{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T00:02:24Z","timestamp":1744156944899,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540243960"},{"type":"electronic","value":"9783540304968"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30496-8_13","type":"book-chapter","created":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T15:39:21Z","timestamp":1267457961000},"page":"152-165","source":"Crossref","is-referenced-by-count":30,"title":["Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Frank","family":"Kargl","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Klenk","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Schlott","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Weber","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Johnson, D.B., Maltz, D.A., Hu, Y.-C., Jetcheva, J.G.: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR) (April 2003), http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-manet-dsr-09.txt"},{"volume-title":"Ad Hoc Networking","year":"2001","key":"13_CR2","unstructured":"Perkins, C.E. (ed.): Ad Hoc Networking. Addison-Wesley, Reading (2001)"},{"key":"13_CR3","unstructured":"Schneier, B.: Modeling security threats. Dr Dobb\u2019s Journal (December 1999), also available as: http:\/\/www.ddj.com\/documents\/s=896\/ddj9912a\/9912a.htm"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks. In: Proceedings of MobiCom 2002, Atlanta, Georgia, USA (September 2002)","DOI":"10.1145\/570645.570648"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX (January 2002), also available as: http:\/\/wnl.ece.cornell.edu\/Publications\/cnds02.pdf","DOI":"10.1201\/9781420040401.ch31"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad Hoc Networks. Working Session on Security in Wireless Ad Hoc Networks, EPFL, published in Mobile Computing and Communications Review\u00a06(4) (June 2002)","DOI":"10.1201\/9781420040401.ch31"},{"key":"13_CR7","volume-title":"Handbook of Ad Hoc Wireless Networks","author":"P. Papadimitratos","year":"2002","unstructured":"Papadimitratos, P., Haas, Z.J.: Securing Mobile Ad Hoc Networks. In: Ilyas, M. (ed.) Handbook of Ad Hoc Wireless Networks. CRC Press, Boca Raton (2002)"},{"key":"13_CR8","unstructured":"Papadimitratos, P., Haas, Z.J., Samar, P.: The Secure Routing Protocol (SRP) for Ad Hoc Networks (December 2002), draft-papadimitratos-secure-routing-protocol-00.txt"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Haas, Z.J.: Secure Link State Routing for Mobile Ad Hoc Networks. In: IEEE Workshop on Security and Assurance in Ad hoc Networks, in conjunction with the 2003 International Symposium on Applications and the Internet, Orlando, FL (January 2003)","DOI":"10.1109\/SAINTW.2003.1210190"},{"key":"13_CR10","unstructured":"Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A Secure Routing Protocol for Ad Hoc Networks. In: Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP) (November 2002), also available as: http:\/\/signl.cs.umass.edu\/pubs\/aran.icnp02.ps"},{"issue":"3","key":"13_CR11","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1145\/581291.581312","volume":"6","author":"M.G. Zapata","year":"2002","unstructured":"Zapata, M.G.: Secure Ad hoc On-Demand Distance Vector Routing. ACM Mobile Computing and Communications Review (MC2R)\u00a06(3), 106\u2013107 (2002), also available as: http:\/\/doi.acm.org\/10.1145\/581291.581312","journal-title":"ACM Mobile Computing and Communications Review (MC2R)"},{"key":"13_CR12","unstructured":"Zapata, M.G., Asokan, N.: Securing Ad hoc Routing Protocols. In: Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe 2002), September 2002, pp. 1\u201310 (2002), also available as: http:\/\/doi.acm.org\/10.1145\/570681.570682"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.-C., Jetcheva, J.: A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In: Mobile Computing and Networking, pp. 85\u201397 (1998), also available as: http:\/\/citeseer.nj.nec.com\/broch98performance.html","DOI":"10.1145\/288235.288256"},{"key":"13_CR14","unstructured":"Butty\u00e1n, L., Hubaux, J.-P.: Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks. Technical Report DSC\/2001\/001, EPFL-DI-ICA (January 2001)"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Butty\u00e1n, L., Hubaux, J.-P.: Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. ACM\/Kluwer Mobile Networks and Applications\u00a08(5) (October 2003)","DOI":"10.1023\/A:1025146013151"},{"key":"13_CR16","unstructured":"Anderson, R., Kuhn, M.: Tamper Resistance - a Cautionary Note. In: Proceedings of the Second Usenix Workshop on Electronic Commerce, November 1996, pp. 1\u201311 (1996), also available as: http:\/\/citeseer.nj.nec.com\/article\/anderson96tamper.html"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: IWSP: International Workshop on Security Protocols. LNCS (1997), also available as: http:\/\/citeseer.nj.nec.com\/anderson97low.html","DOI":"10.1007\/BFb0028165"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Zhong, S., Chen, J., Yang, Y.R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of IEEE Infocom 2003, San Francisco, CA (April 2003)","DOI":"10.1109\/INFCOM.2003.1209220"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Mobile Computing and Networking, pp. 255\u2013265 (2000), also available as: http:\/\/citeseer.nj.nec.com\/marti00mitigating.html","DOI":"10.1145\/345910.345955"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Mobile Computing and Networking, pp. 275\u2013283 (2000), also available as: http:\/\/citeseer.nj.nec.com\/zhang00intrusion.html","DOI":"10.1145\/345910.345958"},{"key":"13_CR21","unstructured":"Zhang, Y., Lee, W., Huang, Y.-A.: Intrusion Detection Techniques for Mobile Wireless Networks. ACM Wireless Networks (WINET), 9 (to appear, 2003), also available as: http:\/\/www.wins.hrl.com\/people\/ygz\/papers\/winet03.pdf"},{"key":"13_CR22","unstructured":"Michiardi, P., Molva, R.: Prevention of Denial of Service attacks and Selfishness in Mobile Ad Hoc Networks, http:\/\/www.eurecom.fr\/~michiard\/pub\/michiardi_adhoc_dos.ps"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Michiardi, P., Molva, R.: A Collaborative Reputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks. In: Proceedings of the 6th IFIP Communication and Multimedia Security Conference, Portorosz, Slovenia (September 2002)","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"13_CR24","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1109\/EMPDP.2002.994321","volume-title":"Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing","author":"S. Buchegger","year":"2002","unstructured":"Buchegger, S., Le Boudec, J.-Y.: Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In: Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, Canary Islands, Spain, January 2002, pp. 403\u2013410. IEEE Computer Society, Los Alamitos (2002), http:\/\/citeseer.nj.nec.com\/article\/buchegger02nodes.html"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness in Distributed Ad-hoc Networks. In: Proceedings of IEEE\/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH (June 2002)","DOI":"10.1145\/513800.513828"},{"key":"13_CR26","unstructured":"Kargl, F.: Sicherheit in Mobilen Ad hoc Netzwerken. PhD thesis, University of Ulm, Ulm, Germany (2003), also available as: http:\/\/medien.informatik.uni-ulm.de\/frank\/research\/dissertation.pdf"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In: ACM Workshop on Wireless Security (WiSe), Atlanta, Georgia (September 2002), also available as: http:\/\/citeseer.nj.nec.com\/article\/awerbuch02demand.html","DOI":"10.1145\/570681.570684"}],"container-title":["Lecture Notes in Computer Science","Security in Ad-hoc and Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30496-8_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T22:38:36Z","timestamp":1739918316000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30496-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540243960","9783540304968"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30496-8_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}