{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T05:50:36Z","timestamp":1774158636710,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642122132","type":"print"},{"value":"9783642122149","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12214-9_81","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T19:11:44Z","timestamp":1270062704000},"page":"468-474","source":"Crossref","is-referenced-by-count":4,"title":["Trust Based Strategy to Resist Collaborative Blackhole Attack in Manet"],"prefix":"10.1007","author":[{"given":"N.","family":"Bhalaji","sequence":"first","affiliation":[]},{"given":"Alok V.","family":"Kanakeri","sequence":"additional","affiliation":[]},{"given":"Krishna P.","family":"Chaitanya","sequence":"additional","affiliation":[]},{"given":"A.","family":"Shanmugam","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"81_CR1","volume-title":"Ad Hoc Wireless Networks: Architectures and Protocols","author":"C. Siva Ram Murthy","year":"2004","unstructured":"Siva Ram Murthy, C., Manoj, B.S.: Ad Hoc Wireless Networks: Architectures and Protocols. Prentice Hall, Englewood Cliffs (2004)"},{"key":"81_CR2","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-0-585-29603-6_5","volume":"353","author":"D.B. Johnson","year":"1996","unstructured":"Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Adhoc wireless networking. Mobile Computing\u00a0353, 153\u2013181 (1996)","journal-title":"Mobile Computing"},{"issue":"40","key":"81_CR3","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MCOM.2002.1039858","volume":"10","author":"P. Papadimitratos","year":"2002","unstructured":"Papadimitratos, P., Haas, Z.J.: Securing the Internet Routing Infrastructure. IEEE Communications\u00a010(40), 60\u201368 (2002)","journal-title":"IEEE Communications"},{"key":"81_CR4","unstructured":"Hod, B.: Cooperative and Reliable Packet- Forwarding On top of AODV (2005), www.cs.huji.ac.il\/~dolev\/pubs\/reliable-aodv.pdf"},{"key":"81_CR5","unstructured":"Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of Cooperative Black Hole Attack in Wireless AdHoc Networks (2003), www.cs.ndsu.nodak.edu\/~nygard\/research\/BlackHoleMANET.pdf"},{"key":"81_CR6","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: Eighth Annual International Conference on Mobile Computing and Networking (Mobi-Com 2002), September 2002, pp. 12\u201323 (2002)","DOI":"10.1145\/570646.570648"},{"key":"81_CR7","unstructured":"Zapata, M.G.: Secure Ad hoc On-Demand Distance Vector (SAODV) Routing. IETF Internet Draft, draft-guerrero-manet-saodv-00.txt (2001)"},{"issue":"3","key":"81_CR8","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1145\/581291.581312","volume":"6","author":"M.G. Zapata","year":"2002","unstructured":"Zapata, M.G.: Secure Ad hoc On-Demand Distance Vector Routing. ACM SIGMOBILE Mobile Computing and Communications Review\u00a06(3), 106\u2013107 (2002)","journal-title":"ACM SIGMOBILE Mobile Computing and Communications Review"},{"key":"81_CR9","doi-asserted-by":"crossref","unstructured":"Zapata, M.G., Asokan, N.: Securing Ad hoc Routing Protocols. In: International Conference on Mobile Computing and Networking, Atlanta, GA, USA, pp. 1\u201310 (2002)","DOI":"10.1145\/570681.570682"},{"key":"81_CR10","unstructured":"Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In: The 4th IEEE Workshop on Mobile Computing Systems & Applications, June 2002, pp. 3\u201313 (2002)"},{"key":"81_CR11","unstructured":"Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A Secure Routing Protocol for Ad Hoc Networks. In: 10th IEEE International Conference on Network Protocols (ICNP 2002), Paris, France, pp. 78\u201389 (2002)"},{"issue":"3","key":"81_CR12","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2004.1","volume":"2","author":"Y.C. Hu","year":"2004","unstructured":"Hu, Y.C., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Security & Privacy Magazine\u00a02(3), 28\u201339 (2004)","journal-title":"IEEE Security & Privacy Magazine"},{"key":"81_CR13","doi-asserted-by":"crossref","unstructured":"Deng, H., Li, W., Agrawal, D.P.: Routing Security in Wireless Ad Hoc Network. IEEE Communications Magazines\u00a040(10) (October 2002)","DOI":"10.1109\/MCOM.2002.1039859"},{"issue":"3","key":"81_CR14","first-page":"39","volume":"2","author":"]. Weerasinghe","year":"2008","unstructured":"Weerasinghe, ]., Fu, H.: Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. International Journal of Software Engineering and Its Applications\u00a02(3), 39\u201354 (2008)","journal-title":"International Journal of Software Engineering and Its Applications"},{"key":"81_CR15","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Royer, E.M.: Ad hoc on demand distance vector routing. In: Proceedings of IEEE Workshop on Mobile computing systems and Applications 1999, pp. 90\u2013100 (February 1999)","DOI":"10.1109\/MCSA.1999.749281"},{"key":"81_CR16","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1109\/EMPDP.2002.994321","volume-title":"Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network\u2013based processing","author":"S. Buchegger","year":"2002","unstructured":"Buchegger, S., Le Boudec, J.-Y.: Nodes Bearing Grudges: Towards Routing Security, Fairness and robustness in Mobile ad hoc networks. In: Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network\u2013based processing, Canary Islands, Spain, January 2002, pp. 403\u2013410. IEEE Computer Society, Los Alamitos (2002)"},{"key":"81_CR17","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehaviour in Mobile ad hoc networks. In: Proceedings of MOBICOM 2000, pp. 255\u2013265 (2000)","DOI":"10.1145\/345910.345955"},{"key":"81_CR18","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Boudec, J.-Y.L.: Performance Analysis of the CONFIDANT Protocol. Cooperation of Nodes - Fairness in Dynamic Ad-hoc Networks. Technical Report (IC\/2002\/01), EPFL I&C, Lausanne, January 21 (2002)","DOI":"10.1145\/513800.513828"},{"key":"81_CR19","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Boudec, J.Y.L.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM international symposium on Mobile ad hocnetworking & computing, Lausanne, Switzerland, June 2002, pp. 226\u2013236 (2002)","DOI":"10.1145\/513824.513828"},{"key":"81_CR20","doi-asserted-by":"crossref","unstructured":"Bhalaji, N., Shanmugam, A.: Association between nodes to Combat Blackhole attack in DSR based MANET. In: Proceedings of Sixth IEEE-IFIP International conference on WOCN, Egypt (2009) ISBN: 978-1-4244-4704-6, doi:10.1109\/WOCN.2009.5010579","DOI":"10.1109\/WOCN.2009.5010579"},{"key":"81_CR21","doi-asserted-by":"crossref","unstructured":"Broch, J., Johnson, D., Maltz, D., Hu, Y., Jetcheva, J.: A Performance Comparison of Multihop Wireless Ad Hoc Networking Protocols. In: Proceedings of 4th ACM\/IEEE International Conference on Mobile Computing and Networking (1998)","DOI":"10.1145\/288235.288256"},{"key":"81_CR22","unstructured":"Fall, K., Varadhan, K.: The ns manual, http:\/\/www.isi.edu\/nsnam\/ns\/doc\/index.html"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12214-9_81.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:06:10Z","timestamp":1619784370000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12214-9_81"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122132","9783642122149"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12214-9_81","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}