{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T14:26:20Z","timestamp":1725978380073},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319911915"},{"type":"electronic","value":"9783319911922"}],"license":[{"start":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T00:00:00Z","timestamp":1526515200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-91192-2_34","type":"book-chapter","created":{"date-parts":[[2018,5,16]],"date-time":"2018-05-16T17:45:41Z","timestamp":1526492741000},"page":"346-355","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Framework for Capturing the Intruders in Wireless Adhoc Network Using Zombie Node"],"prefix":"10.1007","author":[{"given":"Jyoti","family":"Neeli","sequence":"first","affiliation":[]},{"given":"N. K.","family":"Cauvery","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,17]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Sarkar, S.K., Basavaraju, T.G., Puttamadappa, C.: Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications, 2nd edn., p. 349. CRC Press (2016)","DOI":"10.1201\/b13094"},{"key":"34_CR2","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1002\/0470118474","volume-title":"Security for Wireless Ad Hoc Networks","author":"F Anjum","year":"2007","unstructured":"Anjum, F., Mouchtaris, P.: Security for Wireless Ad Hoc Networks, p. 316. Wiley, New York (2007)"},{"key":"34_CR3","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1007\/978-981-10-3770-2","volume-title":"Advances in Computer and Computational Sciences: Proceedings of ICCCCS 2016","author":"SK Bhatia","year":"2017","unstructured":"Bhatia, S.K., Mishra, K.K., Tiwari, S., Singh, V.K.: Advances in Computer and Computational Sciences: Proceedings of ICCCCS 2016, vol. 1, p. 775. Springer, Singapore (2017)"},{"key":"34_CR4","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1007\/978-3-642-36169-2","volume-title":"Wireless Networks and Security: Issues, Challenges and Research Trends","author":"S Khan","year":"2013","unstructured":"Khan, S., Pathan, A.-S.K.: Wireless Networks and Security: Issues, Challenges and Research Trends, p. 512. Springer, Heidelberg (2013)"},{"key":"34_CR5","first-page":"577","volume-title":"Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications","author":"DB Rawat","year":"2013","unstructured":"Rawat, D.B.: Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, p. 577. IGI Global, Hershey (2013)"},{"issue":"4","key":"34_CR6","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1109\/TSMCC.2010.2045373","volume":"40","author":"C Alcaraz","year":"2010","unstructured":"Alcaraz, C., Lopez, J.: A security analysis for wireless sensor mesh networks in highly critical systems. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 40(4), 419\u2013428 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.)"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Grover, J., Sharma, S.: Security Issues in Wireless Sensor Network-A Review. IEEE Xplore (2016)","DOI":"10.1109\/ICRITO.2016.7784988"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Alani, M.M.: MANET security: a survey. In: IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2014), Batu Ferringhi, pp. 559\u2013564 (2014)","DOI":"10.1109\/ICCSCE.2014.7072781"},{"issue":"6","key":"34_CR9","doi-asserted-by":"publisher","first-page":"2985","DOI":"10.1109\/TITS.2015.2439292","volume":"16","author":"F Qu","year":"2015","unstructured":"Qu, F., Wu, Z., Wang, F.Y., Cho, W.: A security and privacy review of VANETs. IEEE Trans. Intell. Transp. Syst. 16(6), 2985\u20132996 (2015)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Barskar, R., Ahirwar, M., Vishwakarma, R.: Secure key management in vehicular ad-hoc network: a review. In: International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), Paralakhemundi, pp. 1688\u20131694 (2016)","DOI":"10.1109\/SCOPES.2016.7955730"},{"key":"34_CR11","first-page":"10","volume":"2017","author":"W Wu","year":"2017","unstructured":"Wu, W., Huang, N., Sun, L., Zheng, X.: Research article measurement and analysis of MANET resilience with fault tolerance strategies. Math. Prob. Eng. 2017, 10 (2017)","journal-title":"Math. Prob. Eng."},{"key":"34_CR12","first-page":"8","volume":"2016","author":"E Zamani","year":"2016","unstructured":"Zamani, E., Soltanaghaei, M.: The improved overhearing backup AODV protocol in MANET. J. Comput. Netw. Commun. 2016, 8 (2016)","journal-title":"J. Comput. Netw. Commun."},{"key":"34_CR13","first-page":"13","volume":"2016","author":"R Singh","year":"2016","unstructured":"Singh, R., Singh, J., Singh, R.: WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. Mob. Inf. Syst. 2016, 13 (2016)","journal-title":"Mob. Inf. Syst."},{"key":"34_CR14","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1155\/2015\/469793","volume":"2015","author":"P Gong","year":"2015","unstructured":"Gong, P., Chen, T.M., Xu, Q.: ETARP: an energy efficient trust-aware routing protocol for wireless sensor networks. J. Sens. 2015, 10 (2015)","journal-title":"J. Sens."},{"key":"34_CR15","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1155\/2015\/715820","volume":"2015","author":"MR Babu","year":"2015","unstructured":"Babu, M.R., Dian, S.M., Chelladurai, S., Palaniappan, M.: Proactive alleviation procedure to handle black hole attack and its version. Sci. World J. 2015, 11 (2015)","journal-title":"Sci. World J."