{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:46Z","timestamp":1750220506968,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319571409"},{"type":"electronic","value":"9783319571416"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-57141-6_21","type":"book-chapter","created":{"date-parts":[[2017,4,7]],"date-time":"2017-04-07T10:14:00Z","timestamp":1491560040000},"page":"201-208","source":"Crossref","is-referenced-by-count":1,"title":["Strategic Modeling of Secure Routing Decision in OLSR Protocol in Mobile Ad-Hoc Network"],"prefix":"10.1007","author":[{"given":"C.K.","family":"Vanamala","sequence":"first","affiliation":[]},{"given":"G.","family":"Raghvendra Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,8]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","DOI":"10.1201\/b13094","volume-title":"Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications","author":"SK Sarkar","year":"2016","unstructured":"Sarkar, S.K., Basavaraju, T.G., Puttamadappa, C.: Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications. CRC Press, Boca Raton (2016)"},{"key":"21_CR2","doi-asserted-by":"crossref","DOI":"10.1002\/9781119082163","volume-title":"Vehicular Ad Hoc Network Security and Privacy","author":"X Lin","year":"2015","unstructured":"Lin, X., Lu, R.: Vehicular Ad Hoc Network Security and Privacy. Wiley, Hoboken (2015)"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Patel, D.N., Patel, S.B., Kothadiya, H.R., Jethwa, P.D., Jhaveri, R.H.: A survey of reactive routing protocols in MANET. In: IEEE-International Conference on Information Communication and Embedded Systems, Chennai, pp. 1\u20136 (2014)","DOI":"10.1109\/ICICES.2014.7033833"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Abdelaziz, A.K., Nafaa, M., Salim, G.: Survey of routing attacks and countermeasures in mobile ad hoc networks. In: UKSim 15th International Conference on Computer Modelling and Simulation, Cambridge, pp. 693\u2013698 (2013)","DOI":"10.1109\/UKSim.2013.48"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Chawda, K., Gorana, D.: A survey of energy efficient routing protocol in MANET. In: IEEE-2nd International Conference on Electronics and Communication Systems, Coimbatore, pp. 953\u2013957 (2015)","DOI":"10.1109\/ECS.2015.7125055"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Gupta, H., Pandey, P.: Survey of routing base congestion control techniques under MANET. In: IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology, Tirunelveli, pp. 241\u2013244 (2013)","DOI":"10.1109\/ICE-CCN.2013.6528501"},{"key":"21_CR7","doi-asserted-by":"crossref","DOI":"10.1201\/b11447","volume-title":"Mobile Ad Hoc Networks: Current Status and Future Trends","author":"J Loo","year":"2016","unstructured":"Loo, J., Mauri, J.L., Ortiz, J.H.: Mobile Ad Hoc Networks: Current Status and Future Trends. CRC Press, Boca Raton (2016)"},{"key":"21_CR8","volume-title":"Routing Issues in MANETs","author":"BVVS Prasad","year":"2016","unstructured":"Prasad, B.V.V.S.: Routing Issues in MANETs. Educreation Publishing, Dwarka (2016)"},{"key":"21_CR9","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-4666-0321-9","volume-title":"Technological Advancements and Applications in Mobile Ad-Hoc Networks: Research Trends: Research Trends","author":"KI Lakhtaria","year":"2012","unstructured":"Lakhtaria, K.I.: Technological Advancements and Applications in Mobile Ad-Hoc Networks: Research Trends: Research Trends. IGI GLobal, Hershey (2012)"},{"key":"21_CR10","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-981-10-3274-5_14","volume-title":"Digital Connectivity \u2013 Social Impact","author":"SR Kumar","year":"2016","unstructured":"Kumar, S.R., Gayathri, N.: Trust based data transmission mechanism in MANET using sOLSR. In: Subramanian, S., Nadarajan, R., Rao, S., Sheen, S. (eds.) CSI 2016. CCIS, vol. 679, pp. 169\u2013180. Springer, Singapore (2016). doi: 10.1007\/978-981-10-3274-5_14"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Khan, M.S., Khan, M.I., Malik, S-Ur-R., Khalid, O., Azim, M., Javaid, N.: MATF: a multi-attribute trust framework for MANETs. EURASIP J. Wireless Commun. Networking (2016)","DOI":"10.1186\/s13638-016-0691-4"},{"issue":"1","key":"21_CR12","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/TMC.2015.2409877","volume":"15","author":"N Schweitzer","year":"2016","unstructured":"Schweitzer, N., Stulman, A., Shabtai, A., Margalit, R.D.: Mitigating denial of service attacks in OLSR protocol using fictitious nodes. IEEE Trans. Mobile Comput. 