{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T18:24:58Z","timestamp":1760898298447},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,12,19]],"date-time":"2014-12-19T00:00:00Z","timestamp":1418947200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1007\/s11227-014-1353-0","type":"journal-article","created":{"date-parts":[[2014,12,18]],"date-time":"2014-12-18T19:38:33Z","timestamp":1418931513000},"page":"1740-1756","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks"],"prefix":"10.1007","volume":"72","author":[{"given":"Daesung","family":"Moon","sequence":"first","affiliation":[]},{"given":"Jae Dong","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Young-Sik","family":"Jeong","sequence":"additional","affiliation":[]},{"given":"Jong Hyuk","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,19]]},"reference":[{"issue":"2","key":"1353_CR1","doi-asserted-by":"crossref","first-page":"277","DOI":"10.24297\/ijct.v4i2a2.3171","volume":"4","author":"IA Lone","year":"2013","unstructured":"Lone IA, Ali J, Lone K (2013) IDARP: ID-based address resolution protocol. Int J Comput Technol 4(2):277\u2013283","journal-title":"Int J Comput Technol"},{"key":"1353_CR2","doi-asserted-by":"crossref","unstructured":"Wu L, Yu T, Wu D, Cheng J (2011) The research and implementation of ARP monitoring and protection. Proc Internet Technol Appl:1\u20134","DOI":"10.1109\/ITAP.2011.6006145"},{"key":"1353_CR3","unstructured":"Philip R (2007) Securing wireless networks from ARP cache poisoning. Master\u2019s Projects, San Jose State University, p 131"},{"key":"1353_CR4","unstructured":"Abad CL, Bonilla RI (2007) An analysis on the schemes for detecting and preventing ARP cache poisoning attacks. Distrib Comput Syst Workshops:60"},{"issue":"3","key":"1353_CR5","doi-asserted-by":"crossref","first-page":"477","DOI":"10.3745\/JIPS.2013.9.3.477","volume":"9","author":"T Dubey","year":"2013","unstructured":"Dubey T, Sahu OP (2013) Self-localized packet forwarding in wireless sensor networks. J Inform Proc Syst 9(3):477\u2013488","journal-title":"J Inform Proc Syst"},{"issue":"2","key":"1353_CR6","first-page":"1","volume":"3","author":"MS Obaidat","year":"2012","unstructured":"Obaidat MS, Zarai F (2012) Novel algorithm for secured mobility and IP traceability for WLAN networks. J Convergence 3(2):1\u20138","journal-title":"J Convergence"},{"key":"1353_CR7","doi-asserted-by":"crossref","unstructured":"Singh R, Singh P, Duhan M (2014) An effective implementation of security based algorithmic approach in mobile adhoc networks. Human-centric Comput Inform Sci 4(1):1\u201314","DOI":"10.1186\/s13673-014-0007-9"},{"key":"1353_CR8","first-page":"57","volume":"41","author":"MG Gouda","year":"2003","unstructured":"Gouda MG, Huang CT (2003) A secure address resolution protocol. Int J Comput Telecommun Networking 41:57\u201371","journal-title":"Int J Comput Telecommun Networking"},{"key":"1353_CR9","doi-asserted-by":"crossref","unstructured":"Bruschi D, Ornaghi A, Rosti E (2003) S-ARP: a secure address resolution protocol. Proc Comput Secur Appl Conf:66\u201374","DOI":"10.1109\/CSAC.2003.1254311"},{"issue":"15","key":"1353_CR10","doi-asserted-by":"crossref","first-page":"4322","DOI":"10.1016\/j.comnet.2007.05.007","volume":"51","author":"W Lootah","year":"2007","unstructured":"Lootah W, Enck W, McDaniel P (2007) TARP: ticket-based address resolution protocol. Comput Netw 51(15):4322\u20134337","journal-title":"Comput Netw"},{"key":"1353_CR11","doi-asserted-by":"crossref","unstructured":"Xing W, Zhao Y, Li T (2010) Research on the defense against ARP spoofing attacks based on WinPcap. In: Proceedings of Second International Workshop on Education Technology and Computer Science (ETCS2010), pp 762\u2013765","DOI":"10.1109\/ETCS.2010.75"},{"key":"1353_CR12","unstructured":"Limmaneewichid P, Lilakiatsakun W (2011) P-ARP: a novel enhanced authentication scheme for securing ARP. In: Proceeding of 2011 International Conference on Telecommunication Technology and Applications, vol 5, pp 83\u201387"},{"issue":"7","key":"1353_CR13","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1049\/iet-com.2011.0566","volume":"6","author":"M Oh","year":"2012","unstructured":"Oh M, Kim Y-G, Hong S, Cha SD (2012) ASA: agent-based secure ARP cache management. IET Commun 6(7):685\u2013693","journal-title":"IET Commun"},{"key":"1353_CR14","first-page":"7","volume":"2014","author":"MS Song","year":"2014","unstructured":"Song MS, Lee JD, Jeong J-S, Jeong H-Y, Park JH (2014) DS-ARP: a new detection scheme for ARP spoofing attacks based on routing trace for ubiquitous environments. SCIE 2014:7 Article ID 264654","journal-title":"SCIE"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-014-1353-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-014-1353-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-014-1353-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T01:43:48Z","timestamp":1598579028000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-014-1353-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,19]]},"references-count":14,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,5]]}},"alternative-id":["1353"],"URL":"https:\/\/doi.org\/10.1007\/s11227-014-1353-0","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,19]]}}}