},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Jain, A.K., Tokekar, V.: Mitigating the effects of black hole attacks on AODV routing protocol in mobile ad hoc networks. In: International Conference on Pervasive Computing (ICPC), Pune, pp. 1\u20136 (2015)","DOI":"10.1109\/PERVASIVE.2015.7087174"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Gupta, A., Rana, K.: Assessment of various attacks on AODV in malicious environment. In: 1st International Conference on Next Generation Computing Technologies (NGCT), Dehradun, pp. 153\u2013157 (2015)","DOI":"10.1109\/NGCT.2015.7375103"},{"key":"34_CR18","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1155\/2015\/801632","volume":"2015","author":"B Madhusudhanan","year":"2015","unstructured":"Madhusudhanan, B., Chitra, S., Rajan, C.: Mobility based key management technique for multicast security in mobile ad hoc networks. Sci. World J. 2015, 10 (2015)","journal-title":"Sci. World J."},{"key":"34_CR19","first-page":"10","volume":"2015","author":"W-C Wu","year":"2015","unstructured":"Wu, W.-C., Liaw, H.-T.: A study on high secure and efficient MANET routing scheme. J. Sens. 2015, 10 (2015)","journal-title":"J. Sens."},{"key":"34_CR20","first-page":"10","volume":"2014","author":"H Chen","year":"2014","unstructured":"Chen, H., Chen, W., Wang, Z., Wang, Z., Li, Y.: Mobile beacon based wormhole attackers detection and positioning in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2014, 10 (2014)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"34_CR21","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1186\/1687-1499-2011-15","volume":"2011","author":"H-K Choi","year":"2011","unstructured":"Choi, H.-K., Kim, I.-H., Yoo, J.-C.: Secure and efficient protocol for vehicular ad hoc network with privacy preservation. EURASIP J. Wirel. Commun. Netw. 2011, 15 (2011)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"3","key":"34_CR22","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1109\/JSYST.2012.2231792","volume":"8","author":"MC Chuang","year":"2014","unstructured":"Chuang, M.C., Lee, J.F.: TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst. J. 8(3), 749\u2013758 (2014)","journal-title":"IEEE Syst. J."},{"key":"34_CR23","first-page":"8","volume":"2014","author":"W Li","year":"2014","unstructured":"Li, W., Yi, P., Wu, Y., Pan, L., Li, J.: A new intrusion detection system based on KNN classification algorithm in wireless sensor network. J. Electr. Comput. Eng. 2014, 8 (2014)","journal-title":"J. Electr. Comput. Eng."},{"key":"34_CR24","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1155\/2014\/865071","volume":"2014","author":"R Sekaran","year":"2014","unstructured":"Sekaran, R., Parasuraman, G.K.: A secure 3-way routing protocols for intermittently connected mobile ad hoc networks. Sci. World J. 2014, 13 (2014)","journal-title":"Sci. World J."},{"key":"34_CR25","doi-asserted-by":"crossref","unstructured":"Varshney, T., Sharma, T., Sharma, P.: Implementation of watchdog protocol with AODV in mobile ad hoc network. In: Fourth International Conference on Communication Systems and Network Technologies, Bhopal, pp. 217\u2013221 (2014)","DOI":"10.1109\/CSNT.2014.50"},{"key":"34_CR26","first-page":"10","volume":"2014","author":"W Yuan","year":"2014","unstructured":"Yuan, W.: An anonymous routing protocol with authenticated key establishment in wireless ad hoc networks. Int. J. Distrib. Sens. Netw. 2014, 10 (2014)","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"2","key":"34_CR27","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/TMC.2011.274","volume":"12","author":"EY Vasserman","year":"2013","unstructured":"Vasserman, E.Y., Hopper, N.: Vampire attacks: draining life from wireless ad hoc sensor networks. IEEE Trans. Mob. Comput. 12(2), 318\u2013332 (2013)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"34_CR28","doi-asserted-by":"crossref","unstructured":"Wang, B., Chen, X., Chang, W.: An efficient trust-based opportunistic routing for ad hoc networks. In: International Conference on Wireless Communications and Signal Processing (WCSP), Huangshan, pp. 1\u20137 (2012)","DOI":"10.1109\/WCSP.2012.6542838"},{"key":"34_CR29","doi-asserted-by":"crossref","unstructured":"Gonzalez, J.M., Anwar, M., Joshi, J.B.D.: Trust-based approaches to solve routing issues in ad-hoc wireless networks: a survey. In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, pp. 556\u2013563 (2011)","DOI":"10.1109\/TrustCom.2011.72"},{"issue":"6","key":"34_CR30","first-page":"68","volume":"8","author":"J Neeli","year":"2017","unstructured":"Neeli, J., Cauvery, N.K.: Insight to research progress on secure routing in wireless ad hoc network. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 8(6), 68\u201376 (2017)","journal-title":"Int. J. Adv. Comput. Sci. Appl. (IJACSA)"}],"container-title":["Advances in Intelligent Systems and Computing","Cybernetics and Algorithms in Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91192-2_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T03:53:18Z","timestamp":1571370798000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-91192-2_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,17]]},"ISBN":["9783319911915","9783319911922"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91192-2_34","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,5,17]]}}}