{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:05:34Z","timestamp":1748750734106,"version":"3.41.0"},"publisher-location":"New Delhi","reference-count":17,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132226932"},{"type":"electronic","value":"9788132226956"}],"license":[{"start":{"date-parts":[[2015,10,25]],"date-time":"2015-10-25T00:00:00Z","timestamp":1445731200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-81-322-2695-6_27","type":"book-chapter","created":{"date-parts":[[2015,10,25]],"date-time":"2015-10-25T00:41:10Z","timestamp":1445733670000},"page":"317-328","source":"Crossref","is-referenced-by-count":9,"title":["Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks"],"prefix":"10.1007","author":[{"given":"Shrikant V.","family":"Sonekar","sequence":"first","affiliation":[]},{"given":"Manali M.","family":"Kshirsagar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,25]]},"reference":[{"key":"27_CR1","unstructured":"Perkins, C.E.: Ad hoc Networking, pp. 198\u2013264. Addison-Wesley, New York (2001)"},{"key":"27_CR2","unstructured":"Gupta, S.S., Ray, S.S., Mistry, O., Naskar, M.K.: A stochastic approach for topology management of mobile ad hoc networks. In: Asian International Mobile Computing Conference, pp. 90\u201399. Jadavpur University, Kolkata (2007)"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Royer, E.M., Das S.R.: Ad hoc on-demand distance vector routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computing and Applications, vol. 3, pp. 99\u2013100. New Orleans, LA, USA (1999)","DOI":"10.1109\/MCSA.1999.749281"},{"key":"27_CR4","unstructured":"Johnson, D., Maltz, D.: In: Imielinski, T., Korth, H. (eds.) Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing. Kluwer (1996)"},{"key":"27_CR5","unstructured":"IEEE Std. 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (1997)"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L., Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel. Commun. 11(1), 38\u201347, UCLA Computer Science Department (2004)","DOI":"10.1109\/MWC.2004.1269716"},{"key":"27_CR7","unstructured":"IEEE 802.11: Wireless LAN Media Access Control (MAC) and Physical layer (PHY) Specifications. ANSI\/EIEEE Std. 802.11 (1999)"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Djahel, S., Nait-abdesselam, F., Zhang, Z.: Mitigating packet dropping problem in mobile ad hoc networks: proposals and challenges. IEEE Commun. Surv. Tutor. 13, Fourth Quarter (2011)","DOI":"10.1109\/SURV.2011.072210.00026"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Duarte-Melo, E.J., Liu, M.: Energy efficiency of many-to-one communication in wireless networks. In: Invited Paper in Proceeding of IEEE 45th Midwest Symposium on Circuits and Systems (MWSCAS\u201902), Volume 1,Tulsa (2002)","DOI":"10.1109\/MWSCAS.2002.1187296"},{"key":"27_CR10","unstructured":"Murthy, S.R., Manoj, B.S.: Ad hoc Mobile Wireless Networks\u2014Architectures and Protocols. Pearson Publication, New York (2014)"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, New York, NY, USA: ACM Press, pp. 255\u2013265. Boston, MA (2000)","DOI":"10.1145\/345910.345955"},{"key":"27_CR12","unstructured":"Wang, D.: Malicious node detection mechanism for wireless ad hoc network. Int. J. Secur. (IJS) 7(1) (2013), School of Mathematical Sciences, Chuzhou University, China"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Mishra, A., Nadkarni, K., Patcha, A., Virginia Tech: Intrusion detection in wireless ad hoc networks. IEEE Wirel. Commun. (2004)","DOI":"10.1109\/MWC.2004.1269717"},{"key":"27_CR14","unstructured":"Huang, Y., Lee, W.: A cooperative intrusion detection system for ad hoc networks. College of Computing, Georgia Institute of Technology"},{"key":"27_CR15","unstructured":"Sarkar, S.K., Basavaraju, T.G., Puttamadappa, C.: Ad hoc Mobile Wireless Networks- Principles, Protocols and Applications, pp. 267\u2013270. Auerbach Publications, Taylor & Francis Group, Boca Raton (2012)"},{"key":"27_CR16","unstructured":"Dey, S.: Graph Theory with Applications, pp. 5\u201330. SPD (2012)"},{"key":"27_CR17","unstructured":"Krawetz, N.: Introduction to Network Security, pp. 5\u201313. Thomson Learning, Boston (2011)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2695-6_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T03:55:56Z","timestamp":1748663756000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-2695-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,25]]},"ISBN":["9788132226932","9788132226956"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2695-6_27","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,10,25]]}}}