{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T23:50:11Z","timestamp":1759362611225},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,8]]},"DOI":"10.1109\/ccwc60891.2024.10427928","type":"proceedings-article","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T18:35:29Z","timestamp":1707849329000},"page":"0583-0588","source":"Crossref","is-referenced-by-count":3,"title":["Defending Against Wormhole Attacks in Wireless Networks Using the Twofish Algorithm: A Performance Analysis"],"prefix":"10.1109","author":[{"given":"Pramod Singh","family":"Rathore","sequence":"first","affiliation":[{"name":"University of Engineering and Management,Jaipur"}]},{"given":"Mrinal Kanti","family":"Sarkar","sequence":"additional","affiliation":[{"name":"University of Engineering and Management,Department of Computer Science &amp; Engineering,Jaipur"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.050112.111222"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/1099\/1\/012044"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2517-1_65"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2865909"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.031612.00124"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/2081902"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2422736"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07092-w"},{"article-title":"LTC: A Location Based Cluster Head Selection Scheme in Wireless Sensor Network","volume-title":"2018 IEEE 12th INDIACom International Conference on Computing for Sustainable Global Development","author":"Sarkar","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1544-2_18"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2015.11.001"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/B978-0-12-805367-6.00002-8","article-title":"Chapter 2 - Literature Review","volume-title":"A Study of Black Hole Attack Solutions","author":"Fazeldehkordi","year":"2016"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s18082591"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2628413"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922971"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2752801"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCA.2012.6179178"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2017.0030"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2570740"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2009.5373756"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894637"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1117\/12.2557080"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/a13030072"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.062612.00084"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03593-4"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2020.05.003"}],"event":{"name":"2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)","start":{"date-parts":[[2024,1,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2024,1,10]]}},"container-title":["2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10426790\/10427556\/10427928.pdf?arnumber=10427928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T09:44:54Z","timestamp":1709459094000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10427928\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,8]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ccwc60891.2024.10427928","relation":{},"subject":[],"published":{"date-parts":[[2024,1,8]]}}}