{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T05:22:43Z","timestamp":1741324963610,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642222023"},{"type":"electronic","value":"9783642222030"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22203-0_36","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T00:26:28Z","timestamp":1309220788000},"page":"408-418","source":"Crossref","is-referenced-by-count":3,"title":["An Enhanced Route Discovery Mechanism for AODV Routing Protocol"],"prefix":"10.1007","author":[{"given":"Kamarularifin Abd.","family":"Jalil","sequence":"first","affiliation":[]},{"given":"Zaid","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Jamalul-Lail Ab","family":"Manan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Perkin, C.E., Royer, E.M.: Ad-hoc on demand distance vector routing. In: Proceedings of 2nd IEEE Workshop on Mobile Computer Systems and Applications, New Orleans (1999)","DOI":"10.1109\/MCSA.1999.749281"},{"key":"36_CR2","volume-title":"A review of routing protocols for mobile ad hoc networks","author":"M. Abolhasan","year":"2004","unstructured":"Abolhasan, M., Wysocki, T., Dutkiewicz, E.: A review of routing protocols for mobile ad hoc networks. Elsevier, Amsterdam (2004)"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Mahmood, R.A., Khan, A.I.: A Survey on Detecting Black Hole Attack in AODV-based Mobile Ad Hoc Networks. In: International Symposium on High Capacity Optical Networks and Enabling Technologies (2007)","DOI":"10.1109\/HONET.2007.4600258"},{"key":"36_CR4","unstructured":"Perkin, C.E.: Ad hoc On Demand Distance Vector (AODV) Routing. Internet draft, draft-ietf-manetaodv-02.txt (November 1988)"},{"key":"36_CR5","unstructured":"Kumar, V.: Simulation and Comparison of AODV and DSR Routing Protocols in MANETs, Master Thesis (2009)"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Xing, F., Wang, W.: Understanding Dynamic Denial of Service Attacks in Mobile Ad hoc Networks. In: IEEE Military Communication conference, MILCOM (2006)","DOI":"10.1109\/MILCOM.2006.302178"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Yi, S., Naldurg, P., Kravets, R.: Security-Aware Ad hoc Routing for Wireless Networks. In: Proc. 2nd ACM Symp. Mobile Ad hoc Networking and Computing (Mobihoc 2001), Long Beach, CA, pp. 299\u2013302 (October 2001)","DOI":"10.1145\/501416.501464"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Sanzgiti, K., Dahill, B., Levine, B.N., Shields, C., Elizabeth, M., Belding-Royer: A secure Routing Protocol for Ad hoc networks. In: Proceedings of the 10th EEE International Conference on Network Protocols, ICNP 2002 (2002)","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"36_CR9","unstructured":"Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks. In: Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, pp. 3\u201313 (June 2002)"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad hoc Networks. In: Proc. 8th ACM Int\u2019l. Conf. Mobile Computing and Networking (Mobicom 2002), Atlanta, Georgia, pp. 12\u201323 (September 2002)","DOI":"10.1145\/570645.570648"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lee, W.: Intrusion detection in wireless ad \u2013 hoc networks. In: Proceedings of the 6th annual international Mobile computing and networking Conference (2000)","DOI":"10.1145\/345910.345958"},{"key":"36_CR12","unstructured":"Lee, S., Han, B., Shin, M.: Robust routing in wireless ad hoc networks. In: ICPP Workshops, p. 73 (2002)"},{"key":"36_CR13","unstructured":"Stamouli, I.: Real-time Intrusion Detection for Ad hoc Networks. Master\u2019s thesis, University of Dublin (Septermber 2003)"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Shurman, M.A., Yoo, S.M., Park, S.: Black hole attack in wireless ad hoc networks. In: ACM 42nd Southeast Conference (ACMSE 2004), pp. 96\u201397 (April 2004)","DOI":"10.1145\/986537.986560"},{"key":"36_CR15","unstructured":"Dokurer, S.: Simulation of Black hole attack in wireless Ad-hoc networks. Master\u2019s thesis, At\u0131l\u0131mUniversity (September 2006)"},{"key":"36_CR16","first-page":"54","volume":"2","author":"P.N. Raj","year":"2009","unstructured":"Raj, P.N., Swadas, P.B.: DPRAODV: A Dynamic Learning System Against Blackhole Attack In Aodv Based Manet. International Journal of Computer Science Issues\u00a02, 54\u201359 (2009)","journal-title":"International Journal of Computer Science Issues"},{"issue":"3","key":"36_CR17","first-page":"338","volume":"5","author":"S. Kurosawa","year":"2007","unstructured":"Kurosawa, S., Nakayama, H., Kat, N., Jamalipour, A., Nemoto, Y.: Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method. International Journal of Network Security\u00a05(3), 338\u2013346 (2007)","journal-title":"International Journal of Network Security"},{"key":"36_CR18","unstructured":"Mistry, N.H., Jinwala, D.C., Zaveri, M.A.: MOSAODV: Solution to Secure AODV against Blackhole Attack. International Journal of Computer and Network Security (IJCNS)\u00a01(3) ( December 2009)"},{"key":"36_CR19","unstructured":"Subramaniam, S., Palpanas, T., Papadopoulos, D., Kalogerakiand, V., Gunopulos, D.: Online Outlier Detectionin Sensor Data using Non-parametric Models. J.Very Large DataBases, VLDB (2006)"},{"key":"36_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identification of Outliers","author":"D.M. Hawkins","year":"1980","unstructured":"Hawkins, D.M.: Identification of Outliers. Chapman and Hall, London (1980)"}],"container-title":["Communications in Computer and Information Science","Software Engineering and Computer Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22203-0_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T19:26:24Z","timestamp":1741289184000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22203-0_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642222023","9783642222030"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22203-0_36","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}