{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:28:53Z","timestamp":1744086533313,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_39","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"396-407","source":"Crossref","is-referenced-by-count":2,"title":["A Survey of Blackhole Attacks and Countermeasures in Wireless Mobile Ad-hoc Networks"],"prefix":"10.1007","author":[{"given":"Subhashis","family":"Banerjee","sequence":"first","affiliation":[]},{"given":"Koushik","family":"Majumder","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Belding-Royer, E.M., Das, S.R.: Ad hoc on-demand distance vector (AODV) routing. RFC 3561, The Internet Engineering Task Force, Network Working Group (2003), http:\/\/www.ietf.org\/rfc\/rfc3561.txt","DOI":"10.17487\/rfc3561"},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. In: Imielinski, Korth (eds.) Mobile Computing, vol.\u00a0353, pp. 153\u2013181. Kluwer Academic Publishers (1996)","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Maltz, D.A., Johnson, D.B., Hu, Y.: The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4. RFC 4728, The Internet Engineering Task Force, Network Working Group (2007), http:\/\/www.ietf.org\/rfc\/rfc4728.txt","DOI":"10.17487\/rfc4728"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Boppana, R.V., Konduru, S.P.: An adaptive distance vector routing algorithm for mobile ad hoc networks. In: IEEE Computer and communications Societies, INFOCOM, pp. 1753\u20131762 (2001)","DOI":"10.1109\/INFCOM.2001.916673"},{"issue":"1","key":"39_CR5","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.adhoc.2006.07.005","volume":"6","author":"H.L. Nguyen","year":"2008","unstructured":"Nguyen, H.L., Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks\u00a06(1), 32\u201346 (2008)","journal-title":"Ad Hoc Networks"},{"key":"39_CR6","unstructured":"Karmore, P., Bodkhe, S.: A Survey on Intrusion in Ad Hoc Networks and its Detection Measures. International Journal on Computer Science and Engineering, IJCSE (2011)"},{"key":"39_CR7","unstructured":"Rai, A.K., Tewari, R.R., Upadhyay, S.K.: Different Types of Attacks on Integrated MANET-Internet Communication. International Journal of Computer Science and Security, IJCSS\u00a04(3) (2010)"},{"issue":"10","key":"39_CR8","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MCOM.2002.1039859","volume":"40","author":"H. Deng","year":"2002","unstructured":"Deng, H., Li, W., Agrawal, D.P.: Routing Security in Wireless Ad-hoc Networks. IEEE Communications Magazine\u00a040(10), 70\u201375 (2002), doi:10.1109\/MCOM.2002.1039859","journal-title":"IEEE Communications Magazine"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on MOBICOM, Boston, Massachusetts, United States, pp. 255\u2013265 (2000)","DOI":"10.1145\/345910.345955"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Patcha, A., Mishra, A.: Collaborative security architecture for Blackhole attack prevention in mobile ad hoc networks. In: Proceedings of the Radio and Wireless Conference, RWCON, VA, USA, pp. 75\u201378 (2003)","DOI":"10.1109\/RAWCON.2003.1227896"},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Al-Shurman, M., Yoo, S.M., Park, S.: Blackhole Attack in Mobile Ad Hoc Networks. In: Proceedings of the 42nd Annual ACM Southeast Regional Conference, ACM-SE\u201942, Huntsville, Alabama (April 2004)","DOI":"10.1145\/986537.986560"},{"key":"39_CR12","unstructured":"Karakehayov, Z.: Using REWARD to detect team black-hole attacks in wireless sensor networks. In: Workshop on Real-World Wireless Sensor Networks, REALWSN 2005, Stockholm, Sweden (June 2005)"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Sen, J., Chandra, M.G., Harihara, S.G., Reddy, H., Balamuralidhar, P.: A mechanism for detection of gray hole attack in mobile ad hoc networks. In: Proceedings of the 6th International Conference on Information, Communications & Signal Processing, Singapore, pp. 1\u20135 (2007)","DOI":"10.1109\/ICICS.2007.4449664"},{"key":"39_CR14","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1007\/978-3-540-77018-3_54","volume-title":"Emerging Technologies in Knowledge Discovery and Data Mining","author":"C.W. Yu","year":"2007","unstructured":"Yu, C.W., Wu, T.-K., Cheng, R.-H., Chang, S.C.: A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks. In: Washio, T., Zhou, Z.-H., Huang, J.Z., Hu, X., Li, J., Xie, C., He, J., Zou, D., Li, K.-C., Freire, M.M. (eds.) PAKDD 2007. LNCS (LNAI), vol.\u00a04819, pp. 538\u2013549. Springer, Heidelberg (2007)"},{"issue":"5","key":"39_CR15","doi-asserted-by":"publisher","first-page":"6","DOI":"10.5120\/2283-2959","volume":"18","author":"R. Shree","year":"2011","unstructured":"Shree, R., Dwivedi, S.K., Pandey, R.P.: Design Enhancements in ZRP for Detecting Multiple Blackhole Nodes in Mobile Ad Hoc Networks. International Journal of Computer Applications\u00a018(5), 6\u201310 (2011)","journal-title":"International Journal of Computer Applications"},{"issue":"8","key":"39_CR16","first-page":"4101","volume":"10","author":"P. Yi","year":"2012","unstructured":"Yi, P., Zhu, T., Liu, N., Wu, Y., Li, J.: Cross-layer Detection for Blackhole Attack in Wireless Network. J. Computational Information Systems\u00a010(8), 4101\u20134109 (2012)","journal-title":"J. Computational Information Systems"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T02:29:03Z","timestamp":1744079343000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_39","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}