{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T13:40:24Z","timestamp":1773322824548,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540235637","type":"print"},{"value":"9783540301912","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30191-2_28","type":"book-chapter","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T20:14:16Z","timestamp":1285186456000},"page":"358-374","source":"Crossref","is-referenced-by-count":11,"title":["Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV)"],"prefix":"10.1007","author":[{"given":"Tao","family":"Wan","sequence":"first","affiliation":[]},{"given":"Evangelos","family":"Kranakis","sequence":"additional","affiliation":[]},{"given":"Paul C.","family":"van Oorschot","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In: Proc. of WiSe 2002 (September 2002)","DOI":"10.1145\/570681.570684"},{"key":"28_CR2","unstructured":"Barbir, A., Murphy, S., Yang, Y.: Generic Threats to Routing Protocols. Internet Draft (April 13, 2004) (work in progress)"},{"issue":"2","key":"28_CR3","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/378444.378449","volume":"19","author":"S. Bellovin","year":"1989","unstructured":"Bellovin, S.: Security Problems in the TCP\/IP Protocol Suite. ACM Computer Communications Review\u00a019(2), 32\u201348 (1989)","journal-title":"ACM Computer Communications Review"},{"key":"28_CR4","unstructured":"Fall, K., Varadhan, K. (eds.): The ns Manual (formerly ns Notes and Documentation) (April 14, 2002), http:\/\/www.isi.edu\/nsnam\/ns\/doc\/index.html"},{"key":"28_CR5","unstructured":"Garcia-Luna-Aceves, J.J., Murthy, S.: A Loop-Free Algorithm Based on Predecessor Information. In: Proceedings of IEEE INFOCOM 1995, Boston, MA, USA (April 1995)"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: Proc. of MOBICOM 2002 (September 2002)","DOI":"10.1145\/570645.570648"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Johnson, D.B., Perrig, A.: Secure Efficient Distance Vector Routing Protocol in Mobile Wireless Ad Hoc Networks. In: Proc. of WMCSA 2002 (June 2002)","DOI":"10.1016\/S1570-8705(03)00019-2"},{"key":"28_CR8","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/S1570-8705(03)00019-2","volume":"1","author":"Y.C. Hu","year":"2003","unstructured":"Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. Ad Hoc Networks Journal\u00a01, 175\u2013192 (2003)","journal-title":"Ad Hoc Networks Journal"},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/978-3-540-39611-6_14","volume-title":"Proc. of ADHOCNOW 2003","author":"M. Just","year":"2003","unstructured":"Just, M., Kranakis, E., Wan, T.: Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks. In: Proc. of ADHOCNOW 2003. LNCS, vol.\u00a02856, pp. 151\u2013163. Springer, Heidelberg (2003)"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Malkin, G.: RIP Version 2. RFC 2453 (standard) (November 1998)","DOI":"10.17487\/rfc2453"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proc. of MOBICOMM 2000 (August 2000)","DOI":"10.1145\/345910.345955"},{"key":"28_CR12","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Bhagwat, P.: Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In: Proc. of the SIGCOMM 1994 (August 1994)","DOI":"10.1145\/190314.190336"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Rekhter, Y., Li, T.: A Border Gateway Protocol 4 (BGP-4), RFC 1771 (March 1995)","DOI":"10.17487\/rfc1771"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 Message-Digest Algorithm, RFC 1321 (April 1992)","DOI":"10.17487\/rfc1321"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Smith, B.R., Murphy, S., Garcia-Luna-Aceves, J.J.: Securing Distance-Vector Routing Protocols. In: Proc. of NDSS 1997, San Diego, USA (February 1997)","DOI":"10.1109\/NDSS.1997.579225"},{"issue":"2","key":"28_CR17","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/S0743-7315(02)00065-5","volume":"63","author":"L. Venkatraman","year":"2003","unstructured":"Venkatraman, L., Agrawal, D.P.: Strategies for Enhancing Routing Security in Protocols for Mobile Ad Hoc Networks. J. of Parallel Distributed Comp.\u00a063(2), 214\u2013227 (2003)","journal-title":"J. of Parallel Distributed Comp."},{"key":"28_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-540-24852-1_8","volume-title":"Applied Cryptography and Network Security","author":"T. Wan","year":"2004","unstructured":"Wan, T., Kranakis, E., van Oorschot, P.C.: S-RIP: A Secure Distance Vector Routing Protocol. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol.\u00a03089, pp. 103\u2013119. Springer, Heidelberg (2004)"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Zapata, M.G., Asokan, N.: Securing Ad Hoc Routing Protocols. In: Proceedings of the ACM Workshop on Wireless Security, WiSe 2002 (September 2002)","DOI":"10.1145\/570681.570682"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, Y.G., Lee, W., Huang, Y.A.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proc. of MOBICOM 2000 (August 2000)","DOI":"10.1145\/345910.345958"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network Magazine\u00a013(6) (November\/December 1999)","DOI":"10.1109\/65.806983"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30191-2_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T12:53:10Z","timestamp":1636548790000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30191-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540235637","9783540301912"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30191-2_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}