{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:17:34Z","timestamp":1743049054893,"version":"3.40.3"},"publisher-location":"India","reference-count":22,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132204862"},{"type":"electronic","value":"9788132204879"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-81-322-0487-9_52","type":"book-chapter","created":{"date-parts":[[2012,4,14]],"date-time":"2012-04-14T07:13:23Z","timestamp":1334387603000},"page":"535-548","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Review on Sinkhole Detection Techniques in Mobile Adhoc Network"],"prefix":"10.1007","author":[{"given":"Nisarg","family":"Gandhewar","sequence":"first","affiliation":[]},{"given":"Rahila","family":"Patel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,4,15]]},"reference":[{"key":"52_CR1","doi-asserted-by":"crossref","unstructured":"Konate, K., Abdourahime, G.: Attack Analysis in mobile Adhoc network Modeling and Simulation. In: Second International Conference on Intelligent Systems. IEEE (2011)","DOI":"10.1109\/ISMS.2011.85"},{"key":"52_CR2","doi-asserted-by":"crossref","unstructured":"Alikhany, M., Abadi, M.: A Dynamic Clustering Based Approch For Anomaly Detection In AODV Based MANET. In: International Symposium on Computer Network & Distributed System. IEEE (2011)","DOI":"10.1109\/CNDS.2011.5764587"},{"issue":"1","key":"52_CR3","doi-asserted-by":"publisher","first-page":"37","DOI":"10.3923\/jmmstat.2011.37.42","volume":"5","author":"S. Kannan","year":"2011","unstructured":"Kannan, S., Kalaikumaran, T., Kartik, S.: Review of Attack prevention Methods in MANET. Journal of Modern Mathematics & Statistics\u00a05(1), 37\u201342 (2011)","journal-title":"Journal of Modern Mathematics & Statistics"},{"key":"52_CR4","doi-asserted-by":"crossref","unstructured":"Shrivastava, L., Bhadauria, S.S., Tomar, G.S.: Performance Evaluation of Routing Protocols in MANET with different traffic loads. In: International Conference on Communication Systems and Network Technologies. IEEE (2011)","DOI":"10.1109\/CSNT.2011.10"},{"key":"52_CR5","unstructured":"Kim, K., Kim, S.: A Sinkhole Detection Method based on Incremental Learning in Wireless Ad Hoc Networks. Korea Advanced Institute of Science & Technology, Korea"},{"key":"52_CR6","unstructured":"Culpepper, B.J., Chris Tseng, H.: Sinkhole Intrusion Indicators in DSR MANET. In: First International Conference on Broadband Networks. IEEE (2004)"},{"key":"52_CR7","volume-title":"Adaptive Sinkhole Detection on Wireless Ad Hoc Networks","author":"T. Thumthawatworn","year":"2006","unstructured":"Thumthawatworn, T., Yeophantong, T., Sirikriengkrai, P.: Adaptive Sinkhole Detection on Wireless Ad Hoc Networks. Assumption University, IEEE, Thailand (2006)"},{"key":"52_CR8","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1016\/j.adhoc.2007.04.003","volume":"6","author":"N. Marchang","year":"2008","unstructured":"Marchang, N., Datta, R.: Collaborative techniques for intrusion detection in mobile ad-hoc networks. Ad Hoc Networks\u00a06, 508\u2013523 (2008)","journal-title":"Ad Hoc Networks"},{"key":"52_CR9","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1016\/j.aeue.2009.01.008","volume":"64","author":"G. Kim","year":"2010","unstructured":"Kim, G., Han, Y., Kim, S.: A cooperative-sinkhole detection method for mobile ad hoc networks. International Journal of Electronics and Communication\u00a064, 390\u2013397 (2010)","journal-title":"International Journal of Electronics and Communication"},{"key":"52_CR10","unstructured":"Goyal, P., Parmar, V., Rishi, R.: MANET: Vulnerabilities,Challenges, Attacks, Application. IJCEM International Journal of Computational Engineering & Management\u00a011 (January 2011)"},{"key":"52_CR11","doi-asserted-by":"crossref","unstructured":"Mamatha, G.S., Sharma, S.C.: A Highly Secured Approach against Attacks in MANETS. International Journal of Computer Theory and Engineering\u00a02(5) (October 2010)","DOI":"10.7763\/IJCTE.2010.V2.246"},{"key":"52_CR12","doi-asserted-by":"crossref","unstructured":"Manikandan, K.P., Satyaprasad, R.: A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks. International Journal of Advanced Computer Science and Application (IJACSA)\u00a02(3) (March 2011)","DOI":"10.14569\/IJACSA.2011.020302"},{"key":"52_CR13","doi-asserted-by":"crossref","unstructured":"Shim, W., Kim, G., Kim, S.: A distributed sinkhole detection method using cluster analysis. Expert Systems with Applications (2010)","DOI":"10.1016\/j.eswa.2010.05.028"},{"key":"52_CR14","unstructured":"Shah, S., Khandre, A., Shirole, M., Bhole, G.: Performance Evaluation of Ad Hoc Routing Protocols Using NS2 Simulation. In: Mobile and Pervasive Computing, CoMPC 2008 (2008)"},{"key":"52_CR15","doi-asserted-by":"crossref","unstructured":"Saini, A., Kumar, H.: Effect Of Black Hole Attack On AODV Routing Protocol In MANET. IJCST\u00a01(2) (December 2010)","DOI":"10.1109\/AHICI.2009.5340351"},{"key":"52_CR16","unstructured":"Abidin, A.F.A., Usop, N.S.M., Yusof, M.K.: Performance Comparison of Wireless Ad Hoc Routing Protocols. International Journal on Computer Science and Engineering (IJCSE)\u00a03(1) (January 2011)"},{"key":"52_CR17","unstructured":"Jhaveri, R.H., Patel, A.D.: MANET Routing Protocols and Wormhole Attack against AODV. IJCSNS International Journal of Computer Science and Network Security\u00a010(4) (April 2010)"},{"key":"52_CR18","doi-asserted-by":"crossref","unstructured":"Singh, J., Singh, A., Shree, R.: An Assessment of Frequently Adopted Unsecure Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective. International Journal of Computer Applications (0975\u20138887)\u00a024(9) (June 2011)","DOI":"10.5120\/2989-3931"},{"key":"52_CR19","unstructured":"Manikandan, K.P., Satyaprasad, R., Rajasekhararao: Analysis and Diminution of Security Attacks on Mobile Ad hoc Network. IJCA Special Issue on \u201cMobile Ad-hoc Networks\u201d MANETs (2010)"},{"key":"52_CR20","unstructured":"Banerjee, S.: Detection\/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks. In: Proceedings of the World Congress on Engineering and Computer Science, WCECS 2008 (October 2008)"},{"key":"52_CR21","doi-asserted-by":"crossref","unstructured":"Sharma, S.C., Mamatha, G.S.: Network Layer Attacks and Defense Mechanisms in MANETS- A Survey. International Journal of Computer Applications (0975\u20138887)\u00a09(9) (November 2010)","DOI":"10.5120\/1415-1911"},{"key":"52_CR22","unstructured":"Razak, S.A., Furnell, S.M., Brooke, P.J.: Attacks against Mobile Ad Hoc Networks Routing Protocols, Network Research Group, University of Plymouth, Devon"}],"container-title":["Advances in Intelligent and Soft Computing","Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-0487-9_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:20:07Z","timestamp":1742937607000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-0487-9_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9788132204862","9788132204879"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-0487-9_52","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"15 April 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}