{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T21:20:40Z","timestamp":1772486440832,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,1,26]],"date-time":"2011-01-26T00:00:00Z","timestamp":1296000000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s11227-010-0547-3","type":"journal-article","created":{"date-parts":[[2011,1,25]],"date-time":"2011-01-25T09:52:27Z","timestamp":1295949147000},"page":"777-804","source":"Crossref","is-referenced-by-count":16,"title":["Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents"],"prefix":"10.1007","volume":"64","author":[{"given":"Anoosha","family":"Prathapani","sequence":"first","affiliation":[]},{"given":"Lakshmi","family":"Santhanam","sequence":"additional","affiliation":[]},{"given":"Dharma P.","family":"Agrawal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,1,26]]},"reference":[{"key":"547_CR1","volume-title":"Introduction to wireless and mobile networks","author":"DP Agrawal","year":"2006","unstructured":"Agrawal DP, Zeng Q-A (2006) Introduction to wireless and mobile networks, 2nd\u00a0edn. Brookes Cole Publishing, Pacific Grove","edition":"2"},{"key":"547_CR2","doi-asserted-by":"crossref","unstructured":"Akyildiz IF, Wang X (2005) A survey on Wireless Mesh Networks. IEEE Commun Mag (Sept)","DOI":"10.1109\/MCOM.2005.1509968"},{"key":"547_CR3","doi-asserted-by":"crossref","unstructured":"Ben Salem N, Hubaux JP (2006) Securing Wireless Mesh Networks. IEEE Wirel Commun (Apr)","DOI":"10.1109\/MWC.2006.1632480"},{"key":"547_CR4","first-page":"2143","volume-title":"IEEE vehicular technology conference, VTS 54th","author":"S Bhargava","year":"2001","unstructured":"Bhargava S, Agrawal DP (2001) Security enhancements in AODV protocol for wireless ad hoc networks. In: IEEE vehicular technology conference, VTS 54th, vol\u00a04, pp\u00a02143\u20132147"},{"issue":"1","key":"547_CR5","first-page":"6","volume":"22","author":"MEM Campista","year":"2008","unstructured":"Campista MEM, Esposito PM, Moraes IM, Costa LHMK, Duarte OCMM, Passos DG, Albuquereque CVN, Saade DCM, Rubistein MG (2008) Routing metrics and protocols for Wireless Mesh Networks. IEEE Commun Mag 22(1):6\u201312","journal-title":"IEEE Commun Mag"},{"key":"547_CR6","doi-asserted-by":"crossref","DOI":"10.1142\/6044","volume-title":"Ad hoc and sensor networks: theory and application","author":"C Cordeiro","year":"2006","unstructured":"Cordeiro C, Agrawal DP (2006) Ad hoc and sensor networks: theory and application. World Scientific, Singapore"},{"key":"547_CR7","doi-asserted-by":"crossref","unstructured":"Deng H, Li W, Agrawal DP (2002) Routing security in wireless ad hoc network. IEEE Commun Mag 40(10)","DOI":"10.1109\/MCOM.2002.1039859"},{"key":"547_CR8","unstructured":"http:\/\/www.earthlink.net (2011)"},{"key":"547_CR9","first-page":"12","volume-title":"Proc of ACM Mobicom","author":"Y Hu","year":"2002","unstructured":"Hu Y, Perrig A, Johnson DB (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. In: Proc of ACM Mobicom, pp\u00a012\u201323"},{"key":"547_CR10","doi-asserted-by":"crossref","unstructured":"Hu Y, Johnson DB, Perrig A (2003) SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Netw 175\u2013192","DOI":"10.1016\/S1570-8705(03)00019-2"},{"key":"547_CR11","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1145\/986858.986877","volume-title":"Proceedings of 1st ACM workshop on ad hoc and sensor networks","author":"Y-A Huang","year":"2003","unstructured":"Huang Y-A, Lee W (2003) A cooperative intrusion detection system for ad hoc networks. In: Proceedings of 1st ACM workshop on ad hoc and sensor networks, pp\u00a0135\u2013147"},{"key":"547_CR12","first-page":"246","volume-title":"Emerging technologies & Factory automation, ETFA, IEEE","author":"Z Karakehayov","year":"2007","unstructured":"Karakehayov Z (2007) Security\u2013lifetime tradeoffs for wireless sensor networks. In: Emerging technologies & Factory automation, ETFA, IEEE, Sept 2007, pp\u00a0246\u2013250"},{"key":"547_CR13","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1109\/SNPA.2003.1203362","volume-title":"First IEEE international workshop on sensor network protocols and applications (SNPA 03)","author":"C Karlof","year":"2003","unstructured":"Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. In: First IEEE international workshop on sensor network protocols and applications (SNPA 03), May 