawrence, S., Giles, C.L.: Discovering Relevant Scientific Literature on the Web. J. Intelligent Systems and their Applications\u00a015(2), 42\u201347 (2000)","journal-title":"J. Intelligent Systems and their Applications"},{"key":"53_CR13","unstructured":"Lieberman, H.: Letizia: An Agent that Assists Web Browsing. J. IJCAI\u00a0(1), 924\u2013929 (1995)"},{"key":"53_CR14","first-page":"490","volume-title":"Personal Mobile Communications Conference","author":"B. Sun","year":"2003","unstructured":"Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting Black-hole Attack in Mobile Ad hoc Networks. In: Personal Mobile Communications Conference, pp. 490\u2013495. IET, European (2003)"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11194-0_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T04:36:31Z","timestamp":1746333391000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11194-0_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319111933","9783319111940"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11194-0_53","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}