{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:29Z","timestamp":1750306769883,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,10,7]],"date-time":"2013-10-07T00:00:00Z","timestamp":1381104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,10,7]]},"DOI":"10.1145\/2513456.2513497","type":"proceedings-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T18:09:20Z","timestamp":1380650960000},"page":"305-311","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["The failure of watchdog schemes in MANET security"],"prefix":"10.1145","author":[{"given":"E. O.","family":"Ochola","sequence":"first","affiliation":[{"name":"University of South Africa, Pretoria, South Africa"}]},{"given":"M. M.","family":"Eloff","sequence":"additional","affiliation":[{"name":"University of South Africa, Pretoria, South Africa"}]},{"given":"J. A.","family":"van der Poll","sequence":"additional","affiliation":[{"name":"University of South Africa, Midrand, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2013,10,7]]},"reference":[{"volume-title":"New Jersey: Wiley - Interscience","year":"2004","author":"Basagni S.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","first-page":"113","volume-title":"International Network Conference (INC 2012","author":"Ochola E. O.","year":"2012"},{"volume-title":"Prentice Hall","year":"2004","author":"Siva Ram Murthy C.","key":"e_1_3_2_1_3_1"},{"volume-title":"Proceedings of the Southern African Telecommunication Networks and Application Conference (SATNAC 2007)","year":"2007","author":"Ochola E. O.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"A. Mishra Security and Quality of Service in Ad Hoc Wireless Networks Cambridge University Press 2008.   A. Mishra Security and Quality of Service in Ad Hoc Wireless Networks Cambridge University Press 2008.","DOI":"10.1017\/CBO9780511619755"},{"issue":"2","key":"e_1_3_2_1_6_1","first-page":"359","article-title":"A Survey on Detection and Prevention of Black Hole Attack in AODV -- based MANETs","volume":"2","author":"Singh Y. P.","year":"2013","journal-title":"Journal of Information, Knowledge and Research in Computer Engineering"},{"issue":"2","key":"e_1_3_2_1_7_1","first-page":"9","article-title":"Analysis of Black Hole and Worm Hole Attack on AODV Routing Protocol in MANET","volume":"3","author":"Garg C.","year":"2013","journal-title":"Asian Journal of Computer Science and Information Technology"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.072210.00026"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37119-6_20"},{"key":"e_1_3_2_1_10_1","first-page":"8","article-title":"Survey -- Secure Routing Protocols of MANET","volume":"5","author":"Patil J. A.","year":"2013","journal-title":"International Journal of Applied Information Systems (IJAIS)"},{"key":"e_1_3_2_1_11_1","first-page":"394","article-title":"Historical Evidence Based Trust Management Strategy against Black Hole Attacks in MANET","author":"Yang B.","year":"2012","journal-title":"ICACT"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"S. Djahel F. Nait-Abdesselam and A. Khokhar \"An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol \" ICC '08 Proceedings pp. 2780--2785 May 2008.  S. Djahel F. Nait-Abdesselam and A. Khokhar \"An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol \" ICC '08 Proceedings pp. 2780--2785 May 2008.","DOI":"10.1109\/ICC.2008.524"},{"issue":"1","key":"e_1_3_2_1_13_1","article-title":"A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks","volume":"3","author":"Agrawal S.","year":"2011","journal-title":"Journal of Computing"},{"issue":"2","key":"e_1_3_2_1_14_1","first-page":"314","article-title":"A Survey on: Resource Consumption Index of Denial of Service Attack in MANET","volume":"2","author":"Joshi P.","year":"2013","journal-title":"International Journal of Science Engineering and Technology Research (IJSETR)"},{"issue":"2","key":"e_1_3_2_1_15_1","first-page":"98","article-title":"Survey of Clustering Algorithms for MANET","volume":"1","author":"Agarwal R.","year":"2009","journal-title":"International Journal on Computer Science and Engineering"},{"issue":"1","key":"e_1_3_2_1_16_1","first-page":"11","article-title":"A Novel Security Based Model for Wireless Mesh Networks","volume":"1","author":"Mawada S.","year":"2013","journal-title":"International Journal of Scientific Research in Network Security and Communication"},{"volume-title":"Johannesburg","year":"2013","author":"Ochola E. O.","key":"e_1_3_2_1_17_1"}],"event":{"name":"SAICSIT '13: 2013 South African Institute for Computer Scientists and Information Technologists","sponsor":["Amazon Amazon.com","Rhodes Univ. Rhodes University","IBM IBM"],"location":"East London South Africa","acronym":"SAICSIT '13"},"container-title":["Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2513456.2513497","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2513456.2513497","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:54Z","timestamp":1750231734000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2513456.2513497"}},"subtitle":["a case of an intelligent black-hole"],"short-title":[],"issued":{"date-parts":[[2013,10,7]]},"references-count":17,"alternative-id":["10.1145\/2513456.2513497","10.1145\/2513456"],"URL":"https:\/\/doi.org\/10.1145\/2513456.2513497","relation":{},"subject":[],"published":{"date-parts":[[2013,10,7]]},"assertion":[{"value":"2013-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}