{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T13:10:03Z","timestamp":1745413803821,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642351297"},{"type":"electronic","value":"9783642351303"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35130-3_13","type":"book-chapter","created":{"date-parts":[[2012,12,10]],"date-time":"2012-12-10T07:09:45Z","timestamp":1355123385000},"page":"181-193","source":"Crossref","is-referenced-by-count":3,"title":["Defence against Wormhole Attacks in Wireless Mesh Networks"],"prefix":"10.1007","author":[{"given":"Rakesh","family":"Matam","sequence":"first","affiliation":[]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"13_CR1","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1016\/j.comnet.2004.12.001","volume":"47","author":"I.F. Akyildiz","year":"2005","unstructured":"Akyildiz, I.F., Wang, X., Wang, W.: Wireless Mesh networks: A Survey. Journal of Computer Networks and ISDN Systems\u00a047(4), 445\u2013487 (2005)","journal-title":"Journal of Computer Networks and ISDN Systems"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Zhang, W., Wang, Z., Das, S.K., Hassan, M.: Security Issues in Wireless Mesh Networks. In: Wireless Mesh Networks: Architectures and Protocols. Springer (2008)","DOI":"10.1201\/b13595"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defence Against Wormhole Attacks in Wireless Networks. In: Proceedings of the Twenty Second IEEE International Conference on Computer and Communications, vol.\u00a03, pp. 1976\u20131986 (April 2003)","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Wang, Y., Zhang, Z., Wu, J.: A Distributed Approach for Hidden Wormhole Detection with Neighborhood Information. In: Proceedings of IEEE Fifth International Conference on Networking, Architecture and Storage, pp. 63\u201372 (July 2010)","DOI":"10.1109\/NAS.2010.22"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Hayajneh, T., Krishnamurthy, P., Tipper, D.: DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad hoc Networks. In: Proceedings of Third International Conference on Network and System Security, pp. 73\u201380 (October 2009)","DOI":"10.1109\/NSS.2009.85"},{"issue":"2","key":"13_CR6","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.cose.2009.09.005","volume":"29","author":"M.Y. Su","year":"2010","unstructured":"Su, M.Y.: WARP: A Wormhole Avoidance Routing Protocol by Anomaly Detection in Mobile Ad hoc Networks. Computers and Security\u00a029(2), 208\u2013224 (2010)","journal-title":"Computers and Security"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Royer, E.M., Das, S.R.: Ad hoc On-demand Distance Vector (AODV) Routing. IETF Internet Draft. MANET Working Group (January 2004)","DOI":"10.17487\/rfc3561"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Choi, S., Kim, D.Y., Lee, D.H., Jung, J.I.: WAP: Wormhole Attack Prevention Algorithm in Mobile Ad hoc Networks. In: Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, pp. 343\u2013348 (2008)","DOI":"10.1109\/SUTC.2008.49"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Wang, X., Wong, J.: An End-to-End Detection of Wormhole Attack in Wireless Ad hoc Networks. In: Proceedings of the Thirty-First Annual International Computer Software and Applications Conference, pp. 39\u201348 (July 2007)","DOI":"10.1109\/COMPSAC.2007.63"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Znaidi, W., Minier, M., Babau, J.P.: Detecting Wormhole Attacks in Wireless Networks using Local Neighborhood Information. In: Proceedings of IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1\u20135 (September 2008)","DOI":"10.1109\/PIMRC.2008.4699583"},{"key":"13_CR11","first-page":"545","volume":"46","author":"Z. Tun","year":"2008","unstructured":"Tun, Z., Maw, A.H.: Wormhole Attack Detection in Wireless Sensor Networks. Proceedings of World Academy of Science Engineering and Technology\u00a046, 545\u2013550 (2008)","journal-title":"Proceedings of World Academy of Science Engineering and Technology"},{"issue":"2","key":"13_CR12","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1109\/TWC.2009.070536","volume":"8","author":"M. Khabbazian","year":"2009","unstructured":"Khabbazian, M., Mercier, H., Bhargava, V.K.: Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad Hoc Networks. IEEE Transactions on Wireless Communications\u00a08(2), 736\u2013745 (2009)","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Tran, P., Hung, L.X., Lee, Y.K., Lee, S., Lee, H.: TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad hoc Networks. In: Proceedings of Fourth IEEE Consumer Communication and Networking Conference, pp. 593\u2013598 (May 2007)","DOI":"10.1109\/CCNC.2007.122"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Korkmaz, T.: Verifying Physical Presence of Neighbors Against Replay-Based Attacks in Wireless Ad hoc Networks. In: Proceedings of International Conference on Information Technology: Coding and Computing, pp. 704\u2013709 (April 2005)","DOI":"10.1109\/ITCC.2005.291"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Capkun, S., Buttyan, L., Hubaux, J.P.: SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. In: Proceedings of the First ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 21\u201332 (October 2003)","DOI":"10.1145\/986858.986862"},{"key":"13_CR16","unstructured":"IEEE P802.11s\/D5.0 Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 10: Mesh Networking"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35130-3_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T12:56:29Z","timestamp":1745412989000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35130-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642351297","9783642351303"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35130-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}