{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:05:15Z","timestamp":1763967915843},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/sahcn.2005.1557104","type":"proceedings-article","created":{"date-parts":[[2005,12,13]],"date-time":"2005-12-13T15:55:52Z","timestamp":1134489352000},"page":"521-532","source":"Crossref","is-referenced-by-count":28,"title":["Securing MAODV: attacks and countermeasures"],"prefix":"10.1109","author":[{"given":"S.","family":"Roy","sequence":"first","affiliation":[]},{"given":"V.G.","family":"Addada","sequence":"additional","affiliation":[]},{"given":"S.","family":"Setia","sequence":"additional","affiliation":[]},{"given":"S.","family":"Jajodia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.1266296"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"17","article-title":"Robust membership management for ad-hoc groups","author":"ma?ki","year":"2000","journal-title":"Proc 5th Nordic Workshop on Secure IT Systems (NORDSEC 2000)"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2004.1331709"},{"key":"18","first-page":"255","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"Mobile Computing and Networking"},{"key":"33","article-title":"Secure ad hoc on-demand distance vector (saodv) routing","author":"zapata","year":"2001","journal-title":"Mobile Ad Hoc Networking Working Group Internet Draft"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1023\/A:1019135923695","article-title":"On-demand multicast routing protocol in multihop wireless mobile networks","author":"lee","year":"2000","journal-title":"ACM\/Baltzer Mobile Networks and Applications Special Issue on Multipoint Communication in Wireless Mobile Networks"},{"key":"34","first-page":"275","article-title":"Intrusion detection in wireless ad-hoc networks","author":"yongguang","year":"2000","journal-title":"MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.1999.767952"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986872"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194909"},{"journal-title":"MAODV Implementation for NS-2 26","year":"2004","author":"zhu","key":"37"},{"key":"11","first-page":"1192","article-title":"Differential destination multicast - A manet multicast routing protocol for small groups","author":"ji","year":"2001","journal-title":"Proceedings of INFOCOM"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/SAINTW.2003.1210190"},{"key":"20","first-page":"60","article-title":"How to misuse aodv: A case study of insider attacks against mobile adhoc routing protocols","author":"peng","year":"2003","journal-title":"Proceedings of the 4th Annual IEEE Information Assurance Workshop"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749281"},{"key":"23","first-page":"35","article-title":"Efficient and secure source authentication for multicast","author":"perrig","year":"2001","journal-title":"the Symposium on Network and Distributed System Security NDSS-95"},{"journal-title":"Wireless Communications Principles and Practice","year":"1996","author":"rappaport","key":"24"},{"key":"25","article-title":"Multicast ad hoc on demand distance vector (maodv) routing","author":"royer","year":"2000","journal-title":"IETF Internet Draft"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313538"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.842547"},{"journal-title":"Network Security Essentials Applications and Standards","year":"1999","author":"stallings","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1023\/A:1020781305639"},{"key":"2","article-title":"Amroute: Adhoc multicast routing protocol","author":"bommaiah","year":"1998","journal-title":"Internet draft"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/501416.501437"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/501416.501438"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.6"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00019-2"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00017-9"},{"key":"32","article-title":"Security-aware ad hoc routing for wireless networks","author":"seung","year":"2001","journal-title":"Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2003.1174178"},{"key":"31","article-title":"Ad hoc multicast routing protocol utilizing increasing id-numbers (amris) functional specification","author":"wu","year":"1998","journal-title":"Internet draft"},{"journal-title":"IEEE 802 11 Wireless LAN Medium Access Control and Physical Layer Specifications","year":"1997","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4744-y"}],"event":{"name":"2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005.","location":"Santa Clara, CA, USA"},"container-title":["2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10405\/33064\/01557104.pdf?arnumber=1557104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T21:41:48Z","timestamp":1497649308000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1557104\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/sahcn.2005.1557104","relation":{},"subject":[]}}