{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T04:45:43Z","timestamp":1725597943436},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227080"},{"type":"electronic","value":"9783642227097"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22709-7_16","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T12:13:09Z","timestamp":1311595989000},"page":"153-161","source":"Crossref","is-referenced-by-count":1,"title":["An Approach to Suppress Selfish Behavior of a Node in MANET by Hiding Destination Identity in Routing Path"],"prefix":"10.1007","author":[{"given":"Rahul","family":"Raghuvanshi","sequence":"first","affiliation":[]},{"given":"Mukesh Kumar","family":"Giluka","sequence":"additional","affiliation":[]},{"given":"Vasudev","family":"Dehalwar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MWC.2004.1269716","volume":"11","author":"H. Yang","year":"2004","unstructured":"Yang, H., Luo, H.Y., Ye, F., Lu, S.W., Zhang, L.: Security in Mobile Ad Hoc networks: challenges and solutions. IEEE Wireless Communications\u00a011, 38\u201347 (2004)","journal-title":"IEEE Wireless Communications"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Song, C., Zhang, Q.: OMH\u2014Suppressing Selfish Behavior in Ad hoc Networks with One More Hop. In: Mobile Netw Appl., pp. 178\u2013187 (2009)","DOI":"10.1007\/s11036-008-0145-2"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom 2000, pp. 255\u2013265 (2000)","DOI":"10.1145\/345910.345955"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Boudec, J.Y.L.: Self-policing mobile ad-hoc networks by reputation systems. IEEE Communications Magazine, 101\u2013107 (2005)","DOI":"10.1109\/MCOM.2005.1470831"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Michiardi, P., Molva, R.: Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: CMS 2002 (2002)","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"16_CR6","unstructured":"He, Q., Wu, D., Khosla, P.: Sori: A secure and objective reputation-based incentive scheme for ad hoc networks. In: WCNC 2004 (2004)"},{"key":"16_CR7","unstructured":"Buttyan, L., Hubaux, J.-P.: Stimulating cooperation in self-organizing mobile ad hoc networks. In: ACM\/Kluwer Mobile Networks and Applications (2003)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Zhong, S., Chen, J., Yang, Y.R.: Sprite: A simple cheat-proof, credit-based system for mobile ad-hoc networks. In: INFOCOM 2003, pp. 1987\u20131997 (2003)","DOI":"10.1109\/INFCOM.2003.1209220"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Anderegg, L., Eidenbenz, S.: Ad hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: International Conference on Mobile Computing and Networking, pp. 245\u2013259 (2003)","DOI":"10.1145\/938985.939011"},{"key":"16_CR10","unstructured":"Nguyen, H.L., Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. ELSEVIER Journal of Ad Hoc Network (2006)"},{"key":"16_CR11","unstructured":"Johnson, D., Maltz, D., Broch, J.: The dynamic source routing protocols for mobile ad hoc networks. Internet Draft, IETF Mobile Ad Hoc Network Working Group (1999)"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Royer, E.M., Das, S.R.: Ad hoc on demand distance vector (AODV) routing. In: Proceedings of IEEE WMCSA 1999, New Orleans, LA (1999)","DOI":"10.1109\/MCSA.1999.749281"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22709-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T05:17:06Z","timestamp":1560403026000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22709-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227080","9783642227097"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22709-7_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}