{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:29:08Z","timestamp":1730280548070,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/lcn.2012.6423612","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T21:27:47Z","timestamp":1360358867000},"page":"216-219","source":"Crossref","is-referenced-by-count":7,"title":["LT-OLSR: Attack-tolerant OLSR against link spoofing"],"prefix":"10.1109","author":[{"given":"Yuseok","family":"Jeon","sequence":"first","affiliation":[]},{"given":"Tae-Hyung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Yuna","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jong","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498557"},{"key":"11","first-page":"255","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"Proceedings of MobicCom 2000"},{"year":"0","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550347"},{"key":"2","first-page":"1464","article-title":"Sa-olsr: Security aware optimized link state routing for mobile ad hoc networks","author":"bounpadith","year":"2008","journal-title":"Proceedings of ICC 2008"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3626"},{"key":"10","article-title":"Attacks against olsr: Distributed key management for security","author":"adjih","year":"2005","journal-title":"Proceedings of Workshop on 2nd OLSR Interop and Workshop"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1364173"},{"key":"6","article-title":"Securing OLSR using node location","author":"raffo","year":"2005","journal-title":"Proc of EWSN 2005"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12214-9_72"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029106"},{"journal-title":"Security Schemes for the OLSR Protocol for Ad Hoc Networks","year":"2005","author":"raffo","key":"9"},{"key":"8","first-page":"330","article-title":"A specification-based intrusion detection model for olsr","volume":"3858","author":"tseng","year":"2006","journal-title":"Proceedings of RAID 2005"}],"event":{"name":"2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)","start":{"date-parts":[[2012,10,22]]},"location":"Clearwater Beach, FL, USA","end":{"date-parts":[[2012,10,25]]}},"container-title":["37th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6413535\/6423567\/06423612.pdf?arnumber=6423612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:24:02Z","timestamp":1490142242000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6423612\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/lcn.2012.6423612","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}