{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T21:10:02Z","timestamp":1749762602982,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319498058"},{"type":"electronic","value":"9783319498065"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_24","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T12:34:29Z","timestamp":1479904469000},"page":"444-458","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANET"],"prefix":"10.1007","author":[{"given":"Sudhir","family":"Bagade","sequence":"first","affiliation":[]},{"given":"Vijay","family":"Raisinghani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Abusalah, L., Khokhar, A., Guizani, M.: A survey of secure mobile ad-hoc routing protocols. IEEE Commun. Surv. Tutorials 10(4), 78\u201393 (2008). Fourth quarter","DOI":"10.1109\/SURV.2008.080407"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Su, X., Boppana, R.V.: On Mitigating in-band wormhole attacks in mobile ad-hoc networks. In: ICC Proceedings (2007)","DOI":"10.1109\/ICC.2007.193"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Shi, F., Jin, D., Liu, W., Song, J.: Time-based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks, IEEE TrustCom (2011)","DOI":"10.1109\/TrustCom.2011.240"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Clausen, et al.: Jitter Considerations in Mobile Ad Hoc Networks (MANETs). IETF, RFC 5148 (2008)","DOI":"10.17487\/rfc5148"},{"key":"24_CR5","unstructured":"Nait-Abdesselam, F., Bensaou, B., Taleb, T.: Detecting and avoiding wormhole attacks in wireless ad-hoc networks. IEEE Commun. Mag. 46, 127\u2013133 (2008)"},{"key":"24_CR6","unstructured":"Shi, Z., Lu, R., Qiao, J., Chen J., Shen, X.: A wormhole attack resistant neighbor discovery scheme with RDMA protocol for 60\u00a0GHz directional network. IEEE Trans. Emerg. Top. Comput. 1(2), 341\u2013352 (2013)"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Choi, S., Kim, D.-Y., Lee, D.-H., Jung, J.-I.: WAP: wormhole attack prevention algorithm in mobile ad hoc networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (2008)","DOI":"10.1109\/SUTC.2008.49"},{"key":"24_CR8","unstructured":"Yi, J., Fuertes, J., Clausen, T.: Jitter Consideration for Reactive Protocol in Mobile Ad Hoc Networks (MANETs). Internet-Draft, July 2013"},{"key":"24_CR9","unstructured":"Clausen, et al.: LOADng, Internet draft, July 2015"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Hu, Y., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24, 370\u2013380 (2006)","DOI":"10.1109\/JSAC.2005.861394"},{"key":"24_CR11","unstructured":"Matam, R., Tripathy, S.: WRSR: wormhole-resilient secure routing for wireless mesh networks. EURASIP J. Wirel. Commun. Networking 2013, 1\u201312 (2013). Article 180"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Khalil, I., Bagchi, S., Shroff, N.B.: LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. In: Dependable Systems and Networks (DSN), pp. 612\u2013621 (2005)","DOI":"10.1109\/SECCOMW.2006.359564"},{"issue":"3","key":"24_CR13","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.jcss.2013.06.015","volume":"80","author":"T Giannetsos","year":"2013","unstructured":"Giannetsos, T., Dimitriou, T.: LDAC: a localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks. J. Comput. Syst. Sci. 80(3), 618\u2013643 (2013)","journal-title":"J. Comput. Syst. Sci."},{"key":"24_CR14","unstructured":"Qian, L., Song, N., Li, X.: Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach. In: 19th IEEE International Proceedings on Parallel and Distributed Processing Symposium (2005)"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Song, S., Wu, H., Choi, B.-Y.: Statistical wormhole detection for mobile sensor networks. In: Fourth IEEE International Conference on Ubiquitous and Future Networks (ICUFN), pp. 322\u2013327 (2012)","DOI":"10.1109\/ICUFN.2012.6261721"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Wang, W., Lu, A.: Interactive wormhole detection in large scale wireless network. In: IEEE Symposium on Visual Analytics Science and Technology, Baltimore, MD, USA (2006)","DOI":"10.1109\/VAST.2006.261435"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Maheshwari, R., Gao, J., Das, S.R.: Detecting wormhole attacks in wireless networks using connectivity information. In: Proceedings of INFOCOMM, IEEE Conference on Computer Communications, pp. 107\u2013115, May 2007","DOI":"10.1109\/INFCOM.2007.21"},{"key":"24_CR18","unstructured":"Pai, H.-T., Wu, F.: Prevention of Wormhole Attacks in Mobile Commerce Based on Non-infrastructure Wireless Networks. Elsevier: Electron. Commer. Res. Appl. 10, 384\u2013397 (2011)"},{"issue":"1","key":"24_CR19","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1109\/TVT.2008.924975","volume":"58","author":"M Yu","year":"2009","unstructured":"Yu, M., Zhou, M.C., Su, W.: A secure routing protocol against byzantine attacks for manets in adversarial environments. IEEE Trans. Veh. Technol. 58(1), 449\u2013460 (2009)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"4","key":"24_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1284680.1341892","volume":"10","author":"B Awerbuch","year":"2008","unstructured":"Awerbuch, B., Curtmola, R., Holmer, D., et al.: ODSBR: an on-demand secure byzantine resilient routing protocol for wireless ad-hoc networks. ACM Trans. Inf. Syst. Secur. 10(4), 1\u201335 (2008)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"3","key":"24_CR21","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TMC.2014.2324572","volume":"14","author":"S Ji","year":"2015","unstructured":"Ji, S., Chen, T., Zhong, S.: Wormhole attack detection algorithms in wireless network coding systems. IEEE Trans. Mob. Comput. 14(3), 660\u2013674 (2015)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"24_CR22","unstructured":"ns2 User Manual. http:\/\/www.isi.edu\/nsnam\/ns\/doc\/index.html"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T20:41:53Z","timestamp":1749760913000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"24 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jaipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iciss16.mnit.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}