{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T19:45:47Z","timestamp":1694029547994},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,5,28]],"date-time":"2013-05-28T00:00:00Z","timestamp":1369699200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1007\/s12083-013-0215-5","type":"journal-article","created":{"date-parts":[[2013,5,27]],"date-time":"2013-05-27T08:02:10Z","timestamp":1369641730000},"page":"684-693","source":"Crossref","is-referenced-by-count":3,"title":["An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks"],"prefix":"10.1007","volume":"8","author":[{"given":"Gunhee","family":"Lee","sequence":"first","affiliation":[]},{"given":"Wonil","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Kangseok","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Sangyoon","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Dong-kyoo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,28]]},"reference":[{"issue":"1","key":"215_CR1","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MWC.2004.1269716","volume":"11","author":"H Yang","year":"2004","unstructured":"Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel Commun 11(1):38\u201347","journal-title":"IEEE Wirel Commun"},{"issue":"4","key":"215_CR2","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1109\/TNET.2007.904002","volume":"16","author":"I Aad","year":"2008","unstructured":"Aad I, Hubaux JP, Knightly E.W. (2008) Impact of denial of service attacks on ad hoc networks. IEEE Trans Netw 16(4):791\u2013802","journal-title":"IEEE Trans Netw"},{"issue":"1","key":"215_CR3","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L Zhou","year":"1999","unstructured":"Zhou L, Haas ZJ (1999) Securing ad hoc networks. IEEE Netw 13(1):24\u201330","journal-title":"IEEE Netw"},{"key":"215_CR4","unstructured":"Marti S, Giuli T, Lai K, Baker M (2008) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings the 6th annual international conf. on mobile computing and networking, pp. 255\u2013265, Boston"},{"issue":"4","key":"215_CR5","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2005.1593277","volume":"7","author":"D Djenouri","year":"2005","unstructured":"Djenouri D, Khalladi L, Badache N (2005) A survey of security issues in mobile ad hoc and sensor networks. IEEE Commun Surv Tutor 7(4):2\u201328","journal-title":"IEEE Commun Surv Tutor"},{"key":"215_CR6","doi-asserted-by":"crossref","unstructured":"Yang H, Meng X, Lu S (2002) Self-organized network layer security in mobile ad hoc networks. In: Proceedings of acm workshop on wireless security, pp. 11\u201320, Atlanta","DOI":"10.1145\/570681.570683"},{"key":"215_CR7","doi-asserted-by":"crossref","unstructured":"Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of communication and multimedia security, pp 107\u2013121","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"215_CR8","doi-asserted-by":"crossref","unstructured":"Djenouri D, Badache N (2005) New approach for selfish nodes detection in mobile ad hoc networks. In: Proceedings of International Conference on Security and Privacy for Emerging Areas in Communication Networks, pp. 288\u2013294","DOI":"10.1109\/SECCMW.2005.1588323"},{"key":"215_CR9","unstructured":"Duque OG, Hadjiantonis A, Pavlou G, Howarth M (2009) Adaptable misbehaviour detection and isolation in wireless ad hoc networks using policies. In: Proceedings of international conference on security and privacy for emerging areas in communication networks, pp 288\u2013294"},{"key":"215_CR10","doi-asserted-by":"crossref","unstructured":"Bradley KA, Cheung S, Puketza N, Mukherjee B, Olsson RA (1998) Detecting disruptive routers: a distributed network monitoring approach. In: Proceedings of symposium on security and privacy, pp 115\u2013124","DOI":"10.1109\/SECPRI.1998.674828"},{"key":"215_CR11","doi-asserted-by":"crossref","unstructured":"Boutaba R, Aib I (2007) Policy-based management: a historical perspective. J Netw Syst Manag 15(4)","DOI":"10.1007\/s10922-007-9083-8"},{"key":"215_CR12","doi-asserted-by":"crossref","unstructured":"Hadjiantonis AM, Malatras A, Pavlou G (2006) A context-aware, policy-based framework for the management of MANETs. In: Proceedings of 7th IEEE international workshop on policies for distributed systems and networks, pp 23\u201332","DOI":"10.1109\/POLICY.2006.3"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-013-0215-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-013-0215-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-013-0215-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T23:44:50Z","timestamp":1559432690000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-013-0215-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,28]]},"references-count":12,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,7]]}},"alternative-id":["215"],"URL":"https:\/\/doi.org\/10.1007\/s12083-013-0215-5","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,28]]}}}