{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:46:54Z","timestamp":1742935614282,"version":"3.40.3"},"publisher-location":"New Delhi","reference-count":18,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132222194"},{"type":"electronic","value":"9788132222200"}],"license":[{"start":{"date-parts":[[2014,12,24]],"date-time":"2014-12-24T00:00:00Z","timestamp":1419379200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,12,24]],"date-time":"2014-12-24T00:00:00Z","timestamp":1419379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-81-322-2220-0_16","type":"book-chapter","created":{"date-parts":[[2014,12,23]],"date-time":"2014-12-23T08:00:18Z","timestamp":1419321618000},"page":"195-207","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Study on Various Attacks of TCP\/IP and Security Challenges in MANET Layer Architecture"],"prefix":"10.1007","author":[{"given":"Girish","family":"Paliwal","sequence":"first","affiliation":[]},{"given":"Ankur Prakash","family":"Mudgal","sequence":"additional","affiliation":[]},{"given":"Swapnesh","family":"Taterh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,24]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks. In: Wireless\/Mobile Network Security, pp. 103\u2013105. Springer, Berlin (2006)","DOI":"10.1007\/978-0-387-33112-6_5"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Bamanathan, R., Redi, J.: A brief overview of ad hoc network: challenges and directions. IEEE 40, 20\u201322 (2002)","DOI":"10.1109\/MCOM.2002.1006968"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Holkar, A.M., Holkar, N.S., Nitnawwre, D.: Investigation of application attack on MANET. IJCA 2(0975\u20138887), 42\u201345 (2013)","DOI":"10.5120\/12430-9190"},{"key":"16_CR4","unstructured":"Gua, Y.: Defending MANET Against Flooding Attacks by Detective Measures. The University of South Australia (2008)"},{"issue":"9622","key":"16_CR5","first-page":"1694","volume":"2248","author":"A Kaur","year":"2013","unstructured":"Kaur, A., Wadhwa, D.S.: Effects of jelly fish attack on mobile ad-hoc network\u2019s routing protocols. IJERA 2248(9622), 1694\u20131700 (2013)","journal-title":"IJERA"},{"key":"16_CR6","unstructured":"IETF Mobile Ad-Hoc Networks Working Group (MANET). IETF website www.ietf.org\/dyn\/wg\/charter\/manet-charter.html (2014)"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Commun. 11, 38\u201347 (2004)","DOI":"10.1109\/MWC.2004.1269716"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Maulik, R., Chaki, N.: A comprehensive review on wormhole attack in MANET. ICCIS Ind. Manage. Appl. 3, 233\u2013238 (2010)","DOI":"10.1109\/CISIM.2010.5643657"},{"key":"16_CR9","unstructured":"Wazid, M., Singh, R.K., Goundar, R.H.: A survey of attacks happened at different layers of mobile ad-hoc network and some available detection techniques. In: IJCA Proceedings of International Conference on Computer Communication and Networks CSI-COMNET, pp. 52\u201357 (2011)"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Gondaliya, T.P., Singh, M.: Intrusion detection system on MAC layer for attack prevention in MANET. In: IEEE-31661 (2013)","DOI":"10.1109\/ICCCNT.2013.6726538"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Nadeem, A., Howarth, M.P.: A survey of MANET intrusion detection prevention approaches for network layer attacks. IEEE Commun. Surv. Tutorials 15, 2027\u20132045 (2013)","DOI":"10.1109\/SURV.2013.030713.00201"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Jawandhiya, P.M., Ghonge, M.M., Ali, M.S., Deshpand, J.S.: A survey of mobile ad-hoc network attacks. Int. J. Eng. Sci. Technol. 2, 4063\u20134071 (2010)","DOI":"10.2139\/ssrn.3451027"},{"key":"16_CR13","unstructured":"Nandy, R., Roy, D.B.: Study of various attacks in MANET and elaborative discussion of rushing attack on DSR with clustering scheme. IJANA 3, 1035\u20131043 (2011)"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Darji, M., Trivedi, B.: Survey of intrusion detection and prevention system in MANETs based on data gathering techniques. IJAIS 1, 38\u201343 (2012)","DOI":"10.5120\/ijais12-450153"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Mamatha, G.S., Sharma, S.C.: Network layer attacks and defence mechanisms in MANETs\u2014a survey. IJCA 9, 12\u201317 (2010)","DOI":"10.5120\/1415-1911"},{"key":"16_CR16","unstructured":"Perkins, C.E.: Ad Hoc Networks. Addison-Wesley, Reading (2001)"},{"key":"16_CR17","unstructured":"Rai, A.K., Tewari, R.R., Upadhya, S.K.: Different types of attacks on integrated MANET-internet communication. IJCSS 265\u2013274 (2010)"},{"key":"16_CR18","unstructured":"Yadav, S., Jain, R., Faisal, M.: Attacks in MANET. IJLT Eng. Technol. 2, 123\u2013126 (2012)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of Fourth International Conference on Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2220-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T05:21:50Z","timestamp":1676006510000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-2220-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,24]]},"ISBN":["9788132222194","9788132222200"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2220-0_16","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014,12,24]]},"assertion":[{"value":"24 December 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}