2003, pp\u00a0113\u2013127"},{"key":"547_CR14","doi-asserted-by":"crossref","first-page":"1152","DOI":"10.1016\/j.jpdc.2006.04.016","volume":"66","author":"S Khattab","year":"2006","unstructured":"Khattab S, Melhem R, Mosse D, Znati T (2006) Honeypot back-propagation for mitigating spoofing distributed Denial-of-service attacks. J Parallel Distrib Comput 66:1152\u20131164","journal-title":"J Parallel Distrib Comput"},{"key":"547_CR15","unstructured":"Nandiraju D (2009) Efficient traffic diversion and load balancing in wireless mesh networks. Ph.D. Dissertation, University of Cincinnati"},{"issue":"4","key":"547_CR16","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/MWC.2007.4300975","volume":"14","author":"N Nandiraju","year":"2007","unstructured":"Nandiraju N, Nandiraju D, Santhanam L, He B, Wang J, Agrawal DP (2007) Wireless mesh networks: current challenges and future directions of web-in-the-sky. IEEE Commun Mag 14(4):2\u201312","journal-title":"IEEE Commun Mag"},{"key":"547_CR17","unstructured":"Network Simulator (NS-2) (2011) http:\/\/www.isi.edu\/nsnam\/ns\/index.html"},{"issue":"6","key":"547_CR18","doi-asserted-by":"crossref","first-page":"795","DOI":"10.1016\/j.adhoc.2004.04.001","volume":"3","author":"P Ning","year":"2005","unstructured":"Ning P, Sun K (2005) How to misuse AODV: a case study of insider attacks against mobile ad hoc routing protocols. Ad Hoc Netw 3(6):795\u2013819","journal-title":"Ad Hoc Netw"},{"key":"547_CR19","volume-title":"Proceedings of the international conference on wireless networks","author":"S Ramaswamy","year":"2003","unstructured":"Ramaswamy S, Fu H, Sreekantaradhya M, Dixon J, Nygard K (2003) Prevention of cooperative black hole attack in wireless ad hoc networks. In: Proceedings of the international conference on wireless networks, June 2003"},{"key":"547_CR20","volume-title":"Fault tolerance systems group (GSTF)","author":"J-C Ruiz","year":"2011","unstructured":"Ruiz J-C, Friginal J, Andres D, Gil P (2011) Blackhole attack injection in ad hoc networks. In: Fault tolerance systems group (GSTF). http:\/\/www.ece.cmu.edu\/~koopman\/dsn08\/fastabs\/dsn08fastabs_ruiz.pdf"},{"key":"547_CR21","unstructured":"Santhanam L (2008) Integrated security architecture for Wireless Mesh Networks. Ph.D. Dissertation, University of Cincinnati, Mar 2008"},{"key":"547_CR22","volume-title":"3rd Intl conference on wireless and mobile communications","author":"L Santhanam","year":"2007","unstructured":"Santhanam L, Mukherjee A, Bhatnagar R, Agrawal DP (2007) A perceptron based classifier for detecting malicious route floods in Wireless Mesh Networks. In: 3rd Intl conference on wireless and mobile communications, Guadeloupe, French Caribbean, 4\u20139 March, 2007"},{"key":"547_CR23","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/11872153_13","volume-title":"Personal wireless communication","author":"L Santhanam","year":"2006","unstructured":"Santhanam L, Nandiraju N, Yoo Y, Agrawal DP (2006) Distributed self-policing architecture for fostering node cooperation in Wireless Mesh Networks. In: Personal wireless communication, Sept 20\u201322, Spain. Lecture notes in computer science, vol 4217\/2006. Springer, Berlin, pp\u00a0147\u2013158"},{"key":"547_CR24","first-page":"96","volume-title":"Proceedings of ACM of 42nd annual south-east conference regional conference","author":"MA Shurman","year":"2004","unstructured":"Shurman MA, Yoo S-M, Park S (2004) Blackhole attack in mobile ad hoc networks. In: Proceedings of ACM of 42nd annual south-east conference regional conference, pp\u00a096\u201397"},{"key":"547_CR25","doi-asserted-by":"crossref","unstructured":"Spintzer L (2003) The honeynet project: trapping the hackers. IEEE Secur Priv Mag 1(2)","DOI":"10.1109\/MSECP.2003.1193207"},{"key":"547_CR26","unstructured":"The Honeynet Project (2011) http:\/\/www.honeynet.org\/"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0547-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-010-0547-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0547-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T23:46:49Z","timestamp":1559951209000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-010-0547-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,26]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["547"],"URL":"https:\/\/doi.org\/10.1007\/s11227-010-0547-3","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,26]]}}}