{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:46:20Z","timestamp":1762033580657,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T00:00:00Z","timestamp":1544054400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Wireless Inf Networks"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s10776-018-0418-z","type":"journal-article","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T05:27:36Z","timestamp":1544074056000},"page":"48-60","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Black Hole Attack Prevention in Wireless Peer-to-Peer Networks: A New Strategy"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0455-7821","authenticated-orcid":false,"given":"Peter","family":"Ndajah","sequence":"first","affiliation":[]},{"given":"Abdoul Ousmane","family":"Matine","sequence":"additional","affiliation":[]},{"given":"Mahouton Norbert","family":"Hounkonnou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,6]]},"reference":[{"key":"418_CR1","unstructured":"Y. Challal, S\u00e9curit\u00e9 de l\u2019Internet des Objets: Vers Une Approche Cognitive et Syst\u00e9mique des R\u00e9seaux et T\u00e9l\u00e9communications. Universit\u00e9 de Technologie de Compi\u00e8gne, 2012."},{"key":"418_CR2","volume-title":"A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks","author":"B Wu","year":"2006","unstructured":"B. Wu, et al., A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks, Department of Computer Science and Engineering, Florida Atlantic University, SpringerBerlin, 2006."},{"key":"418_CR3","unstructured":"D. Alexandre and E. Samuel, Peet-to-Peer, Master Professionnel, Syst\u00e8me Informatique et R\u00e9seaux, Universit\u00e9 Claude Bernard, Lyon, 2007."},{"key":"418_CR4","unstructured":"A. Benoit, Algorithmique des R\u00e9seaux et des T\u00e9l\u00e9coms, Chapitre 2: R\u00e9seaux Pair-\u00e0-Pair. ENS Lyon, 2006."},{"key":"418_CR5","volume-title":"Les R\u00e9seaux","author":"G Pujolle","year":"2008","unstructured":"G. Pujolle, Les R\u00e9seaux, EYROLLESParis, 2008."},{"key":"418_CR6","unstructured":"R. Al King, Localisation de Sources de Donn\u00e9es et Optimisation de Requ\u00eates R\u00e9parties en Environnement Pair-\u00e0-Pair. Th\u00e8se de Doctorat, Universit\u00e9 de Toulouse, 2010."},{"key":"418_CR7","doi-asserted-by":"crossref","unstructured":"Y. Huang and W. Lee, Attack analysis and detection for ad hoc routing protocols. In Proceedings of 7th International Symposium on Recent Advances in Intrusion Detection (RAID). Springer, 2004.","DOI":"10.1007\/978-3-540-30143-1_7"},{"key":"418_CR8","unstructured":"A. Esnault, Syst\u00e8mes Pair-\u00e0-Pair pour l\u2019Informatique Opportuniste. R\u00e9seaux et T\u00e9l\u00e9communications, Universit\u00e9 de Bretagne Sud, 2017."},{"key":"418_CR9","unstructured":"A. Hajami, S\u00e9curit\u00e9 du Routage dans les R\u00e9seaux sans Fil Spontan\u00e9s. Th\u00e8se de Doctorat, Universit\u00e9 Mohammed V Souissi, Maroc, 2011."},{"key":"418_CR10","unstructured":"N. Tabbane, S. Tabbane and A. Mehaoua, Simulation et M\u00e9sure des Performances du Protocole de Routage AODV. JTEA 2004, Hamamet, Tunisie, 2004."},{"key":"418_CR11","volume-title":"SUOLSR: A New Solution to Thwart Attacks Against the OLSR Protocol","author":"Abdellaoui Rachid","year":"2009","unstructured":"Abdellaoui Rachid and Jean-Marc Robert, SUOLSR: A New Solution to Thwart Attacks Against the OLSR Protocol, Ecole de Technologie Sup\u00e9rieureMontreal, 2009."},{"key":"418_CR12","doi-asserted-by":"crossref","unstructured":"P. Ning and K. Sun, How to misuse AODV: A case study of insider attacks against mobile ad hoc routing protocols. In Proceedings of IEEE Systems, Man and Cybernetics Society, Information Assurance Workshop (IAW\u201903). IEEE, June 2003.","DOI":"10.1016\/S1570-8705(04)00030-7"},{"key":"418_CR13","unstructured":"M. A. Ayachi, Contributions \u00e0 la D\u00e9tection des Comportements Malhonn\u00eates dans les R\u00e9seaux Ad Hoc AODV par Analyse de la Confiance Implicite. Th\u00e8se de Doctorat, Universit\u00e9 de Rennes 1, 2011."},{"key":"418_CR14","unstructured":"D. Raffo, Security Schemes for the OLSR Protocol for Ad Hoc Networks. Ph.D. Thesis, Universit\u00e9 de Paris, 2005."},{"issue":"10","key":"418_CR15","first-page":"1137","volume":"5","author":"Maha Abdelhaq","year":"2011","unstructured":"Maha Abdelhaq, et al., Security routing mechanism for black hole attack over AODV MANET routing protocol, Australian Journal of Basic and Applied Sciences, Vol. 5, No. 10, pp. 1137\u20131145, 2011.","journal-title":"Australian Journal of Basic and Applied Sciences"},{"issue":"6","key":"418_CR16","first-page":"444","volume":"2","author":"K Lakshmi","year":"2010","unstructured":"K. Lakshmi, et al., Modified AODV protocol against black hole attacks in MANET, International Journal of Engineering and Technology, Vol. 2, No. 6, pp. 444\u2013449, 2010.","journal-title":"International Journal of Engineering and Technology"},{"key":"418_CR17","unstructured":"H. Deng, W. Li and D. P. Agrawal, Routing security in wireless ad hoc networks. Communications Magazine, IEEE, October 2002."