{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:14:28Z","timestamp":1749701668840,"version":"3.41.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319480565"},{"type":"electronic","value":"9783319480572"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48057-2_16","type":"book-chapter","created":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T04:37:01Z","timestamp":1477111021000},"page":"219-236","source":"Crossref","is-referenced-by-count":1,"title":["DASSR: A Distributed Authentication Scheme for Secure Routing in Wireless Ad-hoc Networks"],"prefix":"10.1007","author":[{"given":"Phu H.","family":"Phung","sequence":"first","affiliation":[]},{"given":"Quang Tran","family":"Minh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,23]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Abdelaziz, A.K., Nafaa, M., Salim, G.: Survey of routing attacks and countermeasures in mobile ad hoc networks. In: 15th International Conference on Computer Modelling and Simulation (UKSim 2013), pp. 693\u2013698, April 2013","DOI":"10.1109\/UKSim.2013.48"},{"key":"16_CR2","unstructured":"Alcaraz, C., Najera, P., Lopez, J., Roman, R.: Wireless sensor networks and the internet of things: do we need a complete integration. In: 1st International Workshop on the Security of the Internet of Things (SecIoT 2010). IEEE, December 2010"},{"issue":"4","key":"16_CR3","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/COMST.2007.4444751","volume":"9","author":"TR Andel","year":"2007","unstructured":"Andel, T.R., Yasinsac, A.: Surveying security analysis techniques in MANET routing protocols. IEEE Commun. Surv. Tutorials 9(4), 70\u201384 (2007)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"16_CR4","unstructured":"Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the 1st ACM Workshop on Wireless Security, WiSE 2002, NY, USA, pp. 21\u201330 (2002). http:\/\/doi.acm.org\/10.1145\/570681.570684"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Bahr, M.: Proposed routing for IEEE 802.11s WLAN mesh networks. In: Proceedings of the 2nd Annual International Workshop on Wireless Internet, WICON 2006, NY, USA (2006). http:\/\/doi.acm.org\/10.1145\/1234161.1234166","DOI":"10.1145\/1234161.1234166"},{"issue":"6","key":"16_CR6","first-page":"258","volume":"1","author":"H Bakht","year":"2011","unstructured":"Bakht, H.: Survey of routing protocols for mobile ad-hoc network. Int. J. Inf. Commun. Technol. Res. 1(6), 258\u2013270 (2011)","journal-title":"Int. J. Inf. Commun. Technol. Res."},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Baryun, A., Al-Begain, K., Villa, D.: A hybrid network protocol for disaster scenarios. In: Fifth IEEE International Conference on Next Generation Mobile Applications, Services and Technologies, pp. 129\u2013136, September 2011","DOI":"10.1109\/NGMAST.2011.32"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Ben-Othman, J., Benitez, Y.I.S.: On securing HWMP using IBC. In: 2011 IEEE International Conference on Communications (ICC), pp. 1\u20135, June 2011","DOI":"10.1109\/icc.2011.5962921"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Ben-Othman, J., Mokdad, L., Benitez, Y.I.S.: Performance comparison between IBC-HWMP and Hash-HWMP. In: Global Telecommunications Conference (GLOBECOM 2011), pp. 1\u20135. IEEE, December 2011","DOI":"10.1109\/GLOCOM.2011.6134357"},{"issue":"5","key":"16_CR10","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1002\/cpe.1813","volume":"25","author":"J Ben-Othman","year":"2013","unstructured":"Ben-Othman, J., Saavedra Benitez, Y.I.: IBC-HWMP: a novel secure identity-based cryptography-based scheme for hybrid wireless mesh protocol for IEEE 802.11s. Concurr. Comput. Pract. Exp. 25(5), 686\u2013700 (2013). http:\/\/dx.doi.org\/10.1002\/cpe.1813","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Garcia-Luna-Aceves, J.J., Spohn, M.: Source-tree routing in wireless networks. In: Seventh International Conference on Network Protocols (ICNP 1999), pp. 273\u2013282, October 1999","DOI":"10.1109\/ICNP.1999.801950"},{"issue":"1\u20132","key":"16_CR12","first-page":"21","volume":"11","author":"YC Hu","year":"2005","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel. Netw. 11(1\u20132), 21\u201338 (2005). http:\/\/dx.doi.org\/10.1007\/s11276-004-4744-y","journal-title":"Wirel. Netw."},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Johnson, D.B.: Routing in ad hoc networks of mobile hosts. In: The Workshop on Mobile Computing Systems and Applications, pp. 158\u2013163. IEEE Computer Society (1994)","DOI":"10.1109\/WMCSA.1994.33"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Jonsson, J., Kaliski, B.: Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1 (2003)","DOI":"10.17487\/rfc3447"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Kanthe, A.M., Simunic, D., Prasad, R.: Comparison of AODV and DSR on-demand routing protocols in mobile ad hoc networks. In: 1st International Conference on Emerging Technology Trends in Electronics, Communication and Networking (ET2ECN 2012), pp. 1\u20135, December 2012","DOI":"10.1109\/ET2ECN.2012.6470118"},{"key":"16_CR16","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/S1570-8705(03)00008-8","volume":"1","author":"C Karlof","year":"2003","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1, 293\u2013315 (2003)","journal-title":"Ad Hoc Netw."