{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:28:56Z","timestamp":1744086536630,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_37","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"372-384","source":"Crossref","is-referenced-by-count":4,"title":["A Comparative Study on Wormhole Attack Prevention Schemes in Mobile Ad-Hoc Network"],"prefix":"10.1007","author":[{"given":"Subhashis","family":"Banerjee","sequence":"first","affiliation":[]},{"given":"Koushik","family":"Majumder","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Belding-Royer, E.M., Das, S.R.: Ad hoc on-demand distance vector (AODV) routing. RFC 3561, The Internet Engineering Task Force, Network Working Group (2003), http:\/\/www.ietf.org\/rfc\/rfc3561.txt","DOI":"10.17487\/rfc3561"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. In: Imielinski, Korth (eds.) Mobile Computing, vol.\u00a0353, pp. 153\u2013181. Kluwer Academic Publishers (1996)","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Maltz, D.A., Johnson, D.B., Hu, Y.: The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4. RFC 4728, The Internet Engineering Task Force, Network Working Group (2007), http:\/\/www.ietf.org\/rfc\/rfc4728.txt","DOI":"10.17487\/rfc4728"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Royer, E.M., Toh, C.K.: A Review of Current Routing Protocols for Ad hoc Mobile Wireless Networks. IEEE Personal Communications Magazine, 46\u201355 (April 1999)","DOI":"10.1109\/98.760423"},{"issue":"1","key":"37_CR5","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.adhoc.2006.07.005","volume":"6","author":"H.L. Nguyen","year":"2008","unstructured":"Nguyen, H.L., Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks\u00a06(1), 32\u201346 (2008)","journal-title":"Ad Hoc Networks"},{"key":"37_CR6","unstructured":"Karmore, P., Bodkhe, S.: A Survey on Intrusion in Ad Hoc Networks and its Detection Measures. International Journal on Computer Science and Engineering, IJCSE (2011)"},{"key":"37_CR7","unstructured":"Rai, A.K., Tewari, R.R., Upadhyay, S.K.: Different Types of Attacks on Integrated MANET-Internet Communication. International Journal of Computer Science and Security, IJCSS\u00a04(3) (2010)"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Boppana, R.V., Konduru, S.: An Adaptive Distance Vector Routing Algorithm for Mobile Ad Hoc Networks. In: Proceedings of INFOCOM, pp. 1753\u20131762 (April 2001)","DOI":"10.1109\/INFCOM.2001.916673"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Murthy, S., Garcia-Luna-Aceves, J.J.: An Efficient Routing Protocol for Wireless Networks. ACM Mobile Networks and App. J., Special Issue on Routing in Mobile Communication Networks, 183\u2013197 (October 1996)","DOI":"10.1007\/BF01193336"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Bhagwat, P.: Highly Dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers. In: Proceedings of the SIGCOMM, pp. 234\u2013244 (August 1994)","DOI":"10.1145\/190809.190336"},{"key":"37_CR11","unstructured":"Johnson, D.B., Maltz, D.A., Broch, J.: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. In: Ad Hoc Networking, ch. 5, pp. 139\u2013172. Addison-Wesley (2001)"},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Royer, E.M.: Ad-Hoc On-Demand Distance Vector Routing. In: Proceedings of WMCSA, pp. 90\u2013100 (February 1999)","DOI":"10.1109\/MCSA.1999.749281"},{"key":"37_CR13","volume-title":"Data Networks","author":"D. Bertsekas","year":"1992","unstructured":"Bertsekas, D., Gallager, R.: Data Networks, 2nd edn. Prentice Hall, NJ (1992)","edition":"2"},{"key":"37_CR14","unstructured":"Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: Proceedings of INFOCOM (2004)"},{"issue":"2","key":"37_CR15","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"37_CR16","unstructured":"Weichao, W., Bharat, B., Lu, Y., Wu, X.: Defending against Wormhole Attacks in Mobile Ad Hoc Networks. Wireless Communication and Mobile Computing (2006)"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Wang, X., Wong, J.: EDWA: End-to-end detection of wormhole attack in wireless Ad hoc networks. International Journal of Information and Computer Security, IJICS (2007)","DOI":"10.1109\/COMPSAC.2007.63"},{"issue":"6","key":"37_CR18","doi-asserted-by":"publisher","first-page":"5022","DOI":"10.3390\/s90605022","volume":"9","author":"S. Jen","year":"2009","unstructured":"Jen, S., Laih, C., Kuo, W.: A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET. Sensors\u00a09(6), 5022\u20135039 (2009)","journal-title":"Sensors"},{"key":"37_CR19","unstructured":"Chiu, H.S., Lui, K.S.: DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks. In: Proc. of International Symposium on Wireless Pervasive Computing, Phuket, Thailand (2006)"},{"key":"37_CR20","unstructured":"Song, N., Qian, L., Li, X.: Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach. In: Proceeding of the 19th International Parallel and Distributed Processing Symposium, IPDPS 2005 (2005)"},{"key":"37_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/11601494_11","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"L. Butty\u00e1n","year":"2005","unstructured":"Butty\u00e1n, L., D\u00f3ra, L., Vajda, I.: Statistical Wormhole Detection in Sensor Networks. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol.\u00a03813, pp. 128\u2013141. Springer, Heidelberg (2005)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T02:29:59Z","timestamp":1744079399000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_37","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}