{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:57:33Z","timestamp":1725555453531},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642128264"},{"type":"electronic","value":"9783642128271"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12827-1_14","type":"book-chapter","created":{"date-parts":[[2010,5,5]],"date-time":"2010-05-05T15:15:11Z","timestamp":1273072511000},"page":"187-200","source":"Crossref","is-referenced-by-count":2,"title":["Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes"],"prefix":"10.1007","author":[{"given":"Farshid","family":"Farhat","sequence":"first","affiliation":[]},{"given":"Mohammad-Reza","family":"Pakravan","sequence":"additional","affiliation":[]},{"given":"Mahmoud","family":"Salmasizadeh","sequence":"additional","affiliation":[]},{"given":"Mohammad-Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Bhagwat, P.: Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In: Proc. of the ACM SIGCOMM (1994)","DOI":"10.1145\/190314.190336"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Royer, E.M., Das, S.R.: Ad-hoc On-demand Distance Vector (AODV) routing. In: IETF MANET Group (Janaury 2002)","DOI":"10.17487\/rfc3561"},{"key":"14_CR3","unstructured":"Johnson, D.B., Maltz, D.A., Hu, Y.C., Jetcheva, J.G.: The Dynamic Source Routing Protocol for Mobile Ad-hoc Networks. In: IETF MANET Group (February 2002)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Clausen, T., Jacquet, P.: RFC 3626: Optimized link state routing protocol OLSR (October 2003)","DOI":"10.17487\/rfc3626"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Balasubramanian, C., Garcia-Luna-Aceves, J.J.: Shortest Multipath Routing Using Labeled Distances. In: Proc. of 1st IEEE MASS (October 2004)","DOI":"10.1109\/MAHSS.2004.1392170"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Marina, M.K., Das, S.R.: On-Demand multipath distance vector routing in ad hoc networks. In: Proc. IEEE ICNP (2001)","DOI":"10.1109\/ICNP.2001.992756"},{"key":"14_CR7","unstructured":"Nasipuri, A., Castaneda, R., Das, S.R.: Performance of Multipath Routing for On-Demand Protocols in Mobile Ad Hoc Networks. In: ACM\/Kluwer Mobile Networks and Applications MONET (2001)"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Valera, A., Seah, W., Rao, S.V.: Cooperative packet caching and shortest multipath routing in mobile ad hoc networks. In: Proc. IEEE INFOCOM (2003)","DOI":"10.1109\/INFCOM.2003.1208678"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Park, V.D., Corson, M.S.: A highly adaptive distributed routing algorithm for mobile wireless networks. In: Proc. IEEE INFOCOM (1997)","DOI":"10.1109\/INFCOM.1997.631180"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Lee, S., Gerla, M.: Split Multipath routing with maximally disjoint paths in ad hoc networks. In: Proc. IEEE ICC (2001)","DOI":"10.1109\/ICC.2001.937262"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Raju, J., Garcia-Luna-Aceves, J.J.: A new approach to on-demand loop-free multipath routing. In: Proc. IC3N (1999)","DOI":"10.1109\/ICCCN.1999.805568"},{"key":"14_CR12","unstructured":"Michiardi, P., Molva, R.: Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks. In: Proc. European Wireless Conference (2002)"},{"key":"14_CR13","unstructured":"Buttyan, L., Hubaux, J.-P.: Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks, Technical Report DSC\/2001\/001 (2001)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Le Boudec, J.-Y.: Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In: 10th Euro-micro Workshop on Parallel, Distributed and Network-based Processing","DOI":"10.1109\/EMPDP.2002.994321"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Michiardi, P., Molva, R.: CORE: A Collaborative Reputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks. In: IFIP - Communication and Multimedia Security Conference (2002)","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"14_CR16","unstructured":"Yang, H., Meng, X., Lu, S.: Self-Organized Network-Layer Security in MANETs"},{"key":"14_CR17","unstructured":"Perrig, A., Hu, Y.-C., Johnson, D.B.: Wormhole Protection in Wireless Ad Hoc Networks. Technical Report TR01-384, Dep. of Computer Science, Rice University"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: Proc. of INFOCOM 2003 (April 2003)","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"14_CR19","unstructured":"Hu, L., Evans, D.: Using Directional Antennas to Prevent Wormhole Attacks. In: Network and Distributed System Security Symposium (NDSS), San Diego (February 2004)"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Lazos, L., Poovendran, R., Meadows, C., Syverson, P., Chang, L.W.: Preventing Wormhole Attacks on Wireless Ad-hoc Networks: A Graph Theoretic Approach. In: IEEE Wireless Communications and Networking Conference (2005)","DOI":"10.1109\/WCNC.2005.1424678"},{"key":"14_CR21","volume-title":"IPDPS","author":"N. Song","year":"2005","unstructured":"Song, N., Qian, L., Li, X.: Wormhole Attacks Detection in Wireless Ad-hoc Networks: A Statistical Analysis Approach. In: IPDPS. IEEE, Los Alamitos (2005)"},{"key":"14_CR22","volume-title":"ISPAN","author":"B. Wang","year":"2005","unstructured":"Wang, B., Soltani, S., Shapiro, J., Tan, P.: Local detection of selfish routing behavior in ad hoc networks. In: ISPAN. IEEE, Los Alamitos (2005)"},{"key":"14_CR23","volume-title":"Global Telecommunications Conference","author":"M. Khabbazian","year":"2006","unstructured":"Khabbazian, M., Mercier, H., Bhargava, V.K.: Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure. In: Global Telecommunications Conference. IEEE, Los Alamitos (2006)"}],"container-title":["Lecture Notes in Computer Science","Information Security, Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12827-1_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:57:30Z","timestamp":1606168650000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12827-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642128264","9783642128271"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12827-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}