{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T00:04:19Z","timestamp":1769299459340,"version":"3.49.0"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602357"],"award-info":[{"award-number":["61602357"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872283"],"award-info":[{"award-number":["61872283"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shaanxi Science and Technology Coordination and Innovation Project","award":["016TZC-G-6-3"],"award-info":[{"award-number":["016TZC-G-6-3"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2018M640962"],"award-info":[{"award-number":["2018M640962"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Program of NSFC-Tongyong Union Foundation","award":["U1636209"],"award-info":[{"award-number":["U1636209"]}]},{"name":"Natural Science Basis Research Plan in Shaanxi Province of China","award":["2016JM6034"],"award-info":[{"award-number":["2016JM6034"]}]},{"name":"China 111 Project","award":["B16037"],"award-info":[{"award-number":["B16037"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2903150","type":"journal-article","created":{"date-parts":[[2019,3,5]],"date-time":"2019-03-05T21:02:04Z","timestamp":1551819724000},"page":"35302-35316","source":"Crossref","is-referenced-by-count":29,"title":["DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5147-8336","authenticated-orcid":false,"given":"Teng","family":"Li","sequence":"first","affiliation":[]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7614-1422","authenticated-orcid":false,"given":"Qingqi","family":"Pei","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2631-9223","authenticated-orcid":false,"given":"Houbing","family":"Song","sequence":"additional","affiliation":[]},{"given":"Yulong","family":"Shen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9116-2694","authenticated-orcid":false,"given":"Cong","family":"Sun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-0370-y"},{"key":"ref38","first-page":"193","article-title":"Secure routing for mobile ad hoc networks","author":"papadimitratos","year":"2002","journal-title":"Commun Netw Distrib Syst Model Simul Conf (CNDS)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00022-X"},{"key":"ref32","first-page":"719","article-title":"Automated bug removal for software-defined networks","author":"wu","year":"2017","journal-title":"Proc NSDI"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23306"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535799"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"ref36","article-title":"The dynamic source routing protocol for mobile ad hoc networks","author":"johnson","year":"2003"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3561"},{"key":"ref34","first-page":"158","article-title":"Routing in ad hoc networks of mobile hosts","author":"johnson","year":"1994","journal-title":"Proc Workshop Mobile Comput Syst Appl"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159935"},{"key":"ref40","first-page":"1","article-title":"SRDPV: Secure route discovery and privacy-preserving verication in MANETs","author":"li","year":"2017","journal-title":"Wireless Networks"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44503-X_20"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23254"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043584"},{"key":"ref14","first-page":"71","article-title":"I know what your packet did last hop: Using packet histories to troubleshoot networks","author":"handigol","year":"2014","journal-title":"Proc USENIX Symp on Networked Syst Design and Implementation"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070577"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626335"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/sec.295"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1109\/TPDS.2013.146","article-title":"A system for denial-of-service attack detection based on multivariate correlation analysis","volume":"25","author":"tan","year":"2014","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref28","year":"2018","journal-title":"IRIS reasoner"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"ref27","year":"2019","journal-title":"Ns-3 Software"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039859"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294279"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989488"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2165-9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.12.029"},{"key":"ref7","first-page":"437","article-title":"Netreview: Detecting when interdomain routing goes wrong","author":"haeberlen","year":"2009","journal-title":"Proc NSDI"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.030713.00201"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320197"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080407"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.09.011"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592785"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2524224.2524233"},{"key":"ref24","first-page":"3","article-title":"The role of accountability in dependable distributed systems","volume":"5","author":"yumerefendi","year":"2005","journal-title":"HotDep"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2004.1347805"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27137-8_33"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807234"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08660389.pdf?arnumber=8660389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T19:40:47Z","timestamp":1628624447000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8660389\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2903150","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}