{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:41:36Z","timestamp":1743018096786,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_9","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"117-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Trust-Neighbors-Based to Mitigate the Cooperative Black Hole Attack in OLSR Protocol"],"prefix":"10.1007","author":[{"given":"Kamel","family":"Saddiki","sequence":"first","affiliation":[]},{"given":"Sofiane","family":"Boukli-Hacene","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Gilg","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Lorenz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Clausen, T., Jaquet, P.: Optimized link state routing protocol OLSR, IETF Request for Comments: 3626 (2003)","DOI":"10.17487\/rfc3626"},{"issue":"3","key":"9_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5958\/2454-762X.2016.00015.9","volume":"9","author":"PK Varshney","year":"2016","unstructured":"Varshney, P.K., et al.: Relative performance analysis of proactive routing protocols in wireless ad hoc networks using varying node density. Invertis J. Sci. Technol. 9(3), 1\u20139 (2016)","journal-title":"Invertis J. Sci. Technol."},{"key":"9_CR3","unstructured":"Harjeet, K., Manju B., Varsha S.: Performance evaluation of AODV, OLSR, ZRP protocols under blackhole attack in manet. Int. J. Adv. Res. Electr. Electron. Instrum. Eng. 2(6) (2013)"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.procs.2016.05.240","volume":"85","author":"K.S. Praveen","year":"2016","unstructured":"Praveen, K.S., Gururaj, H.L., Ramesh, B.: Comparative analysis of black hole attack in ad hoc network using AODV and OLSR protocols. In: International Conference on Computational Modeling and Security (CMS 2016), pp. 325\u2013330 (2016)","journal-title":"Procedia Computer Science"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Prashar, L., Kapur, R.: Performance analysis of routing protocols under different types of attacks in MANETs. In: 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) (2016)","DOI":"10.1109\/ICRITO.2016.7784989"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Saddiki, K., Boukli-Hacene, S., Lorenz, P., Gilg, M.: Black hole attack detection and ignoring in OLSR protocol. Int. J. Trust Manag. Comput. Commun. 4(1) (2017)","DOI":"10.1504\/IJTMCC.2017.089602"},{"key":"9_CR7","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-981-10-5903-2_45","volume-title":"Intelligent Communication, Control and Devices","author":"A Singh","year":"2018","unstructured":"Singh, A., Singh, G., Singh, M.: Comparative study of OLSR, DSDV, AODV, DSR and ZRP routing protocols under blackhole attack in mobile ad hoc network. In: Singh, R., Choudhury, S., Gehlot, A. (eds.) Intelligent Communication, Control and Devices. AISC, vol. 624, pp. 443\u2013453. Springer, Singapore (2018). \n                  https:\/\/doi.org\/10.1007\/978-981-10-5903-2_45"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Bhuvaneswari, R., Ramachandran, R.: Denial of service attack solution in OLSR based manet by varying number of fictitious nodes. Cluster Comput., 1\u201311 (2018)","DOI":"10.1007\/s10586-018-1723-0"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.comnet.2014.07.016","volume":"73","author":"A Baadache","year":"2014","unstructured":"Baadache, A., Belmehdi, A.: Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks. Comput. Netw. 73, 173\u2013184 (2014)","journal-title":"Comput. Netw."},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Semchedine, F., Moussaoui, A., Zouaoui, K., Mehamel, S.: CRY OLSR: crypto optimized link state routing for MANET. In: 2016 5th International Conference on Multimedia Computing and Systems (ICMCS) (2016)","DOI":"10.1109\/ICMCS.2016.7905578"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Sahu, Y., Rizvi, M., Kapoor, R.: Intruder detection mechanism against DoS attack on OLSR. In: 2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS) (2016)","DOI":"10.1109\/Eco-friendly.2016.7893250"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.procs.2010.12.020","volume":"3","author":"A Abdalla","year":"2011","unstructured":"Abdalla, A., Saroit, I., Kotb, A., Afsari, A.: Misbehavior nodes detection and isolation for MANETs OLSR protocol. Procedia Comput. Sci. 3, 115\u2013121 (2011)","journal-title":"Procedia Comput. Sci."},{"key":"9_CR13","first-page":"9","volume":"5","author":"R Baiad","year":"2016","unstructured":"Baiad, R., Alhussein, O., Otrok, H., Muhaidat, S.: Novel cross layer detection schemes to detect blackhole attack against QoS-OLSR protocol in VANET. Veh. Commun. 5, 9\u201317 (2016)","journal-title":"Veh. Commun."},{"issue":"1","key":"9_CR14","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/TMC.2015.2409877","volume":"15","author":"N Schweitzer","year":"2016","unstructured":"Schweitzer, N., Stulman, A., Shabtai, A., Margalit, R.: Mitigating denial of service attacks in OLSR protocol using fictitious nodes. IEEE Trans. Mob. Comput. 15(1), 163\u2013172 (2016)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"9_CR15","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-319-57141-6_21","volume-title":"Software Engineering Trends and Techniques in Intelligent Systems","author":"CK Vanamala","year":"2017","unstructured":"Vanamala, C.K., Raghvendra Rao, G.: Strategic modeling of secure routing decision in OLSR protocol in mobile ad-hoc network. In: Silhavy, R., Silhavy, P., Prokopova, Z., Senkerik, R., Kominkova Oplatkova, Z. (eds.) CSOC 2017. AISC, vol. 575, pp. 201\u2013208. Springer, Cham (2017). \n                  https:\/\/doi.org\/10.1007\/978-3-319-57141-6_21"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:49:05Z","timestamp":1558396145000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}