{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T08:07:06Z","timestamp":1660723626948},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,5,11]],"date-time":"2013-05-11T00:00:00Z","timestamp":1368230400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1007\/s10660-013-9122-3","type":"journal-article","created":{"date-parts":[[2013,5,10]],"date-time":"2013-05-10T09:55:20Z","timestamp":1368179720000},"page":"329-345","source":"Crossref","is-referenced-by-count":3,"title":["A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology"],"prefix":"10.1007","volume":"13","author":[{"given":"Fei","family":"Shi","sequence":"first","affiliation":[]},{"given":"Weijie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Dongxu","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Jooseok","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,11]]},"reference":[{"issue":"2","key":"9122_CR1","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/s10660-010-9052-2","volume":"10","author":"J. T. Isaac","year":"2010","unstructured":"Isaac, J. T., Zeadally, S., & C\u00e1mara, J. S. (2010). Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks. Journal of Electronic Commerce Research, 10(2), 209\u2013233.","journal-title":"Journal of Electronic Commerce Research"},{"issue":"1","key":"9122_CR2","first-page":"5","volume":"3","author":"X. Zhou","year":"2012","unstructured":"Zhou, X., Ge, Y., Chen, X., Jing, Y., & Sun, W. (2012). A distributed cache based reliable service execution and recovery approach in MANETs. Journal of Convergence, 3(1), 5\u201312.","journal-title":"Journal of Convergence"},{"issue":"2","key":"9122_CR3","first-page":"13","volume":"2","author":"M. S. Shbat","year":"2011","unstructured":"Shbat, M. S., & Tuzlukov, V. (2011). Dynamic frequency reuse factor choosing method for self organizing LTE networks. Journal of Convergence, 2(2), 13\u201318.","journal-title":"Journal of Convergence"},{"key":"9122_CR4","doi-asserted-by":"crossref","unstructured":"Tseng, H., Chou, L.-D., & Chao, H.-C. (2011). A survey of black hole attacks in wireless mobile ad hoc networks. Human-Centric Computing and Information Sciences, 1(4). doi: 10.1186\/2192-1962-1-4 .","DOI":"10.1186\/2192-1962-1-4"},{"issue":"1","key":"9122_CR5","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s10660-011-9086-0","volume":"12","author":"J. T. Isaac","year":"2012","unstructured":"Isaac, J. T., Zeadally, S., & C\u00e1mara, J. S. (2012). A lightweight secure mobile payment protocol for vehicular ad-hoc networks (VANETs). Journal of Electronic Commerce Research, 12(1), 97\u2013123.","journal-title":"Journal of Electronic Commerce Research"},{"issue":"4","key":"9122_CR6","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1109\/SURV.2011.092110.00088","volume":"13","author":"J. H. Cho","year":"2011","unstructured":"Cho, J. H., Swami, A., & Chen, I. R. (2011). A survey on trust management for mobile ad hoc networks. Communication Surveys & Tutorials, 13(4), 562\u2013583.","journal-title":"Communication Surveys & Tutorials"},{"key":"9122_CR7","first-page":"245","volume-title":"3rd international conference on electronics computer technology","author":"P. Nagrath","year":"2011","unstructured":"Nagrath, P., & Gupta, B. (2011). Wormhole attacks in wireless ad hoc networks and their counter measurements: a survey. In 3rd international conference on electronics computer technology (pp.\u00a0245\u2013250)."},{"issue":"4","key":"9122_CR8","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1007\/s10660-012-9103-y","volume":"12","author":"Z. Tan","year":"2012","unstructured":"Tan, Z. (2012). An efficient identity-based tripartite authenticated key agreement protocol. Journal of Electronic Commerce Research, 12(4), 505\u2013518.","journal-title":"Journal of Electronic Commerce Research"},{"issue":"4","key":"9122_CR9","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1023\/B:ELEC.0000037082.39182.3a","volume":"4","author":"S. K. Misra","year":"2004","unstructured":"Misra, S. K., & Wickamasinghe, N. (2004). Security of a mobile transaction: a trust model. Journal of Electronic Commerce Research, 4(4), 359\u2013372.","journal-title":"Journal of Electronic Commerce Research"},{"issue":"4","key":"9122_CR10","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1023\/A:1011506902005","volume":"1","author":"M. V. Loukola","year":"2001","unstructured":"Loukola, M. V., & Skytt\u00e4, J. O. (2001). Enhanced augmented IP routing protocol (EAIRP) in IPv6 environment. Journal of Electronic Commerce Research, 1(4), 359\u2013370.","journal-title":"Journal of Electronic Commerce Research"},{"key":"9122_CR11","first-page":"1976","volume-title":"22nd INFOCOM","author":"Y. C. Hu","year":"2003","unstructured":"Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: a defense against wormhole attacks in wireless networks. In 22nd INFOCOM (pp. 1976\u20131986)."