{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T06:16:22Z","timestamp":1773900982717,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319763538","type":"print"},{"value":"9783319763545","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76354-5_2","type":"book-chapter","created":{"date-parts":[[2018,3,9]],"date-time":"2018-03-09T06:43:48Z","timestamp":1520577828000},"page":"13-24","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Reducing Blackhole Effect in WSN"],"prefix":"10.1007","author":[{"given":"Sana","family":"Akourmis","sequence":"first","affiliation":[]},{"given":"Youssef","family":"Fakhri","sequence":"additional","affiliation":[]},{"given":"Moulay Driss","family":"Rahmani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,10]]},"reference":[{"issue":"12","key":"2_CR1","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","volume":"52","author":"J Yick","year":"2008","unstructured":"Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Comput. Netw. 52(12), 2292\u20132330 (2008)","journal-title":"Comput. Netw."},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Kaplantzis, S., Shilton, A., Mani, N., Sekercioglu, Y.A.: Detecting selective forwarding attacks in wireless sensor networks using support vector machines. In: 3rd International Conference on Intelligent Sensors, Sensor Networks and Information, ISSNIP 2007, pp. 335\u2013340 (2007)","DOI":"10.1109\/ISSNIP.2007.4496866"},{"issue":"9","key":"2_CR3","first-page":"12","volume":"9","author":"GS Mamatha","year":"2010","unstructured":"Mamatha, G.S., Sharma, D.S.: Network layer attacks and defense mechanisms in MANETS-a survey. Int. J. Comput. Appl. 9(9), 12\u201317 (2010)","journal-title":"Int. J. Comput. Appl."},{"key":"2_CR4","volume-title":"Sustainable Wireless Sensor Networks","author":"J Sen","year":"2010","unstructured":"Sen, J.: Routing security issues in wireless sensor networks: attacks and defenses. In: Tan, Y.K. (ed.) Sustainable Wireless Sensor Networks. InTech, Rijeka (2010)"},{"key":"2_CR5","unstructured":"Sheela, D., Srividhya, V.R., Asma, B.A., Chidanand, G.M.: Detecting black hole attacks in wireless sensor networks using mobile agent. In: International Conference on Artificial Intelligence and Embedded Systems (ICAIES), pp. 15\u201316 (2012)"},{"key":"2_CR6","unstructured":"Karakehayov, Z.: Using REWARD to detect team black-hole attacks in wireless sensor networks. In: Workshop on Real-World Wireless Sensor Networks (REALWSN 2005), pp. 20\u201321, June 2005"},{"issue":"4","key":"2_CR7","doi-asserted-by":"crossref","first-page":"1320","DOI":"10.1109\/TVT.2006.877707","volume":"55","author":"W Lou","year":"2006","unstructured":"Lou, W., Kwon, Y.: H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks. IEEE Trans. Veh. Technol. 55(4), 1320\u20131330 (2006)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Weerasinghe, K.G.H.D., Fu, H.: Preventing cooperative black hole attacks in mobile ad hoc networks: simulation implementation and evaluation (2008)","DOI":"10.1109\/FGCN.2007.184"},{"key":"2_CR9","unstructured":"Banerjee, S.: Detection\/removal of cooperative black and gray hole attack in mobile ad-hoc networks. In: Proceedings of the World Congress on Engineering and Computer Science, pp. 22\u201324, October 2008"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255\u2013265. ACM, August 2000","DOI":"10.1145\/345910.345955"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Le Boudec, J.Y.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 226\u2013236. ACM, June 2002","DOI":"10.1145\/513800.513828"},{"key":"2_CR12","unstructured":"De Mazieux, A.D., Gauthier, V., Marot, M., et al.: Etat de l\u2019art sur les r\u00e9seaux de capteurs. Rapport de recherche INT N05001RST GET\/INT UMR, vol. 5157 (2005)"},{"issue":"3","key":"2_CR13","first-page":"136","volume":"14","author":"KV Kumar","year":"2016","unstructured":"Kumar, K.V., Somasundaram, K.: Detection of black hole attacks in manets by using proximity set method. Int. J. Comput. Sci. Inf. Secur. 14(3), 136 (2016)","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"key":"2_CR14","unstructured":"Sasikala, S., Vallinayagam, M.: Secured intrusion detection system in mobile ad hoc network using RAODV. In: Proceedings Published in International Journal of Computer Applications (IJCA). ISSN 975: 8887"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Nasser, N., Chen, Y.: Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks. In: IEEE International Conference on Communications, ICC 2007. IEEE (2007)","DOI":"10.1109\/ICC.2007.196"},{"key":"2_CR16","unstructured":"Gurung, S., Saluja, K.K.: Mitigating impact of blackhole attack in MANET. In: International Conference on Recent Trends in Information, Telecommunication and Computing, ITC (2014)"},{"issue":"1","key":"2_CR17","first-page":"36","volume":"3","author":"Y Khamayseh","year":"2011","unstructured":"Khamayseh, Y., et al.: A new protocol for detecting black hole nodes in ad hoc networks. Int. J. Commun. Netw. Inf. Secur. 3(1), 36 (2011)","journal-title":"Int. J. Commun. Netw. Inf. Secur."}],"container-title":["Advances in Intelligent Systems and Computing","Innovations in Bio-Inspired Computing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76354-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T11:33:40Z","timestamp":1570880020000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76354-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319763538","9783319763545"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76354-5_2","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}