{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T13:19:18Z","timestamp":1754486358839},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/lcn.2012.6423584","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T21:27:47Z","timestamp":1360358867000},"page":"102-110","source":"Crossref","is-referenced-by-count":2,"title":["Applicability of crypto-based security approaches in tactical wireless multi-hop networks"],"prefix":"10.1109","author":[{"given":"Nils","family":"Aschenbruck","sequence":"first","affiliation":[]},{"given":"Elmar","family":"Gerhards-Padilla","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Lambertz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00019-2"},{"journal-title":"Standards for Efficient Cryptography Group","year":"2011","key":"35"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1109\/AINA.2005.305","article-title":"Secure olsr","author":"hong","year":"2005","journal-title":"Proc 19th Int Conf Advanced Information Networking and Applications"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2008.4554274"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4744-y"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.3390\/fi3010031"},{"key":"15","article-title":"Wormhole detection using topology graph based anomaly detection","author":"gerhards-padilla","year":"2011","journal-title":"Proc of the 6th Workshop on Wireless and Mobile Ad-Hoc Networks"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.29"},{"key":"39","article-title":"Secure ad hoc on-demand distance vector (saodv) routing","author":"zapata","year":"2006","journal-title":"Internet Engineering Task Force Draft"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1002\/sec.185"},{"key":"14","article-title":"TOgbad-lq-using challenge-response to detect fake link qualities","author":"gerhards-padilla","year":"2011","journal-title":"Proc of the 17th Conference on Communication in Distributed Systems"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/NPSEC.2005.1532054"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/BROADNETS.2004.77"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1002\/ett.1061"},{"key":"12","article-title":"INsens: Intrusion-tolerant routing in wireless sensor networks","author":"deng","year":"2002","journal-title":"Department of Computer Science University of Colorado"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.58"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/501416.501437"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570682"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77871-4_14"},{"key":"23","article-title":"Launching a sinkhole attack in wireless sensor networks; The intruder side","author":"krontiris","year":"2008","journal-title":"Proceedings of IEEE International Conference on Wireless and Mobile Computing Networking and Communication (WIMOB)"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1138127.1138130"},{"key":"25","article-title":"On the intruder detection for sinkhole attack in wireless sensor networks","author":"ngai","year":"2006","journal-title":"Proceedings of IEEE International Conference on Communications (ICC)"},{"year":"0","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/SAINTW.2003.1210190"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73821-5_6"},{"key":"29","article-title":"Combining certification-based authentication and intrusion detection to secure manet routing protocols","author":"puttini","year":"2004","journal-title":"Proceedings of the 5th European Wireless Conference (Mobile and Wireless Systems beyond"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2070942.2070977"},{"key":"2","article-title":"Demo abstract: A mesh-based command and control sensing system for public safety scenarios","author":"aschenbruck","year":"2011","journal-title":"Proc of the 1st ACM International Conference on Embedded Networked Sensor Systems"},{"year":"0","key":"10"},{"journal-title":"Public Key Cryptography for the Financial Services Industry the Elliptic Curve Digital Signature Algorithm (ECDSA) ANSI X9 62","year":"1998","key":"1"},{"journal-title":"Security Schemes for the OLSR Protocol for Ad Hoc Networks","year":"2005","author":"raffo","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6130"},{"journal-title":"Standards for Efficient Cryptography (Version 1 0) Standards for Efficient Cryptography Group","article-title":"SEc 2: Recommended elliptic curve domain parameters","year":"2000","key":"6"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/PORTABLE.2007.47"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2011.6115561"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029106"},{"key":"4","article-title":"Secure multi-hop infrastructure access","author":"awerbuch","year":"2005","journal-title":"Proceedings of the Symposium on Network and Distributed Systems Security (NDSS"},{"year":"0","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3626"}],"event":{"name":"2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)","start":{"date-parts":[[2012,10,22]]},"location":"Clearwater Beach, FL, USA","end":{"date-parts":[[2012,10,25]]}},"container-title":["37th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6413535\/6423567\/06423584.pdf?arnumber=6423584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T13:07:47Z","timestamp":1562677667000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6423584\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/lcn.2012.6423584","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}