},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Khan, K.U.R., Zaman, R.U., Reddy, A.V., Reddy, K.A., Harsha, T.S.: An efficient DSDV routing protocol for wireless mobile ad hoc networks and its performance comparison. In: Second UKSIM European Symposium on Computer Modeling and Simulation (EMS 2008), pp. 506\u2013511, September 2008","DOI":"10.1109\/EMS.2008.11"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Kum, D.W., Park, J.S., Cho, Y.Z., Cheon, B.Y.: Performance evaluation of AODV and DYMO routing protocols in MANET. In: 7th IEEE Consumer Communications and Networking Conference (CCNC 2010), pp. 1\u20132, January 2010","DOI":"10.1109\/CCNC.2010.5421657"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Kuppusamy, P., Thirunavukkarasu, K., Kalaavathi, B.: A study and comparison of OLSR, AODV and TORA routing protocols in ad hoc networks. In: 3rd International Conference on Electronics Computer Technology (ICECT 2011), vol. 5, pp. 143\u2013147, April 2011","DOI":"10.1109\/ICECTECH.2011.5941974"},{"key":"16_CR20","unstructured":"Lee, Y.H., Kim, H., Chung, B., Lee, J., Yoon, H.: On-demand secure routing protocol for ad hoc network using ID based cryptosystem. In: Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2003, pp. 211\u2013215, August 2003"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Perkins, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561 (Experimental) July 2003. http:\/\/www.ietf.org\/rfc\/rfc3561.txt","DOI":"10.17487\/rfc3561"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 1999), pp. 90\u2013100, February 1999","DOI":"10.1109\/MCSA.1999.749281"},{"key":"16_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-642-00972-3_15","volume-title":"Active and Programmable Networks","author":"PH Phu","year":"2009","unstructured":"Phu, P.H., Yi, M., Kim, M.-K.: Securing AODV routing protocol in mobile ad-hoc networks. In: Hutchison, D., Denazis, S., Lefevre, L., Minden, G.J. (eds.) IWAN 2005. LNCS, vol. 4388, pp. 182\u2013187. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-00972-3_15"},{"key":"16_CR24","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.adhoc.2015.12.008","volume":"40","author":"TM Quang","year":"2016","unstructured":"Quang, T.M., Yoshitaka, S., Cristian, B., Shigeki, Y.: On-site configuration of disaster recovery access networks made easy. Ad Hoc Netw. 40, 46\u201360 (2016). Elsevier","journal-title":"Ad Hoc Netw."},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Rousseau, S., Benbadis, F., Lavaux, D., San L.: Overview and optimization of flooding techniques in OLSR. In: WoWMoM 2011, pp. 1\u20137, June 2011","DOI":"10.1109\/WoWMoM.2011.5986180"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Ray, N.K., Turuk, A.K.: A framework for disaster management using wireless ad hoc networks. In: Proceedings of the 2011 International Conference on Communication, Computing and Security, ICCCS 2011, NY, USA, pp. 138\u2013141 (2011). http:\/\/doi.acm.org\/10.1145\/1947940.1947970","DOI":"10.1145\/1947940.1947970"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Rezvani, M., Ignjatovic, A., Bertino, E., Jha, S.: A collaborative reputation system based on credibility propagation in WSNs. In: IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS 2015), pp. 1\u20138, December 2015","DOI":"10.1109\/ICPADS.2015.9"},{"issue":"3","key":"16_CR28","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1109\/JSAC.2004.842547","volume":"23","author":"K Sanzgiri","year":"2005","unstructured":"Sanzgiri, K., LaFlamme, D., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: Authenticated routing for ad hoc networks. IEEE J. Sel. Areas Commun. 23(3), 598\u2013610 (2005)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Sen, J.: Routing security issues in wireless sensor networks: attacks and defenses. In: Sustainable Wireless Sensor Networks (2011)","DOI":"10.5772\/12952"},{"key":"16_CR30","doi-asserted-by":"crossref","first-page":"66","DOI":"10.4186\/ej.2014.18.1.65","volume":"18","author":"M Sivakumar","year":"2014","unstructured":"Sivakumar, M., Jayanthi, M.K.: Reliability analysis of link stability in secured routing protocols for MANETs. Eng. J. 18, 66\u201376 (2014)","journal-title":"Eng. J."},{"issue":"3","key":"16_CR31","first-page":"279","volume":"1","author":"S Taneja","year":"2010","unstructured":"Taneja, S., Kush, A.: A survey of routing protocols in mobile ad hoc networks. Int. J. Innov. Manag. Technol. 1(3), 279\u2013285 (2010)","journal-title":"Int. J. Innov. Manag. Technol."},{"issue":"1","key":"16_CR32","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/TMC.2003.1195151","volume":"2","author":"S \u010capkun","year":"2003","unstructured":"\u010capkun, S., Butty\u00e1n, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mobile Comput. 2(1), 52\u201364 (2003). http:\/\/dx.doi.org\/10.1109\/TMC.2003.1195151","journal-title":"IEEE Trans. Mobile Comput."},{"issue":"12","key":"16_CR33","first-page":"66","volume":"14","author":"K VinothKumar","year":"2014","unstructured":"VinothKumar, K., Rajaram, A.: An efficient security aware routing protocol for mobile ad hoc networks. Int. J. Comput. Sci. Netw. Secur. 14(12), 66\u201373 (2014)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"issue":"3","key":"16_CR34","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1145\/581291.581312","volume":"6","author":"MG Zapata","year":"2002","unstructured":"Zapata, M.G.: Secure ad hoc on-demand distance vector routing. SIGMOBILE Mob. Comput. Commun. Rev. 6(3), 106\u2013107 (2002). http:\/\/doi.acm.org\/10.1145\/581291.581312","journal-title":"SIGMOBILE Mob. Comput. Commun. Rev."}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48057-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T19:49:19Z","timestamp":1749671359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48057-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319480565","9783319480572"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48057-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}