{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T05:22:36Z","timestamp":1741324956022,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223884"},{"type":"electronic","value":"9783642223891"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22389-1_3","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T00:01:55Z","timestamp":1309219315000},"page":"24-32","source":"Crossref","is-referenced-by-count":0,"title":["Cooperative Black-Hole Attack: A Threat to the Future of Wireless Mesh Networking"],"prefix":"10.1007","author":[{"given":"Shree","family":"Om","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Talib","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"3_CR1","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1109\/TNET.2007.904002","volume":"16","author":"I. Aad","year":"2008","unstructured":"Aad, I., Hubaux, P.J., Knightly, W.E.: Impact of Denial-of-Service Attacks on Ad-Hoc Networks. IEEE\/ACM Trans. Network\u00a016(4), 791\u2013802 (2008)","journal-title":"IEEE\/ACM Trans. Network"},{"issue":"1","key":"3_CR2","first-page":"10","volume":"7","author":"A. Baddache","year":"2010","unstructured":"Baddache, A., Belmehdi, A.: Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad Hoc Networks. International Journal of Computer Science and Information Security (IJCSIS)\u00a07(1), 10\u201316 (2010)","journal-title":"International Journal of Computer Science and Information Security (IJCSIS)"},{"issue":"10","key":"3_CR3","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MCOM.2002.1039859","volume":"40","author":"H. Deng","year":"2002","unstructured":"Deng, H., Li, W., Agarwal, P.D.: Routing Security in Wireless Ad-hoc Networks. IEEE Communications Magazine\u00a040(10), 70\u201375 (2002)","journal-title":"IEEE Communications Magazine"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Imani, M., Rajabi, M.E., Taheri, M., Naderi, M.: Vulnerabilities in Network Layer at WMN. In: International Conference on Educational and Network Technology (ICENT 2010), Qinhuangdao, China, pp. 487\u2013492 (2010)","DOI":"10.1109\/ICENT.2010.5532257"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R.C. Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"issue":"2","key":"3_CR6","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/s10207-003-0026-4","volume":"2","author":"L.J. Munoz","year":"2004","unstructured":"Munoz, L.J., Forne, J., Esparaza, O., Soriano, M.: Certificate Revocation System Implementation Based on the Merkle Hash Tree. International Journal of Information Security\u00a02(2), 110\u2013124 (2004)","journal-title":"International Journal of Information Security"},{"issue":"4","key":"3_CR7","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/MCOM.2008.4481351","volume":"46","author":"F. Nait-Abdesselam","year":"2008","unstructured":"Nait-Abdesselam, F., Bensaou, B., Taleb, T.: Detecting and Avoiding Wormhole Attacks in Wireless Ad-Hoc Networks. IEEE Communication Magazine\u00a046(4), 127\u2013133 (2008)","journal-title":"IEEE Communication Magazine"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Ramaswami, S.S., Upadhyaya, S.: Smart Handling of Colluding Black Hole Attacks in MANETs and Wireless Sensor Networks using Multipath Routing. In: IEEE Workshop on Information Assurance, New York, USA, pp. 253\u2013260 (2006)","DOI":"10.1109\/IAW.2006.1652103"},{"key":"3_CR9","unstructured":"Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks. In: International Conference on Wireless Networks (ICWN 2003), Las Vegas, Nevada, USA, pp. 570\u2013575 (2003)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Siddiqui, S.M., Hong, S.C.: Security Issues in Wireless Mesh Networks. In: IEEE International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), Seoul, South Korea, pp. 717\u2013722 (2007)","DOI":"10.1109\/MUE.2007.187"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Tamilselvan, L., Sankarnarayanan, V.: Prevention of Blackhole Attack in MANET. In: 2nd International Conference on Wireless Broadband and Ultraband Communications, Sydney, Australia, p. 21 (2007)","DOI":"10.1109\/AUSWIRELESS.2007.61"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Weerasinghe, H., Fu, H.: Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. In: Future Generation Communication and Networking (FGCN), Jeju, South Korea, pp. 362\u2013367 (2007)","DOI":"10.1109\/FGCN.2007.184"},{"key":"3_CR13","unstructured":"Yin, J., Madria, S.: A Hierarchical Secure Routing Protocol against Black Hole. In: IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, Taichung, Taiwan, p. 8 (2006)"},{"key":"3_CR14","volume-title":"Security in Wireless Mesh Networks","author":"V. Zhang","year":"2009","unstructured":"Zhang, V., Zheng, J., Hu, H.: Security in Wireless Mesh Networks. Auerbach Publications, Florida (2009)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Zhao, M., Zhou, J.: Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks. In: International Symposium on Information Engineering and Electronic Commerce, Ternopil, Ukraine, p. 26 (2009)","DOI":"10.1109\/IEEC.2009.12"}],"container-title":["Communications in Computer and Information Science","Digital Information Processing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22389-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T19:21:50Z","timestamp":1741288910000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22389-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223884","9783642223891"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22389-1_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}