{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:53:44Z","timestamp":1764996824411},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744757"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74477-1_87","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T19:15:06Z","timestamp":1188328506000},"page":"975-986","source":"Crossref","is-referenced-by-count":1,"title":["Security Analysis of TORA Routing Protocol"],"prefix":"10.1007","author":[{"given":"Vee Liem","family":"Chee","sequence":"first","affiliation":[]},{"given":"Wei Chuen","family":"Yau","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"87_CR1","doi-asserted-by":"crossref","unstructured":"Corson, M.S., Ephremides, A.: A Distributed Routing Algorithm for Mobile Radio Networks. In: Proceedings of the IEEE Military Communications Conference, Piscataway, NJ (October 1989)","DOI":"10.1109\/MILCOM.1989.103927"},{"key":"87_CR2","doi-asserted-by":"crossref","unstructured":"Hu, Y., Perrig, A., Johnson, D.B.: Ariadne. A Secure On-Demand Routing Protocol for Ad Hoc Networks. Department of Computer Science, Rice University, Tech. Rep. TR01-383 (December 2001)","DOI":"10.1145\/570645.570648"},{"key":"87_CR3","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom 2000) (August 2000)","DOI":"10.1145\/345910.345955"},{"key":"87_CR4","doi-asserted-by":"crossref","unstructured":"Ning, P., Sun, K.: How to Misuse AODV: A Case Study of Insider Attacks Against Mobile Ad hoc Routing Protocols. In: Proceedings IEEE Information Assurance Workshop, West Point, NY (June 2003)","DOI":"10.1109\/SMCSIA.2003.1232402"},{"key":"87_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11562948_30","volume-title":"Automated Technology for Verification and Analysis","author":"J.-M. Orset","year":"2005","unstructured":"Orset, J.-M., Alcalde, B., Cavalli, A.: An EFSM-Based Intrusion Detection System for Ad Hoc Networks. In: Peled, D.A., Tsay, Y.-K. (eds.) ATVA 2005. LNCS, vol.\u00a03707, Springer, Heidelberg (2005)"},{"key":"87_CR6","unstructured":"Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad Hoc Networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS2002), San Antonio, TX (January 2002)"},{"key":"87_CR7","doi-asserted-by":"crossref","unstructured":"Papadimitrators, P., Haas, Z.J.: Secure Message Transmission in Mobile Ad Hoc Networks. In: Ad Hoc Networks 2003, pp. 193\u2013209 (2003)","DOI":"10.1016\/S1570-8705(03)00018-0"},{"key":"87_CR8","doi-asserted-by":"publisher","first-page":"1405","DOI":"10.1109\/INFCOM.1997.631180","volume-title":"Proceedings of IEEE INFOCOM \u201997","author":"V. Park","year":"1997","unstructured":"Park, V., Corson, S.: A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks. In: Proceedings of IEEE INFOCOM \u201997, pp. 1405\u20131413. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"87_CR9","unstructured":"Park, V., Corson, S.: Temporally-ordered Routing Algorithm (TORA) Version 1: Functional Specification, Internet Draft, draft-ietf-manet-tora-spec-04.txt (July 2001)"},{"issue":"2","key":"87_CR10","first-page":"2","volume":"5","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Canetti, R., Tygar, D., Song, D.: The TESLA Broadcast Authentication Protocol. RSA Cryptobytes (RSA Laboratories)\u00a05(2), 2\u201313 (2002)","journal-title":"RSA Cryptobytes (RSA Laboratories)"},{"key":"87_CR11","volume-title":"Proceedings of the 3rd IEEE International Workshop on Information Assurance","author":"D. Sterne","year":"2005","unstructured":"Sterne, D., Balasubramanyam, P., Carman, D., Wilson, B., Talpade, R., Ko, C., Balupari, R., Tseng, C.-Y., Bowen, T., Levitt, K., Rowe, J.: A General Cooperative Intrusion Detection Architecture for MANETs. In: Proceedings of the 3rd IEEE International Workshop on Information Assurance, IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"87_CR12","doi-asserted-by":"crossref","unstructured":"Tseng, C.Y., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K.: A Specification-Based Intrusion Detection System for AODV. In: ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN \u201903) (October 21, 2003)","DOI":"10.1145\/986858.986876"},{"key":"87_CR13","unstructured":"UCB\/LBNL\/VINT. The Network Simulator - ns-2. Information Sciences Institute (ISI), University of Southern California, CA, available at http:\/\/www.isi.edu\/nsnam\/ns\/"},{"key":"87_CR14","volume-title":"Proceedings of IEEE International Conference on Telecommunication (ICT)","author":"W. Wang","year":"2003","unstructured":"Wang, W., Lu, Y., Bhargava, B.K.: On Vulnerability and Protection of Ad Hoc On-demand Distance Vector Protocol. In: Proceedings of IEEE International Conference on Telecommunication (ICT). IEEE Computer Society Press, Los Alamitos (2003)"},{"issue":"1","key":"87_CR15","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MWC.2004.1269716","volume":"11","author":"H. Yang","year":"2004","unstructured":"Yang, H., Luo, H., Ye, F., Lu, S., Zhang, U.: Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications\u00a011(1), 38\u201347 (2004)","journal-title":"IEEE Wireless Communications"},{"key":"87_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad Hoc Networks. In: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom 2000) (August 2000)","DOI":"10.1145\/345910.345958"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74477-1_87.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T23:05:36Z","timestamp":1684019136000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74477-1_87"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744757"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74477-1_87","relation":{},"subject":[]}}