{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:58:06Z","timestamp":1725548286946},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_21","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T16:44:00Z","timestamp":1266857040000},"page":"407-420","source":"Crossref","is-referenced-by-count":2,"title":["Mobile Ad Hoc Network Routing"],"prefix":"10.1007","author":[{"given":"Melody","family":"Moh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ji","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"J.\u00a0Hu, M.\u00a0Burmester: LARS: a locally aware reputation system for mobile ad hoc networks, Proc. of the 44th ACM Annual Southeast Regional Conf., Melbourne (2006) pp. 119\u2013123","DOI":"10.1145\/1185448.1185475"},{"key":"21_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1216370.1216371","volume":"39","author":"J.V. Merwe","year":"2007","unstructured":"J.V.\u00a0Merwe, D.\u00a0Dawoud, S.\u00a0McDonald: A survey on peer-to-peer key management for mobile ad hoc networks, ACM Comput. Surv. 39, 1 (2007)","journal-title":"ACM Comput. Surv."},{"issue":"2","key":"21_CR3","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/98.760423","volume":"6","author":"E. Royer","year":"1999","unstructured":"E.\u00a0Royer, C.\u00a0Toh: A review of current routing protocols for ad hoc mobile wireless networks, IEEE Pers. Commun. 6(2), 46\u201355 (1999)","journal-title":"IEEE Pers. Commun."},{"key":"21_CR4","unstructured":"K.\u00a0Lai, M.\u00a0Baker, S.\u00a0Marti, T.\u00a0Giuli: Mitigating routing misbehavior in mobile ad hoc networks, Proc. Annual ACM Int. Conf. on Mobile Computing and Networking (MobiCom), Boston (2005) pp. 255\u2013265"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"P.\u00a0Michiardi, R.\u00a0Molva: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP Tc6\/Tc11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, IFIP Conf. Proc., Vol. 228, ed. by B.\u00a0Jerman-Bla\u017e\u0131\u010d, T.\u00a0Klobu\u010dar (B.V., Deventer 2002) pp. 107\u2013121","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"21_CR6","unstructured":"S. Bansal, M. Baker: Observation-based cooperation enforcement in ad hoc networks, technical report CS\/0307012 (Stanford University, 2003)"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Q.\u00a0He, D.\u00a0Wu, P.\u00a0Khosla: SORI: a secure and objective reputation-based incentive scheme for ad hoc networks, Proc. IEEE Wireless Communications and Networking Conf. (WCNC 2004), Atlanta (2004)","DOI":"10.1109\/WCNC.2004.1311293"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"D. Johnson, Y. Hu, D. Martz: The dynamic source routing protocol (DSR) for mobile ad hoc Networks for IPv4, RFC 4728, Internet Task Engineering Force (IETF) (2007)","DOI":"10.17487\/rfc4728"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"R.\u00a0Carruthers, I.\u00a0Nikolaidis: Certain limitations of reputation-based schemes in mobile environments, Proc. of the 8th ACM Int. Symp. on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), Montr\u00e9al (2005) pp. 2\u201311","DOI":"10.1145\/1089444.1089448"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"S.\u00a0Buchegger, J.\u00a0Le Boudec: Performance analysis of the CONFIDANT protocol, Proc. of the 3rd ACM Int. Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc), Lausanne (2002)","DOI":"10.1145\/513800.513828"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"S. Buchegger, J. Y. Le Boudec: A robust reputation system for mobile ad hoc networks, EPFL IC_Tech_Report_200350 (2003)","DOI":"10.1201\/9780203504086.ch20"},{"key":"21_CR12","unstructured":"X.\u00a0Li, M.R.\u00a0Lyu, J.\u00a0Liu: A trust model based routing protocol for secure ad hoc networks, Proc. of the IEEE Aerospace Conf. (2004) pp. 1286\u20131295"},{"key":"21_CR13","unstructured":"Y.\u00a0Rebahi, V.\u00a0Mujica, C.\u00a0Simons, D.\u00a0Sisalem: SAFE: Securing pAcket Forwarding in ad hoc nEtworks, of 5th Workshop on Applications and Services in Wireless Networks (2005)"},{"key":"21_CR14","unstructured":"T.\u00a0Anker, D.\u00a0Dolev, B.\u00a0Hod: Cooperative and reliable packet forwarding on top of AODV, Proc. of the 4th Int. Symp. on Modeling and Optimization in Mobile, Ad-hoc, and Wireless Networks, Boston (2006) pp. 1\u201310"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"C. Perkins, D. Belding-Royer, S. Das: Ad hoc on-demand distance vector (AODV) routing, RFC 3561, Internet Engineering Task Force (2003)","DOI":"10.17487\/rfc3561"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"J.\u00a0Doucer: The sybil attack, 1st Int. Workshop on Peer-to-Peer Systems (IPTPS\u201902) (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"S.\u00a0Laniepce, J.\u00a0Demerjian, A.\u00a0Mokhtari: Cooperation monitoring issues in ad hoc networks, Proc. of the Int. Conf. on Wireless Communications and Mobile Computing (2006) pp. 695\u2013700","DOI":"10.1145\/1143549.1143688"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"J. Li, T.-S. Moh, M. Moh: Path-based reputation system for MANET routing, accepted to present at the 7th Int. Conf. on Wired\/Wireless Internet Communications (WWIC), to be held in Enschede (2009)","DOI":"10.1007\/978-3-642-02118-3_5"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"N.\u00a0Haghpanah, M.\u00a0Akhoondi, M.\u00a0Kargar, A.\u00a0Movaghar: Trusted secure routing for ad hoc networks, Proc. of the 5th ACM Int. Workshop on Mobility Management and Wireless Access (MobiWac \u201907), Chania, Crete Island (2007) pp. 176\u2013179","DOI":"10.1145\/1298091.1298123"},{"issue":"5","key":"21_CR20","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1007\/s11276-006-6220-3","volume":"13","author":"Y. Zhang","year":"2007","unstructured":"Y.\u00a0Zhang, W.\u00a0Lou, W.\u00a0Liu, Y.\u00a0Fang: A secure incentive protocol for mobile ad hoc networks, Wirel. Netw. 13(5), 569\u2013582 (2007)","journal-title":"Wirel. Netw."},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"J.\u00a0Mundinger, J.\u00a0Le Boudec: Reputation in self-organized communication systems and beyond, Proc. of the 2006 Workshop on Interdisciplinary Systems Approach in Performance Evaluation and Design of Computer and Communications Systems (Interperf \u201906), Pisa (2006)","DOI":"10.1145\/1190326.1190328"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:39:23Z","timestamp":1606185563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_21","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}