{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T07:46:01Z","timestamp":1724053561685},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,5,29]],"date-time":"2015-05-29T00:00:00Z","timestamp":1432857600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1007\/s11277-015-2327-0","type":"journal-article","created":{"date-parts":[[2015,5,28]],"date-time":"2015-05-28T11:05:30Z","timestamp":1432811130000},"page":"1-15","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["DNACK: False Data Detection Based on Negative Acknowledgment and Digital Signature on Mobile Ad-hoc Network"],"prefix":"10.1007","volume":"83","author":[{"given":"Babak Emami","family":"Abarghouei","sequence":"first","affiliation":[]},{"given":"Ali","family":"Farokhtala","sequence":"additional","affiliation":[]},{"given":"Mojtaba","family":"Alizadeh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,29]]},"reference":[{"key":"2327_CR1","doi-asserted-by":"crossref","unstructured":"Balakrishnan, K., et al. (2005). TWOACK: Preventing selfishness in mobile ad hoc networks. In Wireless communications and networking conference, 2005 IEEE (pp. 2137\u20132142).","DOI":"10.1109\/WCNC.2005.1424848"},{"key":"2327_CR2","unstructured":"Xinyu, Y. et al. (2012). A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. In Distributed computing systems (ICDCS), 2012 IEEE 32nd international conference on (pp. 92\u2013101)."},{"key":"2327_CR3","doi-asserted-by":"crossref","first-page":"536","DOI":"10.1109\/TMC.2007.1036","volume":"6","author":"K Liu","year":"2007","unstructured":"Liu, K., et al. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. Mobile Computing, IEEE Transactions on, 6, 536\u2013550.","journal-title":"Mobile Computing, IEEE Transactions on"},{"key":"2327_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Xiong, X., & Deng, J. (2012). A novel key chain-based en-route filtering protocol for wireless sensor networks.","DOI":"10.21307\/ijssis-2017-608"},{"key":"2327_CR5","doi-asserted-by":"crossref","unstructured":"Wahengbam, M., & Marchang, N. (2012). Intrusion detection in MANET using fuzzy logic. In Emerging trends and applications in computer science (NCETACS), 2012 3rd national conference on (pp. 189\u2013192).","DOI":"10.1109\/NCETACS.2012.6203324"},{"key":"2327_CR6","doi-asserted-by":"crossref","first-page":"7968","DOI":"10.1016\/j.eswa.2012.01.118","volume":"39","author":"H-M Sun","year":"2012","unstructured":"Sun, H.-M., et al. (2012). A novel acknowledgment-based approach against collude attacks in MANET. Expert Systems with Applications, 39, 7968\u20137975.","journal-title":"Expert Systems with Applications"},{"key":"2327_CR7","unstructured":"Jeba, S. A., & Paramasivan, B. (2012). An evaluation of en-route filtering schemes on wireless sensor networks. International Journal of Computer Engineering & Technology (IJCET), 3, 62\u201373."},{"key":"2327_CR8","first-page":"248","volume":"82","author":"SA Jeba","year":"2012","unstructured":"Jeba, S. A., & Paramasivan, B. (2012). False data injection attack and its countermeasures in wireless sensor networks. European Journal of Scientific Research, 82, 248\u2013257.","journal-title":"European Journal of Scientific Research"},{"key":"2327_CR9","doi-asserted-by":"crossref","unstructured":"Song, N. et al. (2005). Wormhole attacks detection in wireless ad hoc networks: A statistical analysis approach. In Parallel and distributed processing symposium, 2005. Proceedings. 19th IEEE international (p. 8).","DOI":"10.1109\/IPDPS.2005.471"},{"key":"2327_CR10","doi-asserted-by":"crossref","unstructured":"Chiu, H. S., & Lui, K.-S. (2006). DelPHI: Wormhole detection mechanism for ad hoc wireless networks. In Wireless pervasive computing, 2006 1st international symposium on (p. 6).","DOI":"10.1109\/ISWPC.2006.1613586"},{"key":"2327_CR11","doi-asserted-by":"crossref","unstructured":"Gupta, S. et al. (2011). WHOP: Wormhole attack detection protocol using hound packet. In Innovations in information technology (IIT), 2011 international conference on (pp. 226\u2013231).","DOI":"10.1109\/INNOVATIONS.2011.5893822"},{"key":"2327_CR12","doi-asserted-by":"crossref","unstructured":"Kraub, C. et al. (2007). STEF: A secure ticket-based en-route filtering scheme for wireless sensor networks. In Availability, reliability and security, 2007. ARES 2007. The second international conference on (pp. 310\u2013317).","DOI":"10.1109\/ARES.2007.144"},{"key":"2327_CR13","doi-asserted-by":"crossref","unstructured":"Du, W. et al. (2003). A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the 10th ACM conference on computer and communications security (pp. 42\u201351).","DOI":"10.1145\/948109.948118"},{"key":"2327_CR14","doi-asserted-by":"crossref","unstructured":"Wang, H., Li, Q. (2007). PDF: A public-key based false data filtering scheme in sensor networks. In Wireless algorithms, systems and applications, 2007. WASA 2007. International conference on (pp. 129\u2013138).","DOI":"10.1109\/WASA.2007.27"},{"key":"2327_CR15","unstructured":"Li, W., & Fei, G. (2010). A secure clustering scheme protocol for MANET. In Multimedia information networking and security (MINES), 2010 international conference on (pp. 785\u2013789)."