{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:10:13Z","timestamp":1761621013295,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/wts.2009.5068989","type":"proceedings-article","created":{"date-parts":[[2009,6,10]],"date-time":"2009-06-10T18:23:18Z","timestamp":1244658198000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Improving SAODV protocol with trust levels management, IDM and incentive cooperation in MANET"],"prefix":"10.1109","author":[{"given":"F.","family":"De Rango","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A Security-Aware Routing Protocol for Wireless Ad Hoc Networks","author":"kravets","year":"2001","journal-title":"ACM Symp on Mobile Ad Hoc Networking and Computing"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.83"},{"journal-title":"Ucb\/lbnl\/vint Network Simulator-ns(version2)","year":"0","author":"fall","key":"ref14"},{"year":"0","key":"ref15"},{"key":"ref16","first-page":"28","article-title":"A Survey of Secure Wireless Ad hoc Routing","author":"perrig","year":"2004","journal-title":"IEEE Security & Privacy"},{"key":"ref17","article-title":"Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks","volume":"24","author":"sun","year":"2006","journal-title":"IEEE ISAC special issue on security in wireless ad hoc networks"},{"key":"ref4","first-page":"170","article-title":"A Survey on Intrusion Detection in Mobile Ad Hoc Networks","author":"anantvalee","year":"2006","journal-title":"WIRELESS MOBILE NETWORK SECURITY"},{"key":"ref3","article-title":"Secure Ad hoc On-Demand Distance Vector (SAODV) Routing","author":"guerrero zapata","year":"2006","journal-title":"INTERNET-DRAFT draft-guerrero-manet-saodv-06"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.16"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916651"},{"key":"ref8","article-title":"SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks","author":"hu","year":"2002","journal-title":"4th IEEE Workshop on Mobile Computing Systems and Applications"},{"key":"ref7","article-title":"Secure Routing for Mobile Ad hoc Networks","author":"papadimitratos","year":"2002","journal-title":"Proceedings of SCS Communications Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002)"},{"key":"ref2","article-title":"A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks","author":"wu","year":"2006","journal-title":"WIRELESS MOBILE NETWORK SECURITY"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/98.760423"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570648"}],"event":{"name":"2009 Wireless Telecommunications Symposium","start":{"date-parts":[[2009,4,22]]},"location":"Prague","end":{"date-parts":[[2009,4,24]]}},"container-title":["2009 Wireless Telecommunications Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4977245\/5068929\/05068989.pdf?arnumber=5068989","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T17:12:20Z","timestamp":1489770740000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5068989\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/wts.2009.5068989","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}