{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:31Z","timestamp":1740122671814,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,2,3]],"date-time":"2017-02-03T00:00:00Z","timestamp":1486080000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s11277-017-4008-7","type":"journal-article","created":{"date-parts":[[2017,2,3]],"date-time":"2017-02-03T12:25:33Z","timestamp":1486124733000},"page":"3477-3492","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Efficient DSR Protocol to Detect Blackhole Attacks in WMN Using Cross Layer Approach"],"prefix":"10.1007","volume":"95","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1796-1372","authenticated-orcid":false,"given":"R.","family":"Thillaikarasi","sequence":"first","affiliation":[]},{"given":"S. Mary Saira","family":"Bhanu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,3]]},"reference":[{"issue":"4","key":"4008_CR1","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1016\/j.comnet.2004.12.001","volume":"47","author":"IF Akyildiz","year":"2005","unstructured":"Akyildiz, I. F., Wang, X., & Wang, W. (2005). Wireless mesh network: A survey. Computer Networks and ISDN Systems, 47(4), 445\u2013487.","journal-title":"Computer Networks and ISDN Systems"},{"key":"4008_CR2","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MNET.2008.4435897","volume":"22","author":"MEM Campista","year":"2008","unstructured":"Campista, M. E. M., & Passos, D. G. (2008). Routing metrics and protocols for wireless mesh networks. IEEE Network Magazine, 22, 6\u201312.","journal-title":"IEEE Network Magazine"},{"key":"4008_CR3","unstructured":"Ad hoc on-demand distance vector (AODV) routing. \n                        www.ietf.org\/rfc\/rfc3561.txt\n                        \n                    ."},{"key":"4008_CR4","unstructured":"Draves, R., Padhye, J., & Zill, B. (2004). The architecture of the link quality source routing protocol, technical report MSR-TR-2004-57, Microsoft Research."},{"key":"4008_CR5","doi-asserted-by":"crossref","unstructured":"Draves, R., Padhye, J., & Zill, B. (2004). Routing in multi-radio, multi-hop wireless mesh networks. In ACM international conference on mobile computing and networking (MobiCom) (p. 114128).","DOI":"10.1145\/1023720.1023732"},{"key":"4008_CR6","unstructured":"www.google.com\/patents\/US7978672\n                        \n                    ."},{"key":"4008_CR7","unstructured":"Optimized Link State Routing Protocol (RFC 3626)-IETF. \n                        www.ietf.org\/rfc\/rfc3626.txt\n                        \n                    ."},{"key":"4008_CR8","doi-asserted-by":"crossref","unstructured":"Perkins, C. E., & Bhagwa, P. (1994). Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In SIGCOMM \u201994 proceedings of the conference on communications architectures, protocols and applications (pp. 234\u2013244).","DOI":"10.1145\/190314.190336"},{"key":"4008_CR9","unstructured":"The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4. \n                        www.ietf.org\/rfc\/rfc4728.txt\n                        \n                    ."},{"issue":"2","key":"4008_CR10","doi-asserted-by":"crossref","first-page":"1061","DOI":"10.1109\/TVT.2007.911615","volume":"57","author":"IF Akyildiz","year":"2008","unstructured":"Akyildiz, I. F., & Xudong, W. (2008). Cross-layer design in wireless mesh networks. IEEE Transactions on Vehicular Technology, 57(2), 1061\u20131076.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"5","key":"4008_CR11","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1109\/49.768196","volume":"17","author":"C Chien","year":"1999","unstructured":"Chien, C., Srivastava, M., Jain, R., Lettieri, P., Aggarwal, V., & Sternowski, R. (1999). Adaptive radio for multimedia wireless links. IEEE Journal on Selected Areas in Communications, 17(5), 793\u2013813.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"5","key":"4008_CR12","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1023\/A:1011422431937","volume":"6","author":"J Ebert","year":"2001","unstructured":"Ebert, J., & Wolisz, A. (2001). Combined tuning of RF power and medium access control for WLANs. Mobile Networks and Applications, 6(5), 417\u2013426.","journal-title":"Mobile Networks and Applications"},{"key":"4008_CR13","doi-asserted-by":"crossref","unstructured":"Lettieri, P., & Srivastava, M. (1998). Adaptive frame length control for improving wireless link throughput, range, and energy efficiency. In IEEE INFOCOM (Vol. 2, pp. 564\u2013571).","DOI":"10.1109\/INFCOM.1998.665076"},{"key":"4008_CR14","volume-title":"Wireless networks and security\u2014Issues, challenges and research trends","author":"J Sen","year":"2013","unstructured":"Sen, J. (2013). Wireless networks and security\u2014Issues, challenges and research trends. Berlin: Springer."},{"key":"4008_CR15","unstructured":"Hu, Y. C., Johnson, D. B. & Perrig, A. (2002). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In Proceedings of the 4th IEEE workshop on mobile computing systems and applications (WMCSA02) (p. 313). Callicoon, NY."