},{"key":"2327_CR16","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.peva.2010.09.005","volume":"68","author":"J-H Cho","year":"2011","unstructured":"Cho, J.-H., & Chen, I.-R. (2011). Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks. Performance Evaluation, 68, 58\u201375.","journal-title":"Performance Evaluation"},{"key":"2327_CR17","doi-asserted-by":"crossref","unstructured":"Bala Krishna, M., & Doja, M. N. (2011). Symmetric key management and distribution techniques in wireless ad hoc networks. In Computational intelligence and communication networks (CICN), 2011 international conference on (pp. 727\u2013731).","DOI":"10.1109\/CICN.2011.158"},{"key":"2327_CR18","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A Perrig","year":"2002","unstructured":"Perrig, A., et al. (2002). SPINS: Security protocols for sensor networks. Wireless networks, 8, 521\u2013534.","journal-title":"Wireless networks"},{"key":"2327_CR19","doi-asserted-by":"crossref","unstructured":"Chan, A. C. F. (2004). Distributed symmetric key management for mobile ad hoc networks. In INFOCOM 2004. Twenty-third annual joint conference of the IEEE computer and communications societies (vol. 4, pp. 2414\u20132424).","DOI":"10.1109\/INFCOM.2004.1354663"},{"key":"2327_CR20","doi-asserted-by":"crossref","unstructured":"Ertaul, L., & Lu, W. (2005). ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I). In NETWORKING 2005. Networking technologies, services, and protocols; performance of computer and communication networks; mobile and wireless communications systems (pp. 102\u2013113). Springer.","DOI":"10.1007\/11422778_9"},{"key":"2327_CR21","unstructured":"Zhu, S. et al. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Security and privacy, 2004. Proceedings. 2004 IEEE symposium on (pp. 259\u2013271)."},{"key":"2327_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, Y. et al. (2005). Securing sensor networks with location-based keys. In Wireless communications and networking conference, 2005 IEEE (pp. 1909\u20131914).","DOI":"10.1109\/WCNC.2005.1424811"},{"key":"2327_CR23","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1145\/581291.581312","volume":"6","author":"MG Zapata","year":"2002","unstructured":"Zapata, M. G. (2002). Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mobile Computing and Communications Review, 6, 106\u2013107.","journal-title":"ACM SIGMOBILE Mobile Computing and Communications Review"},{"key":"2327_CR24","first-page":"1","volume":"6","author":"H Yu","year":"2013","unstructured":"Yu, H., & He, J. (2013). Authentication and en-route data filtering for wireless sensor networks in the internet of things scenario. International Journal of Grid and Distributed Computing, 6, 1\u201312.","journal-title":"International Journal of Grid and Distributed Computing"},{"key":"2327_CR25","doi-asserted-by":"crossref","unstructured":"Li, F., & Wu, J. (2006). A probabilistic voting-based filtering scheme in wireless sensor networks. In Proceedings of the 2006 international conference on wireless communications and mobile computing (pp. 27\u201332).","DOI":"10.1109\/ICWMC.2006.5"},{"key":"2327_CR26","first-page":"78","volume":"11","author":"J Luo","year":"2009","unstructured":"Luo, J., et al. (2009). A survey of multicast routing protocols for mobile ad-hoc networks. Communications Surveys & Tutorials, IEEE, 11, 78\u201391.","journal-title":"Communications Surveys & Tutorials, IEEE"},{"key":"2327_CR27","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1016\/j.ins.2012.07.036","volume":"220","author":"W Wang","year":"2013","unstructured":"Wang, W., et al. (2013). Energy-aware and self-adaptive anomaly detection scheme based on network tomography in mobile ad hoc networks. Information Sciences, 220, 580\u2013602.","journal-title":"Information Sciences"},{"key":"2327_CR28","unstructured":"Selvamani, K. et al. (2012). A hybrid framework of intrusion detection system for resource consumption based attacks in wireless ad-hoc networks. In Systems and informatics (ICSAI), 2012 international conference on (pp. 8\u201312)."},{"key":"2327_CR29","unstructured":"Ye, F. et al. (2004). Statistical en-route filtering of injected false data in sensor networks. In INFOCOM 2004. Twenty-third annual joint conference of the IEEE computer and communications societies (pp. 2446\u20132457)."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2327-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-2327-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2327-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T14:25:07Z","timestamp":1566743107000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-2327-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,29]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,7]]}},"alternative-id":["2327"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-2327-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,29]]}}}