{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,2]],"date-time":"2025-02-02T21:40:03Z","timestamp":1738532403440,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540895237"},{"type":"electronic","value":"9783540895244"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89524-4_56","type":"book-chapter","created":{"date-parts":[[2008,11,19]],"date-time":"2008-11-19T06:10:09Z","timestamp":1227075009000},"page":"564-573","source":"Crossref","is-referenced-by-count":1,"title":["Prevention of Black-Hole Attack using One-Way Hash Chain Scheme in Ad-Hoc Networks"],"prefix":"10.1007","author":[{"given":"JongMin","family":"Jeong","sequence":"first","affiliation":[]},{"given":"GooYeon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Zygmunt J.","family":"Haas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"56_CR1","unstructured":"Hu, Y.C., Johnson, D., Perrig, A.: Wormhole Attacks in Wireless Networks. IEEE Journal of Selected Area in Communication (2005)"},{"key":"56_CR2","unstructured":"Perrig, A., Hu, Y.C., Johnson, D.: Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. In: ACM Workshop on Wireless Security (2003)"},{"issue":"6","key":"56_CR3","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MCOM.2002.1039859","volume":"10","author":"H. Deng","year":"2002","unstructured":"Deng, H., Li, W., Agrawal, D.P.: Routing Security in Wireless Ad hoc Networks. IEEE Communication\u00a010(6), 70\u201375 (2002)","journal-title":"IEEE Communication"},{"key":"56_CR4","volume-title":"WiSe 2002","author":"M.G. Zapata","year":"2002","unstructured":"Zapata, M.G., Asokan, N.: Secure Ad-hoc Routing Protocols. In: WiSe 2002. ACM Press, New York (2002)"},{"key":"56_CR5","doi-asserted-by":"crossref","unstructured":"Al-Shurman, M., Yoo, S.M., Park, S.J.: Blackhole Attack in Mobile Ad Hoc Networks. In: ACMSE 2004 (2004)","DOI":"10.1145\/986537.986560"},{"key":"56_CR6","doi-asserted-by":"crossref","unstructured":"Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting Black-hole Attack in Mobile Ad Hoc Networks. In: EPMCC 2003 (2003)","DOI":"10.1145\/941311.941323"},{"key":"56_CR7","doi-asserted-by":"crossref","unstructured":"Animesh, P., Amitabh, M.: Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks (2003)","DOI":"10.1049\/cp:20030303"},{"key":"56_CR8","unstructured":"Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of Cooperate Blackhole Attack in Wireless Ad Hoc Networks. In: ICWN 2003 (2003)"},{"key":"56_CR9","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: 6th MobiCom, Boston (2000)","DOI":"10.1145\/345910.345955"},{"key":"56_CR10","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM\u00a024, 770\u2013772 (1981)","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Information Networking. Towards Ubiquitous Networking and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89524-4_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,2]],"date-time":"2025-02-02T21:10:57Z","timestamp":1738530657000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89524-4_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540895237","9783540895244"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89524-4_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}