{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:26:15Z","timestamp":1730201175540,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006,10]]},"DOI":"10.1109\/broadnets.2006.4374408","type":"proceedings-article","created":{"date-parts":[[2007,11,7]],"date-time":"2007-11-07T19:08:03Z","timestamp":1194462483000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Performance Evaluation of Mobile Ad Hoc Networks In the Presence of Energy-based Selfishness"],"prefix":"10.1109","author":[{"given":"Ehsan","family":"Ataie","sequence":"first","affiliation":[]},{"given":"Ali","family":"Movaghar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"ref11","article-title":"SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks","author":"hu","year":"2002","journal-title":"Fourth IEEE Workshop on Mobile Computing Systems and Applications"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570648"},{"journal-title":"Nuglets A Virtual Currency to Stimulate Cooperation in Selforganized Ad Hoc Networks","year":"2001","author":"buttyan","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570683"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"journal-title":"Coping with Misbehavior in Mobile Ad-hoc Networks","year":"2004","author":"buchegger","key":"ref4"},{"key":"ref3","article-title":"Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks","author":"michiardi","year":"2002","journal-title":"Proceedings of European Wireless Conference"},{"journal-title":"Ad hoc on demand distance vector (AODV) routing Internet Draft","year":"1998","author":"perkins","key":"ref6"},{"key":"ref5","first-page":"153","author":"johnson","year":"1996","journal-title":"Dynamic Source Routing in Ad Hoc Wireless Networks Mobile Computing"},{"journal-title":"The zone routing protocol (ZRP) for ad hoc networks Internet Draft","year":"1998","author":"hass","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190336"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039859"},{"key":"ref1","article-title":"Securing Ad Hoc Networks","volume":"3","author":"zhou","year":"1999","journal-title":"IEEE Network Magazine"},{"key":"ref9","article-title":"Secure Routing for Mobile Ad Hoc Networks","author":"papadimitratos","year":"2002","journal-title":"Proceedings of CNDS"}],"event":{"name":"2006 3rd International Conference on Broadband Communications, Networks and Systems","start":{"date-parts":[[2006,10,1]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2006,10,5]]}},"container-title":["2006 3rd International Conference on Broadband Communications, Networks and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4374295\/4374296\/04374408.pdf?arnumber=4374408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T16:44:32Z","timestamp":1489682672000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4374408\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/broadnets.2006.4374408","relation":{},"subject":[],"published":{"date-parts":[[2006,10]]}}}