{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:35:15Z","timestamp":1750307715097,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,16]],"date-time":"2009-03-16T00:00:00Z","timestamp":1237161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,16]]},"DOI":"10.1145\/1514274.1514288","type":"proceedings-article","created":{"date-parts":[[2009,3,17]],"date-time":"2009-03-17T15:36:08Z","timestamp":1237304168000},"page":"87-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["An attacker model for MANET routing security"],"prefix":"10.1145","author":[{"given":"Jared","family":"Cordasco","sequence":"first","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ, USA"}]},{"given":"Susanne","family":"Wetzel","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.170"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1610547"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570684"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029119"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11495628_4"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00019-2"},{"key":"e_1_3_2_1_10_1","first-page":"1976","article-title":"Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks. INFOCOM 2003","volume":"3","author":"Hu Y.","year":"2003","unstructured":"Y. Hu , A. Perrig , and D. Johnson . Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks. INFOCOM 2003 . Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE , 3 : 1976 -- 1986 , 2003 . Y. Hu, A. Perrig, and D. Johnson. Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks. INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE, 3: 1976--1986, 2003.","journal-title":"IEEE"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570648"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2003.1285396"},{"key":"e_1_3_2_1_13_1","volume-title":"Mobile Computing","author":"Johnson D. B.","year":"1996","unstructured":"D. B. Johnson and D. A. Maltz . Dynamic Source Routing in Ad Hoc Wireless Networks . In Mobile Computing , volume 353 . Kluwer Academic Publishers , 1996 . D. B. Johnson and D. A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing, volume 353. Kluwer Academic Publishers, 1996."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS)","author":"Papadimitratos P.","year":"2002","unstructured":"P. Papadimitratos and Z. Haas . Secure Routing for Mobile Ad Hoc Networks . In Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS) , 2002 . P. Papadimitratos and Z. Haas. Secure Routing for Mobile Ad Hoc Networks. In Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), 2002."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190336"},{"key":"e_1_3_2_1_18_1","volume-title":"Ad-Hoc On-Demand Distance Vector Routing. In MILCOM '97 Panel on Ad Hoc Networks","author":"Perkins C.","year":"1997","unstructured":"C. Perkins and E. Royer . Ad-Hoc On-Demand Distance Vector Routing. In MILCOM '97 Panel on Ad Hoc Networks , 1997 . C. Perkins and E. Royer. Ad-Hoc On-Demand Distance Vector Routing. In MILCOM '97 Panel on Ad Hoc Networks, 1997."},{"volume-title":"Cryptobytes","author":"Perrig A.","key":"e_1_3_2_1_19_1","unstructured":"A. Perrig , R. Canetti , D. Tygar , and D. Song . The TESLA Broadcast Authentication Protocol . In Cryptobytes , Volume 5 , No. 2, pages 2--13. RSA Laboratories, 2002. A. Perrig, R. Canetti, D. Tygar, and D. Song. The TESLA Broadcast Authentication Protocol. In Cryptobytes, Volume 5, No. 2, pages 2--13. RSA Laboratories, 2002."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2004.1437797"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570682"}],"event":{"name":"WISEC '09: Second ACM Conference on Wireless Network Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Zurich Switzerland","acronym":"WISEC '09"},"container-title":["Proceedings of the second ACM conference on Wireless network security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1514274.1514288","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1514274.1514288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:30:19Z","timestamp":1750253419000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1514274.1514288"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,16]]},"references-count":21,"alternative-id":["10.1145\/1514274.1514288","10.1145\/1514274"],"URL":"https:\/\/doi.org\/10.1145\/1514274.1514288","relation":{},"subject":[],"published":{"date-parts":[[2009,3,16]]},"assertion":[{"value":"2009-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}