{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:32:09Z","timestamp":1725881529226},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031557"},{"type":"electronic","value":"9789811031564"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3156-4_27","type":"book-chapter","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T02:13:45Z","timestamp":1488420825000},"page":"269-279","source":"Crossref","is-referenced-by-count":0,"title":["A Purely Localized Random Key Sequencing Using Accelerated Hashing in Wireless Ad-Hoc Networks"],"prefix":"10.1007","author":[{"given":"Amit","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Vijay K.","family":"Katiyar","sequence":"additional","affiliation":[]},{"given":"Kamal","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"issue":"1","key":"27_CR1","first-page":"43","volume":"29","author":"P Khatri","year":"2014","unstructured":"P. Khatri, S. Tapaswi, U.P. Verma, Trust evaluation in wireless ad-hoc networks using fuzzy system. Comput. Syst. Sci. Eng. 29(1), 43\u201350 (2014)","journal-title":"Comput. Syst. Sci. Eng."},{"issue":"10","key":"27_CR2","doi-asserted-by":"crossref","first-page":"4258","DOI":"10.1109\/TIE.2009.2015754","volume":"56","author":"VC Gungor","year":"2009","unstructured":"V.C. Gungor, G.P. Hancke, Industrial wireless sensor networks: challenges, design principles, and technical approaches. IEEE Trans. Ind. Electron. 56(10), 4258\u20134265 (2009)","journal-title":"IEEE Trans. Ind. Electron."},{"key":"27_CR3","unstructured":"D.G. Padmavathi, M. Shanmugapriya, A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576 (2009)"},{"issue":"3","key":"27_CR4","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1109\/JSAC.2004.842547","volume":"23","author":"K Sanzgiri","year":"2005","unstructured":"K. Sanzgiri, D. LaFlamme, B. Dahill, B.N. Levine, C. Shields, E.M. Belding-Royer, Authenticated routing for Ad-hoc networks. IEEE J. Sel. Areas Commun. 23(3), 598\u2013610 (2005)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"9","key":"27_CR5","doi-asserted-by":"crossref","first-page":"1796","DOI":"10.1016\/j.comcom.2007.11.012","volume":"31","author":"I Raza","year":"2008","unstructured":"I. Raza, S.A. Hussain, Identification of malicious nodes in an AODV pure Ad-hoc network through guard nodes. Comput. Commun. 31(9), 1796\u20131802 (2008)","journal-title":"Comput. Commun."},{"issue":"6","key":"27_CR6","doi-asserted-by":"crossref","first-page":"1097","DOI":"10.1016\/j.adhoc.2008.09.007","volume":"7","author":"J Kim","year":"2009","unstructured":"J. Kim, G. Tsudik, SRDP: secure route discovery for dynamic source routing in MANETs. Ad-hoc Netw. 7(6), 1097\u20131109 (2009)","journal-title":"Ad-hoc Netw."},{"issue":"9","key":"27_CR7","doi-asserted-by":"crossref","first-page":"2032","DOI":"10.1016\/j.simpat.2011.05.008","volume":"19","author":"TR Andel","year":"2011","unstructured":"T.R. Andel, G. Back, A. Yasinsac, Automating the security analysis process of secure Ad-hoc routing protocols. Simul. Model. Pract. Theory 19(9), 2032\u20132049 (2011)","journal-title":"Simul. Model. Pract. Theory"},{"issue":"4","key":"27_CR8","doi-asserted-by":"crossref","first-page":"1249","DOI":"10.1016\/j.jnca.2012.01.019","volume":"35","author":"J Mulert Von","year":"2012","unstructured":"J. Von Mulert, I. Welch, W.K. Seah, Security threats and solutions in MANETs: a case study using AODV and SAODV. J. Netw. Comput. Appl. 35(4), 1249\u20131259 (2012)","journal-title":"J. Netw. Comput. Appl."},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"A. Adnane, C. Bidan, R.T. de Sousa J\u00fanior, Trust-based security for the LSR routing protocol. Comput. Commun. 36(10), 1159\u20131171 (2013)","DOI":"10.1016\/j.comcom.2013.04.003"},{"issue":"2","key":"27_CR10","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1016\/j.jnca.2012.12.019","volume":"36","author":"S Qazi","year":"2013","unstructured":"S. Qazi, R. Raad, Y. Mu, W. Susilo, Securing DSR against wormhole attacks in multirate Ad-hoc networks. J. Netw. Comput. Appl. 36(2), 582\u2013592 (2013)","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"27_CR11","doi-asserted-by":"crossref","first-page":"1046","DOI":"10.1016\/j.adhoc.2012.11.005","volume":"11","author":"S Zhao","year":"2013","unstructured":"S. Zhao, R. Kent, A. Aggarwal, A key management and secure routing integrated framework for mobile Ad-hoc networks. Ad-hoc Netw. 11(3), 1046\u20131061 (2013)","journal-title":"Ad-hoc Netw."},{"issue":"2","key":"27_CR12","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1016\/j.compeleceng.2013.06.001","volume":"40","author":"M Mohanapriya","year":"2014","unstructured":"M. Mohanapriya, I. Krishnamurthi, Modified DSR protocol for detection and removal of selective black hole attack in MANET. Comput. Electr. Eng. 40(2), 530\u2013538 (2014)","journal-title":"Comput. Electr. Eng."},{"key":"27_CR13","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1016\/j.procs.2015.03.109","volume":"45","author":"DR Choudhury","year":"2015","unstructured":"D.R. Choudhury, L. Ragha, N. Marathe, Implementing and improving the performance of AODV by receive reply method and securing it from black hole attack. Procedia Comput. Sci. 45, 564\u2013570 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"27_CR14","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/j.procs.2015.06.011","volume":"54","author":"D Das","year":"2015","unstructured":"D. Das, K. Majumder, A. Dasgupta, Selfish node detection and low cost data transmission in MANET using game theory. Procedia Comput. Sci. 54, 92\u2013101 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"27_CR15","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1016\/j.procs.2015.04.117","volume":"48","author":"MK Dholey","year":"2015","unstructured":"M.K. Dholey, G.P. Biswas, Proposal to provide security in MANET\u2019s DSR routing protocol. Procedia Comput. Sci. 48, 440\u2013446 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"27_CR16","unstructured":"W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor networks, in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33\u20190) (2000), p. 223"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"L. Eschenauer, V.D. Gligor, A key-management scheme for distributed sensor networks, in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS\u201902) (ACM Press, Washington, DC, USA, 2002), pp. 41\u201347","DOI":"10.1145\/586110.586117"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3156-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T07:43:19Z","timestamp":1498376599000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3156-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031557","9789811031564"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3156-4_27","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}