},{"key":"418_CR18","doi-asserted-by":"crossref","unstructured":"M. Al-Shurman, S. Yoo, and S. Park, Black hole attack in mobile ad hoc networks. In ACM Southeast Regional Conference, 2004.","DOI":"10.1145\/986537.986560"},{"key":"418_CR19","doi-asserted-by":"crossref","unstructured":"L. Tamilselvan and V. Sankaranarayanan, Prevention of black hole attack in MANET. In The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, Aus Wireless, 2007.","DOI":"10.1109\/AUSWIRELESS.2007.61"},{"issue":"5","key":"418_CR20","first-page":"3927","volume":"3","author":"L Himral","year":"2011","unstructured":"L. Himral, V. Vig, and N. Chand, Preventing AODV routing protocol from black hole attack, International Journal of Engineering Science and Technology (IJEST), Vol.3, No. 5, pp. 3927\u20133932, 2011.","journal-title":"International Journal of Engineering Science and Technology (IJEST)"},{"key":"418_CR21","first-page":"54","volume":"2","author":"PN Raj","year":"2009","unstructured":"P. N. Raj and P. B. Swadas, DPRAODV: A dynamic learning system against black hole attack in AODV-based MANET, IJCSI International Journal of Computer Science Issues, Vol. 2, pp. 54\u201359, 2009.","journal-title":"IJCSI International Journal of Computer Science Issues"},{"issue":"VI","key":"418_CR22","first-page":"37","volume":"2","author":"SC Mandhata","year":"2011","unstructured":"S. C. Mandhata and S. N. Patro, A counter measure to black hole attack on AODV-based mobile ad-hoc networks, International Journal of Computer and Communication Technology (IJCCT), Vol. 2, No. VI, pp. 37\u201342, 2011.","journal-title":"International Journal of Computer and Communication Technology (IJCCT)"},{"issue":"2","key":"418_CR23","first-page":"241","volume":"2","author":"SV Mallapur","year":"2012","unstructured":"S. V. Mallapur and S. R. Patil, Survey on simulation tools for mobile ad-hoc networks, International Journal of Computer Networks and Wireless Communication, Vol. 2, No. 2, pp. 241\u2013248, 2012.","journal-title":"International Journal of Computer Networks and Wireless Communication"},{"key":"418_CR24","unstructured":"V. Legrand and S. Ubda, Vers un Mod\u00e8le de Confiance pour les Objets Communicants: Une Approche Sociale, Laboratoire CITI INRIA ARES, 2004."},{"key":"418_CR25","volume-title":"Detection of multiple black hole nodes attack in MANET by modifying the AODV protocol","author":"N Kalia","year":"2016","unstructured":"N. Kalia and H. Sharma, Detection of multiple black hole nodes attack in MANET by modifying the AODV protocol, Lovely Professional University PhagwaraPunjab, 2016."},{"key":"418_CR26","volume-title":"Implementing a New Manet Unicast Routing Protocol in ns-2","author":"FJ Ros","year":"2004","unstructured":"F. J. Ros and P. M. Ruiz, Implementing a New Manet Unicast Routing Protocol in ns-2, Dept. of Information and Communication Engineering, University of MurciaMurcia, 2004."},{"key":"418_CR27","volume-title":"The ns Manual","author":"K Fall","year":"2011","unstructured":"K. Fall and K. Varadhan, The ns Manual, University of CaliforniaBerkeley, 2011."},{"issue":"1","key":"418_CR28","first-page":"7","volume":"33","author":"V Vasanthi","year":"2011","unstructured":"V. Vasanthi et al, A detailed study of mobility models in wireless sensor networks, Journal of Theoretical and Applied Information Technology, Vol. 33, No. 1, pp. 7\u201314, 2011.","journal-title":"Journal of Theoretical and Applied Information Technology"}],"container-title":["International Journal of Wireless Information Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-018-0418-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10776-018-0418-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-018-0418-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,5]],"date-time":"2019-12-05T19:09:21Z","timestamp":1575572961000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10776-018-0418-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,6]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["418"],"URL":"https:\/\/doi.org\/10.1007\/s10776-018-0418-z","relation":{},"ISSN":["1068-9605","1572-8129"],"issn-type":[{"type":"print","value":"1068-9605"},{"type":"electronic","value":"1572-8129"}],"subject":[],"published":{"date-parts":[[2018,12,6]]},"assertion":[{"value":"31 August 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}