{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:56:02Z","timestamp":1772063762707,"version":"3.50.1"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/ic3.2013.6612195","type":"proceedings-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T14:38:09Z","timestamp":1380638289000},"page":"225-231","source":"Crossref","is-referenced-by-count":5,"title":["Trust based Ad-hoc on Demand Routing protocol for MANET"],"prefix":"10.1109","author":[{"given":"Naveen Kumar","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Kavita","family":"Pandey","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190336"},{"key":"11","year":"0"},{"key":"12","article-title":"DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks","author":"johnson","year":"1994","journal-title":"Computer Science Department"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.092110.00088"},{"key":"2","article-title":"CAODV: Free blackhole attack in ad hoc networks","volume":"35","author":"watchara","year":"2012","journal-title":"International Conference on Computer Networks and Communication Systems IPCSIT"},{"key":"1","author":"eissa","year":"2011","journal-title":"Trust-Based Routing Mechanism in MANET Design and Implementation"},{"key":"10","article-title":"Different types of attacks on integrated manet-internet communication","volume":"4","author":"kumar rai","year":"2005","journal-title":"International Journal of Computer Science and Security (IJCSS)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749281"},{"key":"6","article-title":"Attack against mobile ad hoc networks routing protocols","author":"razak","year":"2009","journal-title":"Network Research Group University of Plymouth"},{"key":"5","article-title":"Secure ad hoc on-demand distance vector routing","volume":"6","author":"guerrero zapata","year":"2006","journal-title":"Mobile Computing and Communications Review"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICFCN.2012.6206854"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/986537.986558"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1854099.1854117"}],"event":{"name":"2013 Sixth International Conference on Contemporary Computing (IC3)","location":"Noida, India","start":{"date-parts":[[2013,8,8]]},"end":{"date-parts":[[2013,8,10]]}},"container-title":["2013 Sixth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6595807\/6612154\/06612195.pdf?arnumber=6612195","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T13:49:44Z","timestamp":1490190584000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6612195\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ic3.2013.6612195","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}