15(1), 163\u2013172 (2016)","journal-title":"IEEE Trans. Mobile Comput."},{"key":"21_CR13","unstructured":"Dutta, C.B., Biswas, U.: Specification based IDS for camouflaging wormhole attack in OLSR. In: IEEE-23rd Mediterranean Conference on Control and Automation (2015)"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Amraoui, H., Habbani, A., Hajami, A.: Effect of selfish behaviour on OLSR and AODV routing protocols in MANETs. In: IEEE Global Summit on Computer & Information Technology, Sousse, pp. 1\u20136 (2014)","DOI":"10.1109\/GSCIT.2014.6970105"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Malik, D., Rizvi, M.A.: Prevention of node isolation attack on OLSR by DFOLSR. In: ACM-International Conference on Information and Communication Technology for Competitive Strategies (2014)","DOI":"10.1145\/2677855.2677885"},{"key":"21_CR16","unstructured":"Selvi, K.T., Kuppuswami, S.: Enhancing security in optimized link state routing protocol for MANET using threshold cryptography technique. In: IEEE-International Conference on Recent Trends in Information Technology (2014)"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Alattar, M., Sailhan, F., Bourgeois, J.: On lightweight intrusion detection: modeling and detecting intrusions dedicated to OLSR protocol. Int. J. Distrib. Sens. Netw. (2013). Hindawi Publishing Corporation","DOI":"10.1155\/2013\/521497"},{"issue":"1","key":"21_CR18","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/JCN.2013.000007","volume":"15","author":"M Marimuthu","year":"2013","unstructured":"Marimuthu, M., Krishnamurthi, I.: Enhanced OLSR for defense against DOS attack in ad hoc networks. IEEE J. Commun. Netw. 15(1), 31\u201337 (2013)","journal-title":"IEEE J. Commun. Netw."},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Sadeghi, M., Yahya, S.: Analysis of Wormhole attack on MANETs using different MANET routing protocols. In: IEEE-Fourth International Conference on Ubiquitous and Future Networks, Phuket, pp. 301\u2013305 (2012)","DOI":"10.1109\/ICUFN.2012.6261716"},{"key":"21_CR20","unstructured":"Campos, J., Calafate, C.T., Nacher, M., Manzoni, P., Cano, J-C.: HOP: achieving efficient anonymity in MANETs by combining HIP, OLSR, and pseudonyms. EURASIP J. Wireless Commun. Netw. (2011). Hindawi Publishing Corporation"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Adoni, K.A., Tavildar, A.S.: Trust aware routing framework for OLSR protocol to enhance performance of mobile ad-hoc networks. In: IEEE-International Conference on Pervasive Computing (2015)","DOI":"10.1109\/PERVASIVE.2015.7087061"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Suresh, L., Kaur, R., Gaur, M.S., Laxmi, V.: A collusion attack detection method for OLSR-Based MANETs employing scruple packets. In: ACM-Proceedings of the 3rd International Conference on Security of Information and Networks, pp. 256\u2013262 (2010)","DOI":"10.1145\/1854099.1854151"}],"container-title":["Advances in Intelligent Systems and Computing","Software Engineering Trends and Techniques in Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-57141-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:20:37Z","timestamp":1750195237000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-57141-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319571409","9783319571416"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-57141-6_21","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}