{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:56:39Z","timestamp":1742385399140,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642021176"},{"type":"electronic","value":"9783642021183"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02118-3_8","type":"book-chapter","created":{"date-parts":[[2009,5,20]],"date-time":"2009-05-20T08:40:51Z","timestamp":1242808851000},"page":"85-96","source":"Crossref","is-referenced-by-count":6,"title":["The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Mauro","family":"Conti","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Gabrielli","sequence":"additional","affiliation":[]},{"given":"Luigi Vincenzo","family":"Mancini","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Mei","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"8_CR1","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.1109\/TMC.2007.1014","volume":"6","author":"S. Bandyopadhyay","year":"2007","unstructured":"Bandyopadhyay, S., Coyle, E.J., Falck, T.: Stochastic properties of mobility models in mobile ad hoc networks. IEEE Transactions on Mobile Computing\u00a06(11), 1218\u20131229 (2007)","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"3","key":"8_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/961268.961287","volume":"7","author":"C. Bettstetter","year":"2003","unstructured":"Bettstetter, C.: Topology properties of ad hoc networks with random waypoint mobility. SIGMOBILE Mob. Comput. Commun. Rev.\u00a07(3), 50\u201352 (2003)","journal-title":"SIGMOBILE Mob. Comput. Commun. Rev."},{"doi-asserted-by":"crossref","unstructured":"Capkun, S., Hubaux, J.-P., Butty\u00e1n, L.: Mobility helps security in ad hoc networks. In: MobiHoc 2003 (2003)","key":"8_CR3","DOI":"10.1145\/778415.778422"},{"doi-asserted-by":"crossref","unstructured":"Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In: MobiHoc 2007 (2007)","key":"8_CR4","DOI":"10.1145\/1288107.1288119"},{"doi-asserted-by":"crossref","unstructured":"Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks. In: WiSec 2008, pp. 214\u2013219 (2008)","key":"8_CR5","DOI":"10.1145\/1352533.1352568"},{"issue":"1","key":"8_CR6","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.entcs.2006.11.009","volume":"171","author":"R. Curtmola","year":"2007","unstructured":"Curtmola, R., Kamara, S.: A mechanism for communication-efficient broadcast encryption over wireless ad hoc networks. Electronic Notes in Theoretical Computer Science (ENTCS)\u00a0171(1), 57\u201369 (2007)","journal-title":"Electronic Notes in Theoretical Computer Science (ENTCS)"},{"doi-asserted-by":"crossref","unstructured":"Demirbas, M., Song, Y.: An RSSI-based scheme for sybil attack detection in wireless sensor networks. In: WOWMOM 2006 (2006)","key":"8_CR7","DOI":"10.1109\/WOWMOM.2006.27"},{"issue":"6","key":"8_CR8","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1007\/s11276-006-6530-5","volume":"12","author":"R. Di Pietro","year":"2006","unstructured":"Di Pietro, R., Mancini, L.V., Mei, A.: Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wireless Networks\u00a012(6), 709\u2013721 (2006)","journal-title":"Wireless Networks"},{"doi-asserted-by":"crossref","unstructured":"Gabrielli, A., Mancini, L.V., Setia, S., Jajodia, S.: Securing topology maintenance protocols for sensor networks: Attacks and countermeasures. In: SecureComm 2005, pp. 101\u2013112 (2005)","key":"8_CR9","DOI":"10.1109\/SECURECOMM.2005.34"},{"unstructured":"Grossglauser, M., Vetterli, M.: Locating nodes with EASE: last encounter routing in ad hoc networks through mobility diffusion. In: INFOCOM 2003 (2003)","key":"8_CR10"},{"doi-asserted-by":"crossref","unstructured":"Hayashibara, N., Cherif, A., Katayama, T.: Failure detectors for large-scale distributed systems. In: SRDS 2002 (2002)","key":"8_CR11","DOI":"10.1109\/RELDIS.2002.1180218"},{"issue":"6","key":"8_CR12","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1109\/TMC.2006.86","volume":"5","author":"E. Hyyti\u00e4","year":"2006","unstructured":"Hyyti\u00e4, E., Lassila, P., Virtamo, J.: Spatial node distribution of the random waypoint mobility model with applications. IEEE Transactions on Mobile Computing\u00a05(6), 680\u2013694 (2006)","journal-title":"IEEE Transactions on Mobile Computing"},{"unstructured":"Information Processing Technology Office (IPTO) Defense Advanced Research Projects Agency (DARPA). BAA 07-46 LANdroids Broad Agency Announcement (2007), http:\/\/www.darpa.mil\/IPTO\/solicit\/open\/BAA-07-46_PIP.pdf","key":"8_CR13"},{"issue":"5","key":"8_CR14","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1109\/TPDS.2007.1023","volume":"18","author":"H. Liu","year":"2007","unstructured":"Liu, H., Wan, P.-J., Liu, X., Yao, F.: A distributed and efficient flooding scheme using 1-hop information in mobile ad hoc networks. IEEE Transactions on Parallel and Distributed Systems\u00a018(5), 658\u2013671 (2007)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"unstructured":"Luo, J., Hubaux, J.-P.: Joint mobility and routing for lifetime elongation in wireless sensor networks. In: INFOCOM 2005 (2005)","key":"8_CR15"},{"doi-asserted-by":"crossref","unstructured":"Mei, A., Stefa, J.: SWIM: A simple model to generate small mobile worlds. In: INFOCOM 2009 (2009)","key":"8_CR16","DOI":"10.1109\/INFCOM.2009.5062134"},{"doi-asserted-by":"crossref","unstructured":"Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: IPSN 2004 (2004)","key":"8_CR17","DOI":"10.1145\/984622.984660"},{"issue":"6","key":"8_CR18","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A. Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commununications of ACM\u00a047(6), 53\u201357 (2004)","journal-title":"Commununications of ACM"},{"doi-asserted-by":"crossref","unstructured":"Piro, C., Shields, C., Levine, B.N.: Detecting the sybil attack in mobile ad hoc networks. In: SecureComm 2006 (2006)","key":"8_CR19","DOI":"10.1109\/SECCOMW.2006.359558"},{"unstructured":"Scott, J., Gass, R., Crowcroft, J., Hui, P., Diot, C., Chaintreau, A.: Crawdad data set cambridge\/haggle (v. 2006-01-31) (January 2006), http:\/\/crawdad.cs.dartmouth.edu\/cambridge\/haggle\/imote\/infocom","key":"8_CR20"},{"doi-asserted-by":"crossref","unstructured":"Sharma, G., Mazumdar, R., Shroff, N.B.: Delay and capacity trade-offs in mobile ad hoc networks: A global perspective. In: INFOCOM 2006 (2006)","key":"8_CR21","DOI":"10.1109\/INFOCOM.2006.144"},{"doi-asserted-by":"crossref","unstructured":"Striki, M., Baras, J., Manousakis, K.: A robust, distributed TGDH-based scheme for secure group communications in MANET. In: Proceedings of ICC 2004 (2006)","key":"8_CR22","DOI":"10.1109\/ICC.2006.255105"},{"issue":"12","key":"8_CR23","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.1109\/TPDS.2004.73","volume":"15","author":"L. Wang","year":"2004","unstructured":"Wang, L., Olariu, S.: A two-zone hybrid routing protocol for mobile ad hoc networks. IEEE Trans. Parallel Distrib. Syst.\u00a015(12), 1105\u20131116 (2004)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"doi-asserted-by":"crossref","unstructured":"Yoon, J., Liu, M., Noble, B.: Random waypoint considered harmful. In: INFOCOM 2003 (2003)","key":"8_CR24","DOI":"10.1109\/INFCOM.2003.1208967"}],"container-title":["Lecture Notes in Computer Science","Wired\/Wireless Internet Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02118-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T16:06:34Z","timestamp":1739117194000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02118-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642021176","9783642021183"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02118-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}