{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T15:52:50Z","timestamp":1715615570094},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2012,4,11]],"date-time":"2012-04-11T00:00:00Z","timestamp":1334102400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1007\/s11276-012-0435-2","type":"journal-article","created":{"date-parts":[[2012,4,10]],"date-time":"2012-04-10T12:51:37Z","timestamp":1334062297000},"page":"811-826","source":"Crossref","is-referenced-by-count":6,"title":["Secure routing in MANETs using local times"],"prefix":"10.1007","volume":"18","author":[{"given":"Stephen","family":"Dabideen","sequence":"first","affiliation":[]},{"given":"J. J.","family":"Garcia-Luna-Aceves","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,4,11]]},"reference":[{"key":"435_CR1","doi-asserted-by":"crossref","unstructured":"Al-Shurman, M., Yoo, S. M., & Park, S. (2004). Black hole attack in mobile ad hoc networks. In ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference.","DOI":"10.1145\/986537.986560"},{"key":"435_CR2","doi-asserted-by":"crossref","unstructured":"Balachandran, R. K., Ramamurthy, B., Zou, X., & Vinodchandran, N. (2005). Crtdh: An efficient key agreement scheme for secure group communications in wireless ad hoc networks. In IEEE ICC.","DOI":"10.1109\/ICC.2005.1494522"},{"key":"435_CR3","doi-asserted-by":"crossref","unstructured":"Capkun, S., Buttyan, L., & Hubaux, J. P. (2003). Sector: Secure tracking of node encounters in multi-hop wireless networks. In ACM workshop on security of ad hoc and sensor networks.","DOI":"10.1145\/986858.986862"},{"key":"435_CR4","doi-asserted-by":"crossref","unstructured":"Choi, S., Kim, D. Y., Lee, D. H., & Jung, J. I. (2008). Wap: Wormhole attack prevention algorithm in mobile ad hoc networks. In IEEE international conference on sensor networks, ubiquitous and trustworthy computing.","DOI":"10.1109\/SUTC.2008.49"},{"issue":"2","key":"435_CR5","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.entcs.2007.12.022","volume":"197","author":"J. Cordasco","year":"2008","unstructured":"Cordasco, J., & Wetzel, S. (2008). Cryptographic vs. trust-based methods for manet routing security. Electronic Notes in Theoretical Computer Science, 197(2), 131\u2013140.","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"435_CR6","doi-asserted-by":"crossref","unstructured":"Dabideen, S., & Garcia-Luna-Aceves, J. (2010). Ordering in time: A new routing approach for wireless networks. In Proceedings of IEEE MASS.","DOI":"10.1109\/MASS.2010.5663950"},{"issue":"2\u20133","key":"435_CR7","first-page":"130","volume":"3","author":"S Dabideen","year":"2010","unstructured":"Dabideen, S., Smith, B. R., & Garcia-Luna-Aceves, J. J. (2010). An end-to-end approach to secure routing in manets. Wiley\u2019s Security and Communication Networks Journal; Special Issue on Security in Mobile Wireless Networks, 3(2\u20133), 130\u2013149.","journal-title":"Wiley\u2019s Security and Communication Networks Journal; Special Issue on Security in Mobile Wireless Networks"},{"issue":"10","key":"435_CR8","first-page":"70","volume":"40","author":"H Deng","year":"2002","unstructured":"Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in ad hoc networks. IEEE Communications Magazine. Special Topics on Security in Telecommunications Networks, 40(10), 70\u201375.","journal-title":"IEEE Communications Magazine. Special Topics on Security in Telecommunications Networks"},{"issue":"6","key":"435_CR9","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1016\/j.adhoc.2009.11.005","volume":"8","author":"R Dutta","year":"2010","unstructured":"Dutta, R., Mukhopadhyay, S., & Collier, M. (2010). Computationally secure self-healing key distribution with revocation in wireless ad hoc networks. Ad Hoc Networks, 8(6), 597\u2013613.","journal-title":"Ad Hoc Networks"},{"key":"435_CR10","doi-asserted-by":"crossref","unstructured":"Ericksson, J., Faloutsos, M., & Krishnamurthy, S. V. (2007). Routing amid colluding attackers. In Proceedings of ICNP.","DOI":"10.1109\/ICNP.2007.4375849"},{"key":"435_CR11","doi-asserted-by":"crossref","unstructured":"Ewy, B. J., Swink, M. T., Pennington, S. G., Evans, J., Kim, J. M., Ling, C., et\u00a0al. (2009). Tigr in iraq and afghanistan: Network-adaptive distribution of media rich tactical data. In IEEE military communications