{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T04:33:39Z","timestamp":1742358819633,"version":"3.40.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642279003"},{"type":"electronic","value":"9783642279010"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27901-0_10","type":"book-chapter","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T02:01:25Z","timestamp":1326765685000},"page":"118-131","source":"Crossref","is-referenced-by-count":0,"title":["Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol"],"prefix":"10.1007","author":[{"given":"Gimer","family":"Cervera","sequence":"first","affiliation":[]},{"given":"Michel","family":"Barbeau","sequence":"additional","affiliation":[]},{"given":"Joaquin","family":"Garcia-Alfaro","sequence":"additional","affiliation":[]},{"given":"Evangelos","family":"Kranakis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3-4","key":"10_CR1","first-page":"324","volume":"13","author":"P. Arce","year":"2008","unstructured":"Arce, P., Guerri, J.C., Pajares, A., L\u00e1zaro, O.: Performance evaluation of video streaming over ad hoc networks using flat and hierarchical routing protocols. Mobile Networks and Applications\u00a013(3-4), 324\u2013336 (2008)","journal-title":"Mobile Networks and Applications"},{"key":"10_CR2","unstructured":"Baccelli, E.: OLSR scaling with hierarchical routing and dynamic tree clustering. In: IASTED International Conference on Networks and Communication Systems (NCS), Chiang Mai, Thailand (March 2006)"},{"key":"10_CR3","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/0-387-31173-4_29","volume-title":"Challenges in Ad Hoc Networking","author":"E. Baccelli","year":"2006","unstructured":"Baccelli, E.: OLSR Trees: A Simple Clustering Mechanism for OLSR. In: Al Agha, K., Gu\u00e9rin Lassous, I., Pujolle, G. (eds.) Challenges in Ad Hoc Networking. IFIP, vol.\u00a0197, pp. 265\u2013274. Springer, Boston (2006)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Clausen, T., Jacquet, P.: Optimized link state routing protocol (OLSR), RFC3626. IETF Internet Draft (October 2003), http:\/\/www.ietf.org\/rfc\/rfc3626.txt","DOI":"10.17487\/rfc3626"},{"key":"10_CR5","unstructured":"Henderson, T., et al.: The NS-3 network simulator (2011) Software package retrieved from, http:\/\/www.nsnam.org\/"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Hong, F., Hong, L., Fu, C.: Secure OLSR. In: International Conference on Advanced Information Networking and Applications, vol.\u00a01, pp. 713\u2013718 (2005)","DOI":"10.1109\/AINA.2005.305"},{"issue":"1","key":"10_CR7","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/S1570-8705(03)00019-2","volume":"1","author":"Y.-C. Hu","year":"2003","unstructured":"Hu, Y.-C., Johnson, D.B., Perrig, A.: Sead: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks\u00a01(1), 175\u2013192 (2003)","journal-title":"Ad Hoc Networks"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/INMIC.2001.995315","volume-title":"Proceedings of IEEE International Multi Topic Conference, IEEE INMIC 2001. Technology for the 21st Century","author":"P. Jacquet","year":"2001","unstructured":"Jacquet, P., Muhlethaler, P., Clausen, T., Laouiti, A., Qayyum, A., Viennot, L.: Optimized link state routing protocol for ad hoc networks. In: Proceedings of IEEE International Multi Topic Conference, IEEE INMIC 2001. Technology for the 21st Century, pp. 62\u201368. Lahore University of Management Sciences, Pakistan (2001)"},{"key":"10_CR9","first-page":"221","volume":"1","author":"A. Kush","year":"2009","unstructured":"Kush, A., Hwang, C.: Proposed protocol for hash-secured routing in ad hoc networks. Masaum Journal of Computing (MJC)\u00a01, 221\u2013226 (2009) ISSN 2076-0833","journal-title":"Masaum Journal of Computing (MJC)"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. ACM\u00a024, 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/978-3-642-04383-3_27","volume-title":"Ad-Hoc, Mobile and Wireless Networks","author":"D. Palma","year":"2009","unstructured":"Palma, D., Curado, M.: Inside-Out OLSR Scalability Analysis. In: Ruiz, P.M., Garcia-Luna-Aceves, J.J. (eds.) ADHOC-NOW 2009. LNCS, vol.\u00a05793, pp. 354\u2013359. Springer, Heidelberg (2009)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Ros, F.J., Ruiz, P.M.: Cluster-based OLSR extensions to reduce control overhead in mobile ad hoc networks. In: Proceedings of the 2007 International Conference on Wireless Communications and Mobile Computing, pp. 202\u2013207. ACM (2007)","DOI":"10.1145\/1280940.1280985"},{"key":"10_CR13","unstructured":"Stallings, W.: Cryptography and Network Security, Principles and Practices. Pearson Prentice Hall (2006)"},{"issue":"7","key":"10_CR14","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/MCOM.2005.1470838","volume":"43","author":"L. Villasenor-Gonzalez","year":"2005","unstructured":"Villasenor-Gonzalez, L., Ge, Y., Lamont, L.: HOLSR: A hierarchical proactive routing mechanism for mobile ad hoc networks. IEEE Communications Magazine\u00a043(7), 118\u2013125 (2005)","journal-title":"IEEE Communications Magazine"},{"key":"10_CR15","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/0-387-31173-4_16","volume-title":"Challenges in Ad Hoc Networking","author":"M. Voorhaen","year":"2006","unstructured":"Voorhaen, M., Van de Velde, E., Blondia, C.: MORHE: A Transparent Multi-Level Routing Scheme for Ad Hoc Networks. In: Al Agha, K., Gu\u00e9rin Lassous, I., Pujolle, G. (eds.) Challenges in Ad Hoc Networking. IFIP, vol.\u00a0197, pp. 139\u2013148. Springer, Boston (2006)"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27901-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T22:02:04Z","timestamp":1742335324000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27901-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642279003","9783642279010"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27901-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}