{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T12:40:03Z","timestamp":1739450403496,"version":"3.37.0"},"reference-count":16,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2009,11,6]]},"DOI":"10.1080\/19393550903324928","type":"journal-article","created":{"date-parts":[[2009,11,25]],"date-time":"2009-11-25T15:53:01Z","timestamp":1259164381000},"page":"248-256","source":"Crossref","is-referenced-by-count":3,"title":["Prevention of Black Hole Attack in Multicast Routing Protocols for Mobile Ad-Hoc Networks Using a Self-Organized Public Key Infrastructure"],"prefix":"10.1080","volume":"18","author":[{"given":"E. A.","family":"Mary Anita","sequence":"first","affiliation":[]},{"given":"V.","family":"Vasudevan","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0008","doi-asserted-by":"crossref","unstructured":"Al-Shurman, M. and Yoo, S. Park. Black hole attack in mobile ad hoc networks. ACM Southeast Regional Conference. Alabama, USA. pp.96\u201397.","DOI":"10.1145\/986537.986560"},{"key":"CIT0007","first-page":"70","volume":"40","author":"Deng H.","year":"2002","journal-title":"IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks"},{"key":"CIT0017","doi-asserted-by":"crossref","unstructured":"Li, R., Li, J., Kameda, H. and Liu, P. Localized public key management for mobile ad hoc networks. IEEE Communications Society. Texas, USA. Vol. 2, pp.1284\u20131289.","DOI":"10.1109\/GLOCOM.2004.1378162"},{"key":"CIT0011","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T. J., Lai, K. and Baker, M. Mitigating routing misbehavior in mobile ad-hoc networks. Proceedings of the Sixth International Conference on Mobile Computing and Networking (MobiCom). Boston, USA. pp.255\u2013265. ISBN 1-58113-197-6, pp.","DOI":"10.1145\/345910.345955"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1109\/SMCSIA.2003.1232402"},{"key":"CIT0003","unstructured":"Papadimitratos, P. and Haas, Z. J. Secure routing for mobile ad hoc networks. Proceedings of Communication Networks and Distributed Systems, Modeling and Simulation Conference (CNDS\u201902). San Antonio, Texas. pp.27\u201331."},{"key":"CIT0012","doi-asserted-by":"crossref","unstructured":"Patcha, A. and Mishra, A. Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. Proceedings of the Radio and Wireless Conference 2003 (RAWCON \u201903). Boston, USA. August, pp.75\u201378.","DOI":"10.1109\/RAWCON.2003.1227896"},{"key":"CIT0006","first-page":"521","volume-title":"IEEE SECON 2005","author":"Roy S.","year":"2005"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.842547"},{"volume-title":"Ad hoc wireless networks\u2014architectures and protocols","year":"2007","author":"Siva Ram Murthy C.","key":"CIT0016"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1195151"},{"key":"CIT0010","unstructured":"Sun, B., Guan, Y., Chen, J. and Pooch, U. Detecting black hole attack in mobile ad hoc networks. Fifth European Personal Mobile Communications Conference (Conf. Publ. No. 492). Glasgow, UK. April, pp.490\u2013495."},{"key":"CIT0014","doi-asserted-by":"crossref","unstructured":"Tsai, Y.R. and Wang, S.J. Vehicular Technology Conference, 2004 VTC 2004-Fall. Routing security and authentication mechanisms for mobile ad hoc networks. September26\u201329, Los Angeles, USA. Vol. 7, pp.4716\u20134720. 2004 IEEE 60th","DOI":"10.1109\/VETECF.2004.1404987"},{"key":"CIT0005","first-page":"94","author":"Vasiliou A.","year":"2005","journal-title":"PWASET"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269716"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393550903324928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T12:10:58Z","timestamp":1739448658000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/19393550903324928"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,6]]},"references-count":16,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2009,11,6]]}},"alternative-id":["10.1080\/19393550903324928"],"URL":"https:\/\/doi.org\/10.1080\/19393550903324928","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"type":"print","value":"1939-3555"},{"type":"electronic","value":"1939-3547"}],"subject":[],"published":{"date-parts":[[2009,11,6]]}}}