conference.","DOI":"10.1109\/MILCOM.2009.5379812"},{"key":"435_CR12","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/S1570-8705(03)00019-2","volume":"1","author":"Y. C. Hu","year":"2003","unstructured":"Hu, Y. C., Johnson, D. B., & Perrig, A. (2003). Sead: Secure and efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1, 175\u2013192.","journal-title":"Ad Hoc Networks"},{"key":"435_CR13","doi-asserted-by":"crossref","unstructured":"Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of INFOCOM.","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"435_CR14","doi-asserted-by":"crossref","unstructured":"Hu, Y. C., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11, 21\u201338.","DOI":"10.1007\/s11276-004-4744-y"},{"issue":"2","key":"435_CR15","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/JSAC.2005.861394","volume":"24","author":"Y. C. Hu","year":"2006","unstructured":"Hu, Y. C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications, 24(2), 370\u2013380.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"435_CR16","volume-title":"DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks","author":"D. B. Johnson","year":"2001","unstructured":"Johnson D. B., Maltz D. A., & Broch J. (2001). DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks. Reading, MA: Addison-Wesley."},{"key":"435_CR17","unstructured":"Kurkowski, S., Camp, T., & Navidi, W. (2006). Minimal standards for rigorous MANET routing protocol evaluation. Technical Report MCS 06-02, Colorado School of Mines."},{"key":"435_CR18","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of ACM MOBICOM.","DOI":"10.1145\/345910.345955"},{"issue":"1","key":"435_CR19","first-page":"1153","volume":"3","author":"W. Navidi","year":"2006","unstructured":"Navidi, W., & Camp, T. (2006). Stationary distributions for the random waypoint mobility model. IEEE Transactions on Mobile Computing, 3(1), 1153\u20131166.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"435_CR20","unstructured":"Pathak, V., Yao, D., & Iftode, L. (2008). Securing geographical routing in mobile ad-hoc networks. Rutgers University, Technical Report 638."},{"key":"435_CR21","doi-asserted-by":"crossref","unstructured":"Perkins, C. E., & Bhagwat, P. (1994). Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. In Proceedings of SIGCOMM\u201994 (pp. 234\u2013244).","DOI":"10.1145\/190809.190336"},{"key":"435_CR22","unstructured":"Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., & Nygard, K. (2003). Prevention of cooperative black hole attack in wireless ad hoc networks. In: Proceedings of international conference on wireless networks."},{"key":"435_CR23","doi-asserted-by":"crossref","unstructured":"Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., & Belding-Beyer, E. (2002) A secure routing protocol for ad hoc networks. In Proceedings of ICNP.","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"435_CR24","doi-asserted-by":"crossref","unstructured":"Sivakumar, K. A., & Ramkumar, M. (2007). An efficient secure route discovery protocol for DSR. In IEEE GLOBECOM.","DOI":"10.1109\/GLOCOM.2007.92"},{"key":"435_CR25","doi-asserted-by":"crossref","unstructured":"Xiaopeng, G., & Wei, C. (2007). A novel gray hole attack detection scheme for mobile ad-hoc networks. In IFIP international conference on network and parallel computing workshops.","DOI":"10.1109\/NPC.2007.88"},{"key":"435_CR26","doi-asserted-by":"crossref","unstructured":"Yi, S., Naldurg, P., & Kravets, R. (2001). Security-aware ad hoc routing for wireless networks. In Proceedings of ACM Mobihoc.","DOI":"10.1145\/501416.501464"},{"key":"435_CR27","doi-asserted-by":"crossref","unstructured":"Hu, Y.-C., & Adrian Perrig, D. B. J. (2003). Rushing attacks and defense in wireless ad hoc network and routing protocols. In Proceedings of WiSe.","DOI":"10.1145\/941311.941317"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-012-0435-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-012-0435-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-012-0435-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,23]],"date-time":"2024-04-23T01:56:39Z","timestamp":1713837399000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-012-0435-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,11]]},"references-count":27,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2012,10]]}},"alternative-id":["435"],"URL":"https:\/\/doi.org\/10.1007\/s11276-012-0435-2","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4,11]]}}}