},{"key":"4008_CR16","doi-asserted-by":"crossref","unstructured":"Zapata, M. G., & Asokan, N. (2002). Securing ad hoc routing protocols. Proceedings of the 1st ACM workshop on wireless security (WiSe02) (pp. 1\u201310). Atlanta. GA.","DOI":"10.1145\/570681.570682"},{"key":"4008_CR17","doi-asserted-by":"crossref","unstructured":"Hu, Y. C., Perrig, A., & Johnson, D. (2002). Ariadne: A secure on-demand routing protocol for adhoc networks. In Proceedings of ACM annual international conference on mobile computing (MobiCom02) (pp. 21\u201338). Atlanta, GA.","DOI":"10.1145\/570645.570648"},{"key":"4008_CR18","doi-asserted-by":"crossref","unstructured":"Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., & Belding-Royer, E. M. (2002). A secure routing protocol for ad hoc networks. In Proceedings of the 10th IEEE international conference on network protocols (ICNP02) (pp. 78\u201387) Paris.","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"4008_CR19","unstructured":"Papadimitratos, P., & Haas, Z. J. (2002). Secure routing for mobile ad hoc networks. In Proceedings of the SCS communication networks and distributed systems modeling and simulation conference (CNDS02) (pp. 27\u201331). San Antonio, TX."},{"key":"4008_CR20","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., & Hass, Z. J. (2003). Secure link state routing for mobile ad hoc networks. In Proceedings of the symposium on applications and the internet workshops (SAINT03) (pp. 379\u2013383). Washington, DC.","DOI":"10.1109\/SAINTW.2003.1210190"},{"issue":"2","key":"4008_CR21","first-page":"109","volume":"13","author":"C Li","year":"2011","unstructured":"Li, C., Wang, Z., & Yang, C. (2011). Secure routing for wireless mesh networks. International Journal of Network Security, 13(2), 109\u2013120.","journal-title":"International Journal of Network Security"},{"key":"4008_CR22","unstructured":"Just, M., Kranakis, E., & Wan, T. (2003). Resisting malicious packet dropping in wireless ad hoc networks, second international conference proceedings (pp. 8\u201310) Montreal."},{"key":"4008_CR23","unstructured":"Perlman, R. (1998). Network layer protocols with byzantine robustness. Ph.D. thesis, Massachusetts Institute of Technology."},{"issue":"10","key":"4008_CR24","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MCOM.2002.1039859","volume":"40","author":"H Deng","year":"2002","unstructured":"Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40(10), 70\u201375.","journal-title":"IEEE Communications Magazine"},{"key":"4008_CR25","doi-asserted-by":"crossref","unstructured":"Singh, P. K., & Sharma, G. (2012). An efficient prevention of black hole problem in AODV routing protocol in MANET. In IEEE 11th international conference on trust, security and privacy in computing and communications.","DOI":"10.1109\/TrustCom.2012.78"},{"key":"4008_CR26","doi-asserted-by":"crossref","unstructured":"Thachil, F., & Shet. K. C. (2012). A trust based approach for AODV protocol to mitigate black hole attack in MANET. In International conference on computing sciences, Phagwara.","DOI":"10.1109\/ICCS.2012.7"},{"key":"4008_CR27","unstructured":"Saetang, W., & Charoenpanyasak, S. (2012). CAODV free black hole attack in ad hoc networks. In International conference on computer networks and communication system, IPCSIT. Singapore: IACSIT Press."},{"key":"4008_CR28","doi-asserted-by":"crossref","unstructured":"Patcha, A., & Mishra, A. (2003). Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In Radio and wireless conference (pp. 75\u201378).","DOI":"10.1109\/RAWCON.2003.1227896"},{"key":"4008_CR29","doi-asserted-by":"crossref","unstructured":"Xiaopeng, G., & Wei, C. (2007). A novel gray hole attack detection scheme for mobile ad-hoc networks. In IFIP international conference on network and parallel computing workshops (pp. 209\u2013214).","DOI":"10.1109\/NPC.2007.88"},{"key":"4008_CR30","doi-asserted-by":"crossref","unstructured":"Cai, J., Yi, P., Chen, J., Wang, Z., & Liu, N. (2010). An adaptive approach to detecting black and gray hole attacks in ad hoc network. In 24th IEEE international conference on advanced information networking and applications, Perth, Australia.","DOI":"10.1109\/AINA.2010.143"},{"key":"4008_CR31","doi-asserted-by":"publisher","unstructured":"Misra, R., & Mandal, C. R. (2005). Performance comparison of AODV\/DSR on-demand routing protocols for ad hoc networks in constrained situation. In IEEE international conference on personal wireless communications (ICPWC) (pp. 86\u201389). doi:\n                        10.1109\/ICPWC.2005.1431307\n                        \n                    .","DOI":"10.1109\/ICPWC.2005.1431307"},{"key":"4008_CR32","unstructured":"www.nsnam.org\n                        \n                    ."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4008-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4008-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4008-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T05:48:22Z","timestamp":1501480102000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4008-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,3]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["4008"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4008-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2017,2,3]]}}}