{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T13:49:48Z","timestamp":1773323388623,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/itnac46935.2019.9077977","type":"proceedings-article","created":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T20:49:26Z","timestamp":1588020566000},"page":"1-6","source":"Crossref","is-referenced-by-count":27,"title":["Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks"],"prefix":"10.1109","author":[{"given":"James Jin","family":"Kang","sequence":"first","affiliation":[{"name":"Edith Cowan University,Joondalup,WA,Australia,6027"}]},{"given":"Kiran","family":"Fahd","sequence":"additional","affiliation":[{"name":"Melbourne Polytechnic,Preston Victoria,Australia,3072"}]},{"given":"Sitalakshmi","family":"Venkatraman","sequence":"additional","affiliation":[{"name":"Melbourne Polytechnic,Preston Victoria,Australia,3072"}]},{"given":"Rolando","family":"Trujillo-Rasua","sequence":"additional","affiliation":[{"name":"Centre for Cyber Security Research and Innovation, School of Information Technology, Deakin University,Geelong,Australia"}]},{"given":"Paul","family":"Haskell-Dowland","sequence":"additional","affiliation":[{"name":"Edith Cowan University,Joondalup,WA,Australia,6027"}]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1728303"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2875475.2875476"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00142-2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039866"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/TNET.2011.2134866","article-title":"Link-State Routing With Hop-by-Hop Forwarding Can Achieve Optimal Traffic Engineering","volume":"19","author":"xu","year":"2011","journal-title":"IEEE\/ ACM Transactions on Networking"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.828949"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2015.73"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218434"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2582748"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2016.000079"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2614247"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2392760"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.845549"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_8"},{"key":"ref4","first-page":"171","article-title":"A novel routing protocol providing good transmission reliability in underwater sensor networks","volume":"16","author":"shen","year":"2015","journal-title":"Journal of Internet Technology"},{"key":"ref27","year":"2017","journal-title":"Network Time Security for the Network Time Protocol (draft)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-005-1769-9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.03.133"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2307\/2531595"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2570740"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2374071"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1785-9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.74.016101"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.06.091"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19210-9_5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-8311-3_29"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.066"},{"key":"ref21","author":"kang","year":"2017","journal-title":"An inference system framework for personal sensor devices in mobile health and internet of things networks"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/396\/1\/012027"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography2040038"},{"key":"ref26","article-title":"A New Security Mechanism for the Network Time Protocol","author":"o'donoghue","year":"2017","journal-title":"IETF Journal Internet Security"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2017.12.005"}],"event":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","location":"Auckland, New Zealand","start":{"date-parts":[[2019,11,27]]},"end":{"date-parts":[[2019,11,29]]}},"container-title":["2019 29th International Telecommunication Networks and Applications Conference (ITNAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9068186\/9077926\/09077977.pdf?arnumber=9077977","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T19:27:54Z","timestamp":1756754874000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9077977\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/itnac46935.2019.9077977","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}