{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T13:20:21Z","timestamp":1725715221020},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/ic3.2013.6612197","type":"proceedings-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T18:38:09Z","timestamp":1380652689000},"page":"239-243","source":"Crossref","is-referenced-by-count":14,"title":["MAODV: Modified wormhole detection AODV protocol"],"prefix":"10.1109","author":[{"given":"Umesh Kumar","family":"Chaurasia","sequence":"first","affiliation":[]},{"given":"Varsha","family":"Singh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Mobile Ad Hoc Networking (MANET):Routing protocol performance and evaluation considerations","author":"corson","year":"1999","journal-title":"RFC2501"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345958"},{"key":"10","first-page":"173","author":"perkins","year":"2000","journal-title":"The Ad hoc On-Demand Distance Vector Protocol"},{"key":"1","first-page":"28","article-title":"A survey of secure wireless Ad Hoc routing","author":"hu","year":"2004","journal-title":"IEEE Security & Privacy"},{"key":"7","first-page":"6","article-title":"DELPHI: Wormhole detection mechanism for ad hoc wireless networks","author":"chiu","year":"2006","journal-title":"1st International Symposium on Wireless Pervasive Computing"},{"key":"6","first-page":"39","article-title":"An end-to-end detection of wormhole attack in wireless ad-hoc networks","author":"wang","year":"2007","journal-title":"The Proceedings of the 31st Annual International Computer Software and Applications Conference"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.09.005"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2005.471"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.58"},{"key":"11","first-page":"220","article-title":"An approach to mitigate wormhole attack in wireless ad hoc networks","author":"lee d kim","year":"2008","journal-title":"Proceedings of the International Conference on Information Security and Assurance"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2011.5893822"}],"event":{"name":"2013 Sixth International Conference on Contemporary Computing (IC3)","start":{"date-parts":[[2013,8,8]]},"location":"Noida, India","end":{"date-parts":[[2013,8,10]]}},"container-title":["2013 Sixth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6595807\/6612154\/06612197.pdf?arnumber=6612197","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T17:46:28Z","timestamp":1490204788000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6612197\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ic3.2013.6612197","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}