{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T15:23:15Z","timestamp":1761578595082},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319232034"},{"type":"electronic","value":"9783319232041"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-23204-1_32","type":"book-chapter","created":{"date-parts":[[2015,8,28]],"date-time":"2015-08-28T11:12:25Z","timestamp":1440760345000},"page":"319-326","source":"Crossref","is-referenced-by-count":6,"title":["Defense Denial-of Service Attacks on IPv6 Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Chia-Mei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Sung-Chien","family":"Hsu","sequence":"additional","affiliation":[]},{"given":"Gu-Hsin","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,29]]},"reference":[{"key":"32_CR1","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MC.2009.54","volume":"2","author":"CE Caicedo","year":"2009","unstructured":"Caicedo, C.E., Joshi, J.B., Tuladhar, S.R.: IPv6 security challenges. Computer 2, 36\u201342 (2009)","journal-title":"Computer"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Choudhary, A.R., Sekelsky, A.: Securing IPv6 network infrastructure: A new security model. In: 2010 IEEE International Conference on Technologies for Homeland Security (HST), pp. 500\u2013506) (2010)","DOI":"10.1109\/THS.2010.5654971"},{"key":"32_CR3","unstructured":"Dahill, B., Levine, B.N., Royer, E., Shields, C.: A secure routing protocol for ad-hoc networks. Electrical Engineering and Computer Science, University of Michigan, Tech. Rep. UM-CS-2001\u2013037 (2001)"},{"key":"32_CR4","unstructured":"Hu, L., Evans, D.: Using Directional Antennas to Prevent Wormhole Attacks. In: NDSS (2004)"},{"key":"32_CR5","first-page":"1976","volume":"2003","author":"YC Hu","year":"2003","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. INFOCOM 2003, 1976\u20131986 (2003)","journal-title":"INFOCOM"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Rushing attacks and defense in wireless ad hoc network routing protocols. In: Proceedings of the 2nd ACM Workshop on Wireless Security, pp. 30\u201340 (2003)","DOI":"10.1145\/941315.941317"},{"issue":"3","key":"32_CR7","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1016\/j.adhoc.2007.02.001","volume":"6","author":"I Khalil","year":"2008","unstructured":"Khalil, I., Bagchi, S., Shroff, N.B.: MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Netw. 6(3), 344\u2013362 (2008)","journal-title":"Ad Hoc Netw."},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. In: The SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), pp. 193\u2013204 (2002)","DOI":"10.1016\/S1570-8705(03)00018-0"},{"key":"32_CR9","unstructured":"Thread. \n                    http:\/\/threadgroup.org\/About.aspx"},{"key":"32_CR10","unstructured":"Winter, T.: RPL: IPv6 routing protocol for low-power and lossy networks (2012). \n                    https:\/\/tools.ietf.org\/html\/rfc6550"},{"key":"32_CR11","unstructured":"Zigbee. \n                    http:\/\/www.zigbee.org\/"}],"container-title":["Advances in Intelligent Systems and Computing","Genetic and Evolutionary Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23204-1_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:51:19Z","timestamp":1559231479000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23204-1_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,29]]},"ISBN":["9783319232034","9783319232041"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23204-1_32","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,8,29]]}}}