{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:55:20Z","timestamp":1725602120275},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642236402"},{"type":"electronic","value":"9783642236419"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23641-9_35","type":"book-chapter","created":{"date-parts":[[2011,8,24]],"date-time":"2011-08-24T02:26:20Z","timestamp":1314152780000},"page":"435-449","source":"Crossref","is-referenced-by-count":1,"title":["Bullet-Proof Verification (BPV) Method to Detect Black Hole Attack in Mobile Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Firoz","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Seokhoon","family":"Yoon","sequence":"additional","affiliation":[]},{"given":"Hoon","family":"Oh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","volume-title":"The Handbook of Ad Hoc Networks","author":"M. Ilyas","year":"2002","unstructured":"Ilyas, M.: The Handbook of Ad Hoc Networks. CRC PRESS, Boca Raton (2002)"},{"key":"35_CR2","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/98.556477","volume":"3","author":"B.M. Leiner","year":"1996","unstructured":"Leiner, B.M., Ruth, R.J., Sastry, A.R.: Goals and challenges of the DARPA GloMo program. IEEE Personal Communications\u00a03, 34\u201343 (1996)","journal-title":"IEEE Personal Communications"},{"key":"35_CR3","volume-title":"Ad hoc Wireless Networks-Architectures and Protocols","author":"C. Siva Ram Murthy","year":"2007","unstructured":"Siva Ram Murthy, C., Manoj, B.S.: Ad hoc Wireless Networks-Architectures and Protocols. Pearson Education, London (2007)"},{"key":"35_CR4","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MCOM.2002.1039859","volume":"40","author":"H. Deng","year":"2002","unstructured":"Deng, H., Li, W., Agarwal, D.P.: Routing security in ad hoc networks. IEEE Communications Magazine\u00a040, 70\u201375 (2002)","journal-title":"IEEE Communications Magazine"},{"key":"35_CR5","unstructured":"Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: Proc. of IEEE INFOCOM (2002)"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. In: Proc. of ACM WiSe (2003)","DOI":"10.1145\/941311.941317"},{"key":"35_CR7","unstructured":"Yu, W., Sun, Y., Liu, K.R.: HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks. In: Proc. of the 24th IEEE INFOCOM, Miami, USA (2005)"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Desilva, S., Boppana, R.V.: Mitigating Malicious Control Packet Floods in Ad Hoc Networks. In: Proc. of IEEE WCNC 2005, pp. 2112\u20132117 (2005)","DOI":"10.1109\/WCNC.2005.1424844"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Royer, E.M., Das, S.: Ad-hoc On demand Distance Vector (AODV) Routing. In: RFC, p. 3561 (2003)","DOI":"10.17487\/rfc3561"},{"key":"35_CR10","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1016\/j.aeue.2009.01.008","volume":"64","author":"G. Kim","year":"2010","unstructured":"Kim, G., Han, Y., Kim, S.: A cooperative-sinkhole detection method for mobile ad hoc networks. AEU-International Journal of Electronics and Communications\u00a064, 390\u2013397 (2010)","journal-title":"AEU-International Journal of Electronics and Communications"},{"key":"35_CR11","doi-asserted-by":"crossref","unstructured":"Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: ACM Workshop on Wireless Security, WiSe (2002)","DOI":"10.1145\/570681.570684"},{"key":"35_CR12","unstructured":"Lee, S., Han, B., Shin, M.: Robust Routing in Wireless Ad Hoc Networks. In: International Conference on Parallel Processing Workshops, pp. 73\u201378 (2002)"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of the Sixth Annual Intl. Conference on Mobile Computing and Networking (MOBICOM), pp. 255\u2013265 (2000)","DOI":"10.1145\/345910.345955"},{"key":"35_CR14","first-page":"338","volume":"5","author":"S. Kurosawa","year":"2007","unstructured":"Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y.: Detecting blackhole attack on AODV-based mobile ad hoc networks by Dynamic Learning Method. International Journal of Network Security\u00a05, 338\u2013346 (2007)","journal-title":"International Journal of Network Security"},{"key":"35_CR15","doi-asserted-by":"crossref","unstructured":"Al-Shurman, M., Yoo, S.-M., Park, S.: Black hole attack in mobile ad-hoc networks. In: Proceedings of the 42nd Annual Southeast Regional Conference, ACM-SE, pp. 96\u201397 (2004)","DOI":"10.1145\/986537.986560"},{"key":"35_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, X., Sekiya, Y., Wakahara, Y.: Proposal of a method to detect black hole attack in MANET. In: International Symposium on Autonomous Decentralized Systems, pp. 1\u20136 (2009)","DOI":"10.1109\/ISADS.2009.5207339"},{"key":"35_CR17","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1587\/transcom.E92.B.483","volume":"E92.B","author":"C.W. Yu","year":"2009","unstructured":"Yu, C.W., Wu, T.-K., Cheng, R.-H., Yu, K.-M., Chang, S.C.: A Distributed and Cooperative Algorithm for the Detection and Elimination of Multiple Black Hole Nodes in Ad Hoc Networks. IEICE Transactions on Communications\u00a0E92.B, 483\u2013490 (2009)","journal-title":"IEICE Transactions on Communications"},{"key":"35_CR18","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-0-585-29603-6_5","volume":"353","author":"B. Johnson David","year":"1996","unstructured":"Johnson David, B., Maltz David, A.: Dynamic source routing in ad hoc wireless networks. Mobile Computing\u00a0353, 153\u2013181 (1996)","journal-title":"Mobile Computing"},{"key":"35_CR19","unstructured":"Sanjay, R., Huirong, F., Sreekantaradhya, et al.: Prevention of cooperative black hole attack in wireless ad hoc networks. In: ICWN, pp. 570\u2013575 (2003)"},{"key":"35_CR20","unstructured":"ns-2, http:\/\/www.isi.edu\/nsnam\/ns\/"},{"key":"35_CR21","volume-title":"Cryptography and Network Security Principles and Practices","author":"W. Stallings","year":"2005","unstructured":"Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Prentice Hall, Englewood Cliffs (2005)","edition":"4"}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Intelligence and Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23641-9_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T09:33:54Z","timestamp":1560504834000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23641-9_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642236402","9783642236419"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23641-9_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}