{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:18Z","timestamp":1725558678561},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255840"},{"type":"electronic","value":"9783540319795"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31979-5_4","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T16:42:55Z","timestamp":1277916175000},"page":"36-47","source":"Crossref","is-referenced-by-count":0,"title":["Robust Routing in Malicious Environment for Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Zhongchao","family":"Yu","sequence":"first","affiliation":[]},{"given":"Chuk-Yang","family":"Seng","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Xue","family":"Wu","sequence":"additional","affiliation":[]},{"given":"William A.","family":"Arbaugh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand routing protocol for ad hoc networks. MobiCom (2002)","DOI":"10.1145\/570645.570648"},{"key":"4_CR2","unstructured":"Hu, Y.-C., Johnson, D.B., Perrig, A.: Secure efficient distance vector routing in mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA) (June 2002)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: Rushing attacks and defense in wireless ad hoc network routing protocols. In: WiSe (2003)","DOI":"10.1145\/941311.941317"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Zapata, M.G., Asokan, N.: Securing ad hoc routing protocols. In: WiSe (2002)","DOI":"10.1145\/570681.570682"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Sanzgiri, K., Dahill, B.: A secure routing protocol for ad hoc networks. In: ICNP 2002 (2002)","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes: Fairness In Dynamic Ad-hoc Networks). In: MobiHoc 2002 (2002)","DOI":"10.1145\/513824.513828"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom 2000 (2000)","DOI":"10.1145\/345910.345955"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, p. 251. Springer, Heidelberg (2002)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Buttyan, L., Hubaux, J.-P.: Enforcing service availability in mobile ad hoc WANs. In: Proceedings of the IEEE\/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston (August 2000)","DOI":"10.1109\/MOBHOC.2000.869216"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Buttyan, L., Hubaux, J.-P.: Stimulating cooperation in self-organization mobile ad hoc networks. ACM\/Kluwer Mobile Networks and Applications\u00a08(5) (October 2003)","DOI":"10.1023\/A:1025146013151"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Jackobsson, M., Hubaux, J.-P., Buttyan, L.: A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In: Proceedings of Financial Cryptography (2003)","DOI":"10.1007\/978-3-540-45126-6_2"},{"key":"4_CR12","volume-title":"Proceedings of INFOOM","author":"S. Zhong","year":"2003","unstructured":"Zhong, S., Yang, Y.R., Chen, J.: Sprite: a simple, cheat-proof, credit-based system for mobile ad hoc networks. In: Proceedings of INFOOM. IEEE, Los Alamitos (2003)"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Capkun, S., Hubaux, J.-P.: BISS: building secure routing out of an incomplete set of security associations. In: WiSe 2003 (2003)","DOI":"10.1145\/941311.941316"},{"key":"4_CR14","first-page":"139","volume-title":"Ad Hoc Networking, Ch. 5","author":"D. Johnson","year":"2001","unstructured":"Johnson, D., Maltz, D., Broch, J.: DSR The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. In: Perkins, C.E. (ed.) Ad Hoc Networking, Ch. 5, pp. 139\u2013172. Addison-Wesley, Reading (2001)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.-C., Jetcheva, J.: A performance comparison of multi-hop wireless ad hoc network routing protocols. In: Proceedings of the 4th Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MOBICOM 1998), Dallas, TX, USA, October 1998, pp. 85\u201397 (1998)","DOI":"10.1145\/288235.288256"},{"key":"4_CR16","unstructured":"The Network Simulator ns-2, http:\/\/www.isi.edu\/nsnam\/ns\/"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31979-5_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:32:40Z","timestamp":1605760360000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31979-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255840","9783540319795"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31979-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}