{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:19Z","timestamp":1740099079188,"version":"3.37.3"},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319780771"},{"type":"electronic","value":"9783319780788"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78078-8_12","type":"book-chapter","created":{"date-parts":[[2018,3,28]],"date-time":"2018-03-28T07:30:12Z","timestamp":1522222212000},"page":"114-119","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Reliable Mutual Node Evaluation for Trust-Based OLSR in Tactical MANETs"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6342-9267","authenticated-orcid":false,"given":"Ji-Hun","family":"Lim","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5301-7987","authenticated-orcid":false,"given":"Keun-Woo","family":"Lim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8799-1761","authenticated-orcid":false,"given":"Young-Bae","family":"Ko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,29]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Clausen, T., Jacquet, P., Laoiti, A., Minet, P., Muhlethaler, P., Qayyum, A., Viennot, L.: Optimized Link State Routing Protocol. IETF Internet Request For Comments RFC 3626 (2003)","key":"12_CR1","DOI":"10.17487\/rfc3626"},{"doi-asserted-by":"crossref","unstructured":"Ronggong, S., Mason Peter, C.: ROLSR: a robust optimized link state routing protocol for military ad-hoc networks. In: IEEE MILCOM 2010 (2010)","key":"12_CR2","DOI":"10.1109\/MILCOM.2010.5679549"},{"doi-asserted-by":"crossref","unstructured":"Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., Jamalipour, A.: SA-OLSR: security aware optimized link state routing for mobile ad hoc networks. In: IEEE ICC 2008 (2008)","key":"12_CR3","DOI":"10.1109\/ICC.2008.283"},{"issue":"2","key":"12_CR4","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/JSAC.2005.861394","volume":"24","author":"Y-C Hu","year":"2006","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370\u2013380 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"doi-asserted-by":"crossref","unstructured":"Gerhards-Padilla, E., Aschenbruck, N., Martini, P., Jahnke, M., Tolle, J.: Detecting black hole attacks in tactical MANETs using topology graphs. In: IEEE LCN 2007 (2007)","key":"12_CR5","DOI":"10.1109\/LCN.2007.72"},{"key":"12_CR6","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/TMC.2015.2409877","volume":"1","author":"N Schweitzer","year":"2016","unstructured":"Schweitzer, N., Stulman, A., Shabtai, A., Margalit, R.D.: Mitigating denial of service attacks in OLSR protocol using fictitious nodes. IEEE Trans. Mobile Comput. 1, 163\u2013172 (2016)","journal-title":"IEEE Trans. Mobile Comput."},{"issue":"7","key":"12_CR7","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1109\/LCOMM.2017.2654439","volume":"21","author":"Z Li","year":"2017","unstructured":"Li, Z., Wu, Y.: Smooth mobility and link reliability based optimized link state routing scheme for MANETs. IEEE Commun. Lett. 21(7), 1529\u20131532 (2017)","journal-title":"IEEE Commun. Lett."},{"doi-asserted-by":"crossref","unstructured":"Postel, J.: Transmission Control Protocol. Internet Request For Comments RFC 793 (1981)","key":"12_CR8","DOI":"10.17487\/rfc0793"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Quality, Reliability, Security and Robustness in Heterogeneous Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78078-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T05:09:00Z","timestamp":1660712940000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78078-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319780771","9783319780788"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78078-8_12","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}