{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:55:39Z","timestamp":1729637739440,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icc.2014.6883375","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T14:10:33Z","timestamp":1409753433000},"page":"544-549","source":"Crossref","is-referenced-by-count":3,"title":["Performance estimation of AODV variant with trust mechanism"],"prefix":"10.1109","author":[{"given":"Ruki","family":"Harwahyu","sequence":"first","affiliation":[]},{"given":"Harris","family":"Simaremare","sequence":"additional","affiliation":[]},{"given":"Riri Fitri","family":"Sari","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Lorenz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"Ad-hoc on demand distance vector (AODV) routing","volume":"3561","author":"perkin","year":"2002","journal-title":"Internet Draft IETF - RFC"},{"key":"16","article-title":"Performance evaluation of AODV variants on DDOS, blackhole and malicious attacks","volume":"11","author":"simaremare","year":"2011","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"13","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/978-3-642-36169-2_3","article-title":"Secure AODV routing protocol based on trust mechanism","author":"simaremare","year":"2013","journal-title":"Wireless Networks and Security Issues Challenges and Research Trends"},{"key":"14","article-title":"Inherent robustness of reactive routing protocols against selfish attacks","author":"pirzada","year":"2005","journal-title":"Proc Int Wireless Ad Hoc Networks Workshop"},{"key":"11","first-page":"54","article-title":"A novel security agent scheme for aodv routing protocol based on thread state transition","volume":"5","author":"hongsong","year":"2006","journal-title":"Asian Journal of Information Technology"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570682"},{"key":"3","article-title":"Detection and removal of co-operative blackhole and grayhole attacks in MANETs","author":"singh bindra","year":"2012","journal-title":"Proceeding of International Conference on System Engineering and Technology"},{"key":"2","first-page":"651","article-title":"Performance analysis of secure routing protocols in MANET","volume":"1","author":"thamizhmaran","year":"2012","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"1","doi-asserted-by":"crossref","first-page":"110","DOI":"10.24138\/jcomss.v8i4.165","article-title":"AODV-UI with malicious node detection and removal for public MANET","volume":"8","author":"ruki","year":"2012","journal-title":"Journal of Communications Software & Systems"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4473093"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2010.V2.129"},{"key":"6","first-page":"40","article-title":"Methods for resisting dos attacks in mobile ad hoc networks","author":"begum","year":"2012","journal-title":"Proceedings of International Conference on Networks and Cyber Security"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1007\/s11276-006-6056-x","article-title":"A survey on attacks and countermeasures in mobile ad hoc networks","author":"chen","year":"2006","journal-title":"Wireless\/Mobile Network Security"},{"key":"4","article-title":"Security architecture for systems providing end-to-end communications","author":"zeltsan","year":"2003","journal-title":"ITU-T Recommendation X 805"},{"key":"9","first-page":"338","article-title":"Detecting blackhole attack on aodv-based mobile ad hoc networks by dynamic learning method","volume":"3","author":"kurosawa","year":"2007","journal-title":"IJ Network Security"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/VTC.2001.957123"}],"event":{"name":"ICC 2014 - 2014 IEEE International Conference on Communications","start":{"date-parts":[[2014,6,10]]},"location":"Sydney, NSW","end":{"date-parts":[[2014,6,14]]}},"container-title":["2014 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878057\/6883277\/06883375.pdf?arnumber=6883375","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T16:42:10Z","timestamp":1565800930000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6883375\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icc.2014.6883375","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}