{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T05:13:08Z","timestamp":1737177188842,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540726944"},{"type":"electronic","value":"9783540726975"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72697-5_26","type":"book-chapter","created":{"date-parts":[[2007,6,23]],"date-time":"2007-06-23T13:07:18Z","timestamp":1182604038000},"page":"302-314","source":"Crossref","is-referenced-by-count":12,"title":["Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks"],"prefix":"10.1007","author":[{"given":"Oscar F.","family":"Gonzalez","sequence":"first","affiliation":[]},{"given":"Michael","family":"Howarth","sequence":"additional","affiliation":[]},{"given":"George","family":"Pavlou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"26_CR1","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1145\/190809.190334","volume":"24","author":"V. Bharghavan","year":"1994","unstructured":"Bharghavan, V., Demers, A., Shenker, S., Zhang, L.: MACAW: A Media Access Protocol for Wireless LANs. ACM SIGCOMM Computer Communication Review\u00a024(4), 212\u2013225 (1994)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: Proceedings of the 8th ACM International Conference on Mobile Computing and Networking, September 2002, pp. 12\u201323 (2002)","DOI":"10.1145\/570645.570648"},{"issue":"2","key":"26_CR3","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1109\/JSAC.2005.861384","volume":"24","author":"H. Yang","year":"2006","unstructured":"Yang, H., Shu, J., Meng, X., Lu, S.: SCAN: Self-organized network-layer security in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications\u00a024(2), 261\u2013273 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1109\/JSAC.2005.861387","volume":"24","author":"D. Subhadrabandhu","year":"2006","unstructured":"Subhadrabandhu, D., Sarkar, S., Anjum, F.: A framework for misuse detection in ad hoc networks \u2013 part I. IEEE Journal on Selected Areas in Communications\u00a024, 274\u2013289 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"26_CR5","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1109\/JSAC.2005.861388","volume":"24","author":"D. Subhadrabandhu","year":"2006","unstructured":"Subhadrabandhu, D., Sarkar, S., Anjum, F.: A framework for misuse detection in ad hoc networks \u2013 part II. IEEE Journal on Selected Areas in Communications\u00a024, 290\u2013304 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"26_CR6","unstructured":"Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE workshop on Mobile Computing Systems & Applications, June 2002, pp. 3\u201313 (2002)"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. In: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, January 2002, pp. 193\u2013204 (2002)","DOI":"10.1016\/S1570-8705(03)00018-0"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: Proceedings of the 10th IEEE International Conference on Network Protocols, November 2002, pp. 78\u201387 (2002)","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Guerrero-Zapata, M., Asokan, N.: Securing ad hoc routing protocols. In: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 1\u201310 (2002)","DOI":"10.1145\/570681.570682"},{"key":"26_CR10","unstructured":"Guerrero-Zapata, M.: Secure ad hoc on-demand distance vector (SAODV) routing. Internet Draft, IETF Mobile Ad Hoc Networking Working Group, draft-guerrero-manet-saodv-05.txt (February 2005)"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Hubaux, J.P., Butty\u00e1n, L., \u010capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 146\u2013155 (2001)","DOI":"10.1145\/501416.501437"},{"issue":"4","key":"26_CR12","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1145\/190809.190336","volume":"24","author":"C.E. Perkins","year":"1994","unstructured":"Perkins, C.E., Bhagwat, P.: Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Computer Communication Review\u00a024(4), 234\u2013244 (1994)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computer Systems & Applications, pp. 90\u2013100 (1999)","DOI":"10.1109\/MCSA.1999.749281"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Perkins, C.E.: Ad hoc on-demand distance vector (AODV) routing. Request For Comments (RFC) 3561 (July 2003), available at: http:\/\/www.ietf.org\/rfc\/rfc3561.txt","DOI":"10.17487\/rfc3561"},{"key":"26_CR15","unstructured":"Johnson, D.B., Maltz, D.A., Hu, Y.C.: The dynamic source routing protocol for mobile ad hoc networks. Internet Draft, IETF MANET Working Group, draft-ietf-manet-dsr-10.txt (July 2004)"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Awerbuch, B., Holmes, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to Byzantine failures. In: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 21\u201330 (2002)","DOI":"10.1145\/570681.570684"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of the IEEE Symposium on Security and Privacy, May 2000, pp. 56\u201373 (2000)","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Le Boudec, J.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM Symposium on Mobile Ad Hoc Networking & Computing, pp. 226\u2013236 (2002)","DOI":"10.1145\/513800.513828"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Proceedings of the 6th ACM International Conference on Mobile Computing and Networking, August 2000, pp. 275\u2013283 (2000)","DOI":"10.1145\/345910.345958"},{"issue":"2","key":"26_CR20","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/JSAC.2005.861392","volume":"24","author":"P. Papadimitratos","year":"2006","unstructured":"Papadimitratos, P., Haas, Z.: Secure data communication in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications\u00a024(2), 343\u2013356 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: Proceedings of the 9th IEEE International Conference on Network Protocols, November 2001, pp. 251\u2013260 (2001)","DOI":"10.1109\/ICNP.2001.992905"},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Network Magazine\u00a013(6) (1999)","DOI":"10.1109\/65.806983"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile ad hoc networks. In: Proceedings of the 6th ACM International Conference on Mobile Computing and Networking, August 2000, pp. 255\u2013265 (2000)","DOI":"10.1145\/345910.345955"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Rao, R., Kesidis, G.: Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited. In: Proceedings of the 2003 IEEE Global Telecommunications Conference, vol.\u00a05, pp. 2957\u20132961 (2003)","DOI":"10.1109\/GLOCOM.2003.1258776"},{"key":"26_CR25","doi-asserted-by":"crossref","unstructured":"Bradley, K.A., Cheung, S., Puketza, N., Mukherjee, B., Olsson, R.A.: Detecting disruptive routers: a distributed network monitoring approach. In: Proceedings of the 1998 Symposium on Security and Privacy, May 1998, pp. 115\u2013124 (1998)","DOI":"10.1109\/SECPRI.1998.674828"},{"key":"26_CR26","unstructured":"Karn, P.: MACA \u2013 a new channel access method for packet radio. In: ARRL\/CRRL Amateur Radio 9th Computer Networking Conference, September 1990, pp. 134\u2013240 (1990)"}],"container-title":["Lecture Notes in Computer Science","Wired\/Wireless Internet Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72697-5_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T13:53:35Z","timestamp":1737122015000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72697-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540726944","9783540726975"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72697-5_26","relation":{},"subject":[]}}