{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:40:37Z","timestamp":1725550837549},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122132"},{"type":"electronic","value":"9783642122149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12214-9_30","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T19:11:44Z","timestamp":1270062704000},"page":"175-180","source":"Crossref","is-referenced-by-count":0,"title":["Tracking Based Secure AODV Routing Protocol"],"prefix":"10.1007","author":[{"given":"Parma","family":"Nand","sequence":"first","affiliation":[]},{"given":"S. C.","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Rani","family":"Astya","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MWC.2004.1269716","volume":"11","author":"H. Yang","year":"2004","unstructured":"Yang, H.: Security in Mobile Adhoc Networks: Challenges and Solutions. IEEE Wireless Communications\u00a011, 38\u201347 (2004)","journal-title":"IEEE Wireless Communications"},{"key":"30_CR2","unstructured":"Papadimitos, P., Hass, Z.: Secure Routing for Mobile Adhoc Networks. In: CNDS (2002), http:\/\/wnl.ece.cornell.edu\/Publications\/cnds02.pdf"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Royer, E.M., Das, S.R.: Ad-hoc On-Demand Distance Vector Routing (AODV) [EB\/OL] (November 2002), http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-manet-aodv-12.txt","DOI":"10.17487\/rfc3561"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad hoc Networks. In: Proceedings of the MobiCom 2002, Atlanta, Georgia, USA, September 23-28 (2002)","DOI":"10.1145\/570645.570648"},{"key":"30_CR5","unstructured":"Habib, A., Hafeeda, M.H., Bhargava, B.: Detecting Service Violation and DoS Attacks. In: Proceedings of Network and Distributed System Security Symposium, NDSS (2003)"},{"key":"30_CR6","first-page":"3","volume-title":"Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications(WMCSA 2002)","author":"Y.-C. Hu","year":"2002","unstructured":"Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications(WMCSA 2002), June 2002, pp. 3\u201313. IEEE, Calicoon (2002)"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Sanzgiri, K., Dahill, B.: A Secure Routing Protocol for Ad Hoc Networks. In: IEEE International Conference on Network Protocols (IC2 NP), Paris, France (2002)","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"30_CR8","unstructured":"Papadimitratos, Z.J.H.: Secure Routing for Mobile Ad Hoc Networks. In: Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, San Antonio, USA (2002)"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Royer, E.M., Toh, C.K.: A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. IEEE Personal Communications\u00a0(4), 46\u201355 (1999)","DOI":"10.1109\/98.760423"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Hu, Y., Perrig, A., Johnson, D.: Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks. In: ACM MOBICOM 2002 (2002)","DOI":"10.1145\/570645.570648"},{"key":"30_CR11","series-title":"Lecture Notes in Computer Science","first-page":"298","volume-title":"Mathematical Foundations of Computer Science 1989","author":"J.W. Jia","year":"1989","unstructured":"Jia, J.W., He, Y.: A Security Enhanced AODV Routing Protocol. In: Kreczmar, A., Mirkowska, G. (eds.) MFCS 1989. LNCS, vol.\u00a0379, pp. 298\u2013307. Springer, Heidelberg (1989)"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Acs, G., Buttyan, L., Vazda, I.: Provably Secure On-Demand Source Routing in Mobile Adhoc Networks, Technical report (March 2005)","DOI":"10.1109\/TMC.2006.170"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T., Lai, K.: Mitigating Routing Misbehavior in Mobile Adhoc Networks. In: 6th annual ACM\/IEEE International Conference on Mobile Computing and Networking 2000 (2000)","DOI":"10.1145\/345910.345955"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12214-9_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T17:43:04Z","timestamp":1685554984000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12214-9_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122132","9783642122149"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12214-9_30","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}