{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:58:24Z","timestamp":1725548304998},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_22","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T11:44:00Z","timestamp":1266839040000},"page":"421-432","source":"Crossref","is-referenced-by-count":1,"title":["Security for Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Nikos","family":"Komninos","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dimitrios D.","family":"Vergados","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christos","family":"Douligeris","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"2","key":"22_CR1","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.cose.2005.09.005","volume":"25","author":"N. Komninos","year":"2006","unstructured":"N.\u00a0Komninos, D.\u00a0Vergados, C.\u00a0Douligeris: Layered security design for mobile ad-hoc networks, J. Comput. Secur. 25(2), 121\u2013130 (2006)","journal-title":"J. Comput. Secur."},{"issue":"5","key":"22_CR2","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1016\/j.cose.2006.12.011","volume":"26","author":"N. Komninos","year":"2007","unstructured":"N.\u00a0Komninos, D.\u00a0Vergados, C.\u00a0Douligeris: Authentication in a layered security approach for mobile ad hoc networks, J. Comput. Secur. 26(5), 373\u2013380 (2007)","journal-title":"J. Comput. Secur."},{"issue":"6","key":"22_CR3","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L. Zhou","year":"1999","unstructured":"L.\u00a0Zhou, Z.J.\u00a0Haas: Securing ad hoc networks, IEEE Netw. Mag. 13(6), 24\u201330 (1999)","journal-title":"IEEE Netw. Mag."},{"issue":"4","key":"22_CR4","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1002\/sec.21","volume":"1","author":"J.-S. Lee","year":"2008","unstructured":"J.-S.\u00a0Lee, C.-C.\u00a0Chang: Preserving data integrity in mobile ad hoc networks with variant Diffie\u2013Hellman protocol, Secur. Commun. Netw. J. 1(4), 277\u2013286 (2008)","journal-title":"Secur. Commun. Netw. J."},{"key":"22_CR5","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"2004","unstructured":"A.J.\u00a0Menezes, S.A.\u00a0Vanstone, P.C.\u00a0Van Oorschot: Handbook of Applied Cryptography (CRC Press, Boca Raton 2004)"},{"issue":"3","key":"22_CR6","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/LCOMM.2008.071793","volume":"12","author":"L. Harn","year":"2008","unstructured":"L.\u00a0Harn, J.\u00a0Ren: Design of fully deniable authentication cervice for e-mail applications, IEEE Commun. Lett. 12(3), 219\u2013221 (2008)","journal-title":"IEEE Commun. Lett."},{"key":"22_CR7","unstructured":"X. Li, L. Zhiwei, A. Ye: Analysis and countermeasure of selfish node problem in mobile ad hoc network, 10th International Conference on Computer Supported Cooperative Work in Design (CSCWD\u201906), May 2006 (2006) 1\u20134"},{"issue":"1","key":"22_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TMC.2007.250670","volume":"6","author":"C. Basile","year":"2007","unstructured":"C.\u00a0Basile, Z.\u00a0Kalbarczyk, R.K.\u00a0Iyer.: Inner-circle consistency for wireless ad hoc Networks, IEEE Trans. Mobile Comput. 6(1), 39\u201355 (2007)","journal-title":"IEEE Trans. Mobile Comput."},{"issue":"2","key":"22_CR9","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/JSAC.2005.861394","volume":"24","author":"Y.-C. Hu","year":"2006","unstructured":"Y.-C.\u00a0Hu, A.\u00a0Perrig, D.B.\u00a0Johnson.: Wormhole attacks in wireless networks, IEEE J. Sel. Areas Commun. 24(2), 370\u2013380 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"22_CR10","unstructured":"B. Kannhavong, H. Nakayama, A. Jamalipour: SA-OLSR: Security aware optimized link state routing for mobile ad hoc networks, IEEE International Conference on Communications (ICC\u201908), 19\u201323 May 2008 (2008) 1464\u20131468"},{"key":"22_CR11","unstructured":"J. Dwoskin, D. Xu, J. Huang, M. Chiang, R. Lee: Secure key management architecture against sensor-node fabrication attacks, IEEE Global Telecommunications Conference (GLOBECOM\u201907), 26\u201330 Nov. 2007 (2007) 166\u2013171"},{"issue":"3","key":"22_CR12","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1109\/TVT.2006.873834","volume":"55","author":"M. Hejmo","year":"2006","unstructured":"M.\u00a0Hejmo, B.L.\u00a0Mark, C.\u00a0Zouridaki, R.K.\u00a0Thomas: Design and analysis of a denial-of-service-resistant quality-of-service signaling protocol for MANETs, IEEE Trans. Vehic. Technol. 55(3), 743\u2013751 (2006)","journal-title":"IEEE Trans. Vehic. Technol."},{"key":"22_CR13","volume-title":"Ad Hoc Networking","author":"C. Perkins","year":"2000","unstructured":"C.\u00a0Perkins: Ad Hoc Networking (Addison-Wesley, Boston, USA 2000)"},{"key":"22_CR14","unstructured":"S.P. Alampalayam, A. Kumar: Security model for routing attacks in mobile ad hoc networks, IEEE 58th Vehicular Technology Conference (VTC 2003-Fall), Vol. 3, 6\u20139 Oct. 2003 (2003) pp.\u00a02122\u20132126"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"P. Papadimitratos, Z.J. Haas: Secure routing for mobile ad hoc networks, SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio (2002)","DOI":"10.1201\/9781420040401.ch31"},{"key":"22_CR16","unstructured":"D. Johnson, Y. Hu, D. Maltz: Dynamic source routing, RFC 4728 (2007)"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"C. Perkins, E. Belding-Royer, S. Das: Ad hoc on-demand distance-vector routing (AODV), RFC 3561 (2003)","DOI":"10.17487\/rfc3561"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"J.\u00a0Hubaux, L.\u00a0Butty\u00e1n, S.\u00a0Capkun: The quest for security in mobile ad hoc networks, Proc. 2nd ACM international symposium on Mobile ad hoc networking and computing, USA (2001)","DOI":"10.1145\/501416.501437"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Hu, A.\u00a0Perrig, D.\u00a0Johnson: Ariadne: A Secure on-demand routing protocol for ad hoc networks, ACM Workshop on Wireless Security (ACM MobiCom) (2002)","DOI":"10.1145\/570645.570648"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M.\u00a0Belding-Royer: A secure routing protocol for ad hoc networks, Proc. 2002 IEEE Int. Conference on Network Protocols (ICNP), November 2002 (2002)","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"22_CR21","unstructured":"OPNET Technologies Inc.: http:\/\/www.opnet.com"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T14:00:32Z","timestamp":1634997632000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_22","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}