},{"issue":"1","key":"9122_CR12","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10660-010-9068-7","volume":"11","author":"K. Petrova","year":"2011","unstructured":"Petrova, K., & Wang, B. (2011). Location-based services deployment and demand: a roadmap model. Journal of Electronic Commerce Research, 11(1), 5\u201329.","journal-title":"Journal of Electronic Commerce Research"},{"issue":"1","key":"9122_CR13","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s10660-010-9070-0","volume":"11","author":"A. Aloudat","year":"2011","unstructured":"Aloudat, A., & Michael, K. (2011). Toward the regulation of ubiquitous mobile government: a case study on location-based emergency services in Australia. Journal of Electronic Commerce Research, 11(1), 31\u201374.","journal-title":"Journal of Electronic Commerce Research"},{"issue":"1","key":"9122_CR14","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/s10660-013-9106-3","volume":"13","author":"T. Zhou","year":"2013","unstructured":"Zhou, T. (2013). An empirical examination of user adoption of location-based services. Journal of Electronic Commerce Research, 13(1), 25\u201339.","journal-title":"Journal of Electronic Commerce Research"},{"key":"9122_CR15","first-page":"131","volume-title":"Network and distributed system security symposium","author":"L. Hu","year":"2004","unstructured":"Hu, L., & Evans, D. (2004). Using directional antennas to prevent wormhole attacks. In Network and distributed system security symposium (pp. 131\u2013141)."},{"key":"9122_CR16","first-page":"2106","volume-title":"IEEE wireless communications and networking conference","author":"L. Qian","year":"2005","unstructured":"Qian, L., Song, N., & Li, X. (2005). Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path. In IEEE wireless communications and networking conference (pp. 2106\u20132111)."},{"issue":"2","key":"9122_CR17","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1016\/j.cose.2009.09.005","volume":"29","author":"M.-Y. Su","year":"2009","unstructured":"Su, M.-Y. (2009). WARP: a wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. Journal of Computers & Security, 29(2), 208\u2013224.","journal-title":"Journal of Computers & Security"},{"key":"9122_CR18","first-page":"1721","volume-title":"International joint conference of IEEE TrustCom-11\/IEEE ICESS-11\/FCST-11","author":"F. Shi","year":"2011","unstructured":"Shi, F., Jin, D., Liu, W., & Song, J.-S. (2011). Time-based detection and location of wormhole attacks in wireless ad hoc networks. In International joint conference of IEEE TrustCom-11\/IEEE ICESS-11\/FCST-11 (pp. 1721\u20131726)."},{"issue":"1","key":"9122_CR19","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1504\/IJSSCI.2008.017590","volume":"1","author":"T. L. Saaty","year":"2008","unstructured":"Saaty, T. L. (2008). Decision making with the analytic hierarchy process. International Journal of Services Sciences, 1(1), 83\u201398.","journal-title":"International Journal of Services Sciences"},{"key":"9122_CR20","doi-asserted-by":"crossref","unstructured":"Aikebaier, A., Enokido, T., & Takizawa, M. (2011). Trustworthy group making algorithm in distributed systems. Human-Centric Computing and Information Sciences, 1(6). doi: 10.1186\/2192-1962-1-6 .","DOI":"10.1186\/2192-1962-1-6"},{"key":"9122_CR21","author":"F. Shi","year":"2011","unstructured":"Shi, F., Baek, J., Song, J., & Liu, W. (2011). A novel scheme to prevent MAC layer misbehavior. IEEE 802.11 Ad Hoc Networks, Telecommunication Systems. doi: 10.1007\/s11235-011-9552-y .","journal-title":"IEEE 802.11 Ad Hoc Networks, Telecommunication Systems"},{"key":"9122_CR22","first-page":"90","volume-title":"2nd IEEE workshop on mobile computing systems and applications","author":"C. E. Perkins","year":"1999","unstructured":"Perkins, C. E., & Royer, E. M. (1999). Ad-hoc on-demand distance vector routing. In 2nd IEEE workshop on mobile computing systems and applications (pp. 90\u2013100)."},{"key":"9122_CR23","author":"A. Nadeem","year":"2011","unstructured":"Nadeem, A., & Howarth, M. (2011). Protection of MANETs from a range of attacks using an intrusion detection and prevention system. Telecommunications Systems. doi: 10.1007\/s11235-011-9484-6 .","journal-title":"Telecommunications Systems"}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9122-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-013-9122-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9122-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,26]],"date-time":"2019-03-26T18:53:16Z","timestamp":1553626396000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-013-9122-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,11]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,9]]}},"alternative-id":["9122"],"URL":"https:\/\/doi.org\/10.1007\/s10660-013-9122-3","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,11]]}}}