{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:13:12Z","timestamp":1743019992167,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319666242"},{"type":"electronic","value":"9783319666259"}],"license":[{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-66625-9_16","type":"book-chapter","created":{"date-parts":[[2017,9,30]],"date-time":"2017-09-30T07:34:10Z","timestamp":1506756850000},"page":"159-168","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Performance Evaluation of Black Hole Attack Under AODV in Smart Metering Network"],"prefix":"10.1007","author":[{"given":"Yanxiao","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Suraj","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Guodong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,1]]},"reference":[{"key":"16_CR1","unstructured":"Utility-scale smart meter deployments: building block of the evolving power grid. IEI report (2014)"},{"issue":"1","key":"16_CR2","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1109\/COMST.2014.2341600","volume":"17","author":"M Erol-Kantarci","year":"2015","unstructured":"Erol-Kantarci, M., Mouftah, H.T.: Energy-efficient information and communication infrastructures in the smart grid: a survey on interactions and open issues. IEEE Commun. Surv. Tutor. 17(1), 179\u2013197 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"16_CR3","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1109\/MWC.2013.6549287","volume":"20","author":"Q-D Ho","year":"2013","unstructured":"Ho, Q.-D., Gao, Y., Le-Ngoc, T.: Challenges and research opportunities in wireless communication networks for smart grid. IEEE Wirel. Commun. 20(3), 89\u201395 (2013)","journal-title":"IEEE Wirel. Commun."},{"issue":"6","key":"16_CR4","doi-asserted-by":"publisher","first-page":"2476","DOI":"10.1109\/TVT.2014.2345415","volume":"64","author":"J Xu","year":"2015","unstructured":"Xu, J., Zhang, R.: CoMP meets smart grid: a new communication and energy cooperation paradigm. IEEE Trans. Veh. Technol. 64(6), 2476\u20132488 (2015)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Bennett, C., Wicker, S.B.: Decreased time delay and security enhancement recommendations for AMI smart meter networks. In: IEEE Innovative Smart Grid Technologies (ISGT), pp. 1\u20136 (2010)","DOI":"10.1109\/ISGT.2010.5434780"},{"key":"16_CR6","unstructured":"Esmaili, H., Shoja, M., et al.: Performance analysis of AODV under black hole attack through use of OPNET simulator. World Comput. Sci. Inf. Technol. J. (WCSIT) 1, 49\u201352 (2011)"},{"key":"16_CR7","unstructured":"Klein-Berndt, L.: A quick guide to AODV routing. In: NIST, Wireless Communications Technologies Group (2011). http:\/\/w3.antd.nist.gov\/wctg\/aodv_kernel\/"},{"key":"16_CR8","volume-title":"The VNR Concise Encyclopedia of Mathematics","author":"W Gellert","year":"2012","unstructured":"Gellert, W.: The VNR Concise Encyclopedia of Mathematics. Springer Science and Business Media, Heidelberg (2012)"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Yi, P., Zhu, T., Zhang, Q., Wu, Y., Li, J.: A denial of service attack in advanced metering infrastructure network. In: IEEE International Conference on Communications (ICC), pp. 1029\u20131034 (2014)","DOI":"10.1109\/ICC.2014.6883456"},{"key":"16_CR10","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s10796-013-9463-4","volume":"16","author":"G Wang","year":"2014","unstructured":"Wang, G., Ren, Y., Dou, K., Li, J.: IDTCP: an effective approach to mitigating the TCP incast problem in data center networks. Inf. Syst. Front. 16, 35\u201344 (2014)","journal-title":"Inf. Syst. Front."},{"issue":"6","key":"16_CR11","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1049\/iet-com.2013.0154","volume":"8","author":"G Wang","year":"2014","unstructured":"Wang, G., Ren, Y., Li, J.: An effective approach to alleviating the challenges of transmission control protocol. IET Commun. 8(6), 860\u2013869 (2014)","journal-title":"IET Commun."},{"key":"16_CR12","unstructured":"Al-Mandhari, W., Gyoda, K., Nakajima, N.: Performance evaluation of active route time-out parameter in ad-hoc on demand distance vector (AODV). In: The 6th WSEAS International Conference on Applied Electromagnetic, Wireless and Optical Communications, pp. 2\u20134 (2008)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66625-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,20]],"date-time":"2021-02-20T17:45:42Z","timestamp":1613843142000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66625-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,1]]},"ISBN":["9783319666242","9783319666259"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66625-9_16","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017,10,1]]},"assertion":[{"value":"1 October 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ChinaCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Communications and Networking in China","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chongqing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"chinacom2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/chinacom.org\/2016\/show\/home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}