{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T14:06:52Z","timestamp":1773324412989,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iscn.2006.1662504","type":"proceedings-article","created":{"date-parts":[[2006,8,3]],"date-time":"2006-08-03T00:10:31Z","timestamp":1154563831000},"page":"1-6","source":"Crossref","is-referenced-by-count":20,"title":["Analysis of the Node Isolation Attack Against OLSR-based Mobile Ad Hoc Networks"],"prefix":"10.1109","author":[{"given":"B.","family":"Kannhavong","sequence":"first","affiliation":[]},{"given":"H.","family":"Nakayama","sequence":"additional","affiliation":[]},{"family":"Nei Kato","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Nemoto","sequence":"additional","affiliation":[]},{"given":"A.","family":"Jamalipour","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/941315.941317"},{"key":"17","article-title":"Attacks Against OLSR: Distributed Key Management for Security","author":"adjih","year":"2005","journal-title":"2nd OLSR Interop\/ Workshop"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SMCSIA.2003.1232402"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2004.1311268"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029106"},{"key":"13","article-title":"Securing ad hoc networks","author":"zhou","year":"1999","journal-title":"IEEE Networks Special Issue on Network Security"},{"key":"14","article-title":"Securing the OLSR protocol","author":"adjih","year":"2003","journal-title":"Proceedings of Med-Hoc-Net Mahdia"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SAINTW.2003.1210190"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1195151"},{"key":"21","article-title":"On Vulnerability and protection of ad hoc on-demand distance vector protocol","author":"wang","year":"2003","journal-title":"International Conference on Telecommunication"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"22","article-title":"A New Routing Attack in Mobile Ad Hoc Networks","volume":"11","author":"yi","year":"2005","journal-title":"International Journal of Information Technology"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424844"},{"key":"24","article-title":"Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method","author":"kurosawa","year":"2006","journal-title":"proceeding of International Journal of Network Security"},{"key":"25","article-title":"A New Set of Passive Routing Attacks in Mobile Ad Hoc Networks","author":"hong","year":"2003","journal-title":"Proc IEEE Military Comm Conf (MILCOM '03)"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.115"},{"key":"27","article-title":"The Network Simulator - ns-2","year":"0"},{"key":"28","year":"0"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1233531"},{"key":"3","author":"johnson","year":"2003","journal-title":"The dynamic source routing protocol for mobile ad hoc networks (DSR)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3561"},{"key":"10","year":"0"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2501"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570648"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"5","author":"ogier","year":"2003","journal-title":"Topology dissemination based on reverse-path forwarding (TBRPF)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3626"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570682"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/581291.581312"}],"event":{"name":"2006 International Symposium on Computer Networks","location":"Istanbul, Turkey"},"container-title":["2006 International Symposium on Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/11037\/34796\/01662504.pdf?arnumber=1662504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T17:04:11Z","timestamp":1489597451000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1662504\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/iscn.2006.1662504","relation":{},"subject":[]}}