{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T05:19:31Z","timestamp":1740028771858,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122132"},{"type":"electronic","value":"9783642122149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12214-9_36","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T19:11:44Z","timestamp":1270062704000},"page":"217-223","source":"Crossref","is-referenced-by-count":12,"title":["A Novel Security Approach for Detecting Black Hole Attack in MANET"],"prefix":"10.1007","author":[{"given":"N.","family":"Jaisankar","sequence":"first","affiliation":[]},{"given":"R.","family":"Saravanan","sequence":"additional","affiliation":[]},{"given":"K. Durai","family":"Swamy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"36_CR1","first-page":"338","volume":"5","author":"S. Kurosawa","year":"2007","unstructured":"Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y.: Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method. International Journal of Network Security\u00a05(3), 338\u2013346 (2007)","journal-title":"International Journal of Network Security"},{"key":"36_CR2","volume-title":"The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications","author":"V.. Sankaranarayanan","year":"2007","unstructured":"Sankaranarayanan, V., Tamilselvan, L.: Prevention of Blackhole Attack in MANET. In: The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications. IEEE, Los Alamitos (2007)"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Shurman, M.A., Yoo, S.M., Park, S.: Black hole attack in wireless ad hoc networks. In: ACM 42nd Southeast Conference (ACMSE 2004), April 2004, pp. 96\u201397 (2004)","DOI":"10.1145\/986537.986560"},{"key":"36_CR4","unstructured":"Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks. In: Proceedings of the International Conference on Wireless Networks (June 2003)"},{"issue":"10","key":"36_CR5","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MCOM.2002.1039859","volume":"40","author":"H. Deng","year":"2002","unstructured":"Deng, H., Li, W., Agrawal, D.P.: Routing security in ad hoc networks. IEEE Communications Magazine\u00a040(10), 70\u201375 (2002)","journal-title":"IEEE Communications Magazine"},{"key":"36_CR6","unstructured":"Lee, S., Han, B., Shin, M.: Robust routing in wireless ad hoc networks. In: ICPP Workshops, p. 73 (2002)"},{"key":"36_CR7","volume-title":"Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks","author":"A. Patcha","year":"2006","unstructured":"Patcha, A., Mishra, A.: Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks. IEEE, Los Alamitos (2006)"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: 6th MobiCom, Boston, Massachusetts (August 2000)","DOI":"10.1145\/345910.345955"},{"key":"36_CR9","volume-title":"Workshop on Information Assurance Proceedings","author":"S.S. Ramaswami","year":"2006","unstructured":"Ramaswami, S.S., Upadhyaya, S.: Smart Handling of Colluding Black Hole Attacks in MANETs and Wireless Sensor Networks using Multipath Routing. In: Workshop on Information Assurance Proceedings. IEEE, Los Alamitos (2006)"},{"key":"36_CR10","volume-title":"EPMCC","author":"B. Sun","year":"2003","unstructured":"Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting Black-hole Attack in Mobile Ad Hoc Networks. In: EPMCC. IEEE, Los Alamitos (2003)"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12214-9_36.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T20:11:30Z","timestamp":1739995890000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12214-9_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122132","9783642122149"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12214-9_36","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}