{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:30:34Z","timestamp":1725564634432},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157653"},{"type":"electronic","value":"9783642157660"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15766-0_78","type":"book-chapter","created":{"date-parts":[[2010,9,2]],"date-time":"2010-09-02T20:41:05Z","timestamp":1283460065000},"page":"478-483","source":"Crossref","is-referenced-by-count":1,"title":["Performance Modeling of MANET Routing Protocols with Multiple Mode Wormhole Attacks"],"prefix":"10.1007","author":[{"given":"Yogesh","family":"Chaba","sequence":"first","affiliation":[]},{"given":"Yudhvir","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Kanwar Preet","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Prabha","family":"Rani","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"78_CR1","unstructured":"Chun Hu, Y., Perrig, A., Johnson David, B.: Wormhole Detection in Wireless Ad Hoc Networks. In: Ninth International Conference on Network protocol, ICNP 2001 (June 2002)"},{"key":"78_CR2","doi-asserted-by":"crossref","unstructured":"Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N.: A Survey of Routing Attacks in Mobile Ad Hoc Networks. IEEE Wireless Communications, 85\u201391 (October 2007)","DOI":"10.1109\/MWC.2007.4396947"},{"key":"78_CR3","unstructured":"Wu, B., Chen, J., Wu, J., Cardei, M.: \u2018A Survey on Attack and Countermeasures in Mobile ad hoc Networks. Wiley Journal Wireless Communication and Mobile Computing, WCMC (2006)"},{"key":"78_CR4","doi-asserted-by":"crossref","unstructured":"Panaousis, E.A., Nazaryan, L., Politis, C.: Securing AODV Against Wormhole Attacks in Emergency MANET Multimedia Communications. In: ICST Mobimedia 2009, London, UK, September 7-9 (2009)","DOI":"10.4108\/ICST.MOBIMEDIA2009.7292"},{"key":"78_CR5","unstructured":"Win, K.: Analysis of Detecting Wormhole Attack in Wireless Networks. In: Proc. of World Academy of Science, Engineering and Technology, vol.\u00a036 (December 2008) ISSN 2070-3740"},{"key":"78_CR6","doi-asserted-by":"crossref","unstructured":"Mahajan, V., Natu, M., Sethi, A.S.: Analysis of Wormhole Intrusion Attack in MANETs. In: Proc. IEEE Military Communication Conference (2008)","DOI":"10.1109\/MILCOM.2008.4753176"},{"key":"78_CR7","unstructured":"Alexandrovna, M.: Review of Existing Wormhole Discovery Technique. In: Proc. Conference of the IEEE Computer and Communication Societies, vol.\u00a03 (August 2006)"}],"container-title":["Communications in Computer and Information Science","Information and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15766-0_78.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T13:05:39Z","timestamp":1619787939000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15766-0_78"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157653","9783642157660"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15766-0_78","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}