{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T14:26:13Z","timestamp":1725978373689},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319911915"},{"type":"electronic","value":"9783319911922"}],"license":[{"start":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T00:00:00Z","timestamp":1526515200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-91192-2_31","type":"book-chapter","created":{"date-parts":[[2018,5,16]],"date-time":"2018-05-16T17:45:41Z","timestamp":1526492741000},"page":"311-320","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DSMANET: Defensive Strategy of Routing Using Game Theory Approach for Mobile Adhoc Network"],"prefix":"10.1007","author":[{"given":"K.","family":"Pradeep Kumar","sequence":"first","affiliation":[]},{"given":"B. R.","family":"Prasad Babu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,17]]},"reference":[{"key":"31_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/b11447","volume-title":"Mobile Ad Hoc Networks: Current Status and Future Trends","author":"J Loo","year":"2011","unstructured":"Loo, J., Lloret, J., Ortiz, J.H.: Mobile Ad Hoc Networks: Current Status and Future Trends. CRC Press, New york (2011)"},{"issue":"10","key":"31_CR2","doi-asserted-by":"publisher","first-page":"3558","DOI":"10.1109\/JSEN.2013.2272099","volume":"13","author":"P Bellavista","year":"2013","unstructured":"Bellavista, P., Cardone, G., Corradi, A., Foschini, L.: Convergence of MANET and WSN in IoT Urban Scenarios. IEEE Sens. J. 13(10), 3558\u20133567 (2013)","journal-title":"IEEE Sens. J."},{"issue":"4","key":"31_CR3","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1109\/SURV.2011.072210.00026","volume":"13","author":"S Djahel","year":"2011","unstructured":"Djahel, S., Nait-Abdesselam, F., Zhang, Z.: Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges. IEEE Commun. Surv. Tutor. 13(4), 658\u2013672 (2011)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"S\u2019nchez-Casado, L., Maci\u2019-Fern\u2019ndez, G., Garc\u00eda-Teodoro, P.: An efficient cross-layer approach for malicious packet dropping detection in MANETs. In:\u00a0IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, pp. 231\u2013238 (2012)","DOI":"10.1109\/TrustCom.2012.75"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Song, R., Tang, H., Mason, P.C., Wei, Z.: Cross-layer security management framework for mobile tactical networks. In: MILCOM 2013 - 2013 IEEE Military Communications Conference, San Diego, CA, pp. 220\u2013225 (2013)","DOI":"10.1109\/MILCOM.2013.46"},{"issue":"5","key":"31_CR6","doi-asserted-by":"publisher","first-page":"3718","DOI":"10.1109\/TWC.2016.2526601","volume":"15","author":"J Ren","year":"2016","unstructured":"Ren, J., Zhang, Y., Zhang, K., Shen, X.: Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Trans. Wirel. Commun. 15(5), 3718\u20133731 (2016)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Sherif, A., Elsabrouty, M., Shoukry, A.: A novel taxonomy of black-hole attack detection techniques in mobile Ad-hoc network (MANET). In:\u00a0IEEE 16th International Conference on Computational Science and Engineering, Sydney, NSW, pp. 346\u2013352 (2013)","DOI":"10.1109\/CSE.2013.60"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Singh, H.P., Singh, R.: A mechanism for discovery and prevention of cooperative black hole attack in mobile ad hoc network using AODV protocol. In:\u00a0International Conference on Electronics and Communication Systems (ICECS), Coimbatore, pp. 1\u20138 (2014)","DOI":"10.1109\/ECS.2014.6892653"},{"key":"31_CR9","unstructured":"Araghi, T.K., Zamani, M., Manaf, A.B.A., Abdullah, S.M., Bojnord, H.S., Araghi, S.K.: A secure model for prevention of black hole attack in wireless mobile ad hoc networks. In: Proceedings of the 12th WSEAS International Conference on Applied Computer and Applied Computational Science (2013)"},{"key":"31_CR10","first-page":"99","volume":"22","author":"V Laxmi","year":"2015","unstructured":"Laxmi, V., Lal, C., Gaur, M.S., Mehta, D.: JellyFish attack: analysis, detection and countermeasure in TCP-based MANET. J. Inf. Secur. Appl. 22, 99\u2013112 (2015). ISSN 2214-2126","journal-title":"J. Inf. Secur. Appl."},{"issue":"4","key":"31_CR11","doi-asserted-by":"publisher","first-page":"1857","DOI":"10.11591\/ijece.v6i4.9941","volume":"6","author":"G Arepalli","year":"2015","unstructured":"Arepalli, G., Erukula, S.B.: Secure multicast routing protocol in MANETs using efficient ECGDH algorithm. Int. J. Electr. Comput. Eng. (IJECE) 6(4), 1857 (2015)","journal-title":"Int. J. Electr. Comput. Eng. (IJECE)"},{"key":"31_CR12","unstructured":"Pradeep Kumar, K., Prasad Babu, B.R.: Investigating open issues in swarm intelligence for mitigating security threats in MANET. Int. J. Electr. Comput. Eng. (IJECE), 5(5) (2017)"}],"container-title":["Advances in Intelligent Systems and Computing","Cybernetics and Algorithms in Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91192-2_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T03:53:17Z","timestamp":1571370797000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-91192-2_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,17]]},"ISBN":["9783319911915","9783319911922"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91192-2_31","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,5,17]]}}}