{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:41:22Z","timestamp":1742924482159,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176494"},{"type":"electronic","value":"9783642176500"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17650-0_30","type":"book-chapter","created":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T15:22:11Z","timestamp":1291648931000},"page":"430-444","source":"Crossref","is-referenced-by-count":1,"title":["A Trust-Based IDS for the AODV Protocol"],"prefix":"10.1007","author":[{"given":"Mohamed Ali","family":"Ayachi","sequence":"first","affiliation":[]},{"given":"Christophe","family":"Bidan","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Prigent","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Perkins, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing. RFC3561 (2003)","DOI":"10.17487\/rfc3561"},{"key":"30_CR2","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MCSA.1999.749281","volume-title":"Proc. 2nd IEEE Workshop on Mobile Computing Systems and Applications, Proceedings (WMCSA 1999)","author":"C. Perkins","year":"1999","unstructured":"Perkins, C., Royer, E.: Ad-hoc on-demand distance vector routing. In: Proc. 2nd IEEE Workshop on Mobile Computing Systems and Applications, Proceedings (WMCSA 1999), vol.\u00a02, pp. 90\u2013100. IEEE Computer Society, Los Alamitos (1999)"},{"key":"30_CR3","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/ICNP.2002.1181388","volume-title":"Proc. 10th IEEE International Conference on Network Protocols (ICNP 2002)","author":"K. Sanzgiri","year":"2002","unstructured":"Sanzgiri, K., Dahill, B., Levine, B., Shields, C., Belding-Royer, E.: A Secure Routing Protocol for Ad Hoc Networks. In: Proc. 10th IEEE International Conference on Network Protocols (ICNP 2002), pp. 78\u201389. IEEE Computer Society, Los Alamitos (2002)"},{"key":"30_CR4","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/S1570-8705(03)00019-2","volume":"1","author":"Y. Hu","year":"2003","unstructured":"Hu, Y., Johnson, D., Perrig, A.: SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks\u00a01, 175\u2013192 (2003)","journal-title":"Ad Hoc Networks"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Johnson, D., Hu, Y., Maltz, D.: The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4. RFC4728 (2007)","DOI":"10.17487\/rfc4728"},{"key":"30_CR6","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s11276-004-4744-y","volume":"11","author":"Y. Hu","year":"2005","unstructured":"Hu, Y., Perrig, A., Johnson, D.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wireless Networks (WiNet)\u00a011, 21\u201338 (2005)","journal-title":"Wireless Networks (WiNet)"},{"key":"30_CR7","first-page":"1","volume-title":"Proc. 1st ACM Workshop on Wireless Security (WiSE 2002)","author":"M. Zapata","year":"2002","unstructured":"Zapata, M., Asokan, N.: Securing ad hoc routing protocols. In: Proc. 1st ACM Workshop on Wireless Security (WiSE 2002), pp. 1\u201310. ACM, New York (2002)"},{"key":"30_CR8","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1145\/513800.513828","volume-title":"Proc. 3rd IEEE\/ACM Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 2002)","author":"S. Buchegger","year":"2002","unstructured":"Buchegger, S., Le Boudec, J.: Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes: Fairness In Dynamic Ad-hoc NeTworks. In: Proc. 3rd IEEE\/ACM Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 2002), pp. 226\u2013236. ACM, New York (2002)"},{"key":"30_CR9","unstructured":"Pirzada, A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: Proc. 27th Australasian Conference on Computer Science (ACSC 2004), vol.\u00a026, pp. 47\u201354. Australian Computer Society, Inc. (2004)"},{"key":"30_CR10","unstructured":"Bansal, S., Baker, M.: Observation-based Cooperation Enforcement in Ad Hoc Network. Computing Research Repository (CoRR) cs.NI\/0307012 (2003)"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Li, X., Lyu, M., Liu, J.: A Trust Model Based Routing Protocol for Secure Ad-hoc Networks. In: Proc. Aerospace Conference (AC 2004), vol.\u00a02, pp. 1286\u20131295. IEEE, Los Alamitos (2004)","DOI":"10.1109\/AERO.2004.1367726"},{"key":"30_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-540-30143-1_7","volume-title":"Recent Advances in Intrusion Detection","author":"Y. Huang","year":"2004","unstructured":"Huang, Y., Lee, W.: Attack Analysis and Detection for Ad Hoc Routing Protocols. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 125\u2013145. Springer, Heidelberg (2004)"},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/SMCSIA.2003.1232402","volume-title":"Proc. IEEE Systems, Man and Cybernetics Society, Information Assurance Workshop (IAW 2003)","author":"P. Ning","year":"2003","unstructured":"Ning, P., Sun, K.: How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. In: Proc. IEEE Systems, Man and Cybernetics Society, Information Assurance Workshop (IAW 2003), pp. 60\u201367. IEEE, Los Alamitos (2003)"},{"key":"30_CR14","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/NPSEC.2005.1532054","volume-title":"Proc. 1st Workshop on Secure Network Protocols (NPSec 2005)","author":"M. Wang","year":"2005","unstructured":"Wang, M., Lamont, L., Mason, P., Gorlatova, M.: An Effective Intrusion Detection Approach for OLSR MANET Protocol. In: Proc. 1st Workshop on Secure Network Protocols (NPSec 2005), pp. 55\u201360. IEEE, Los Alamitos (2005)"},{"key":"30_CR15","first-page":"52","volume-title":"Proc. 3rd IEEE International Conference on Wireless and Mobile Communications (ICWMC 2007)","author":"F. Cuppens","year":"2007","unstructured":"Cuppens, F., Cuppens-Boulahia, N., Nuon, S., Ramard, T.: Property based intrusion detection to secure OLSR. In: Proc. 3rd IEEE International Conference on Wireless and Mobile Communications (ICWMC 2007), pp. 52\u201360. IEEE Computer Society, Los Alamitos (2007)"},{"key":"30_CR16","first-page":"75","volume-title":"Proc. Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM 2007)","author":"A. Adnane","year":"2007","unstructured":"Adnane, A., Sousa, R., Bidan, C., M\u00e9, L.: Analysis of the implicit trust within the OLSR protocol. In: Proc. Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM 2007), vol.\u00a0238, pp. 75\u201390. Springer, Heidelberg (2007)"},{"key":"30_CR17","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1109\/CSE.2009.125","volume-title":"Proc. 12th IEEE International Conference on Computational Science and Engineering (CSE 2009)","author":"M. Ayachi","year":"2009","unstructured":"Ayachi, M., Bidan, C., Abbes, T., Bouhoula, A.: Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol. In: Proc. 12th IEEE International Conference on Computational Science and Engineering (CSE 2009), pp. 802\u2013808. IEEE Computer Society, Los Alamitos (2009)"},{"key":"30_CR18","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1145\/986858.986876","volume-title":"Proc. 1st ACM workshop on Security of Ad Hoc and Sensor Networks (SASN 2003)","author":"C. Tseng","year":"2003","unstructured":"Tseng, C., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K.: A specification-based intrusion detection system for AODV. In: Proc. 1st ACM workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), pp. 125\u2013134. ACM, New York (2003)"},{"key":"30_CR19","volume-title":"Introduction to Network Simulator NS2","author":"T. Issariyakul","year":"2008","unstructured":"Issariyakul, T., Hossain, E.: Introduction to Network Simulator NS2. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17650-0_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T13:53:17Z","timestamp":1740750797000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17650-0_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176494","9783642176500"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17650-0_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}