{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:48:59Z","timestamp":1762004939854,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T00:00:00Z","timestamp":1511222400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,21]]},"DOI":"10.1145\/3132340.3132346","type":"proceedings-article","created":{"date-parts":[[2017,11,15]],"date-time":"2017-11-15T13:36:37Z","timestamp":1510752997000},"page":"107-116","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Detection and Avoidance of Wormhole Attacks in Connected Vehicles"],"prefix":"10.1145","author":[{"given":"Sami S.","family":"Albouq","sequence":"first","affiliation":[{"name":"Oakland University, Rochester hills, MI, USA"}]},{"given":"Erik M.","family":"Fredericks","sequence":"additional","affiliation":[{"name":"Oakland University, Rochester hills, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,11,21]]},"reference":[{"volume-title":"New Jersey traffic and revenue study","key":"e_1_3_2_1_1_1","unstructured":"2008. New Jersey traffic and revenue study . State of New Jersey Department of Treasury State House . 2008. New Jersey traffic and revenue study. State of New Jersey Department of Treasury State House."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS.2012.6507953"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.036"},{"volume-title":"Lightweight Detection and Isolation of Black Hole Attacks in Connected Vehicles. In 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW). 97--104","author":"Albouq S.","key":"e_1_3_2_1_4_1","unstructured":"Sami. S. Albouq and E. M. Fredericks . 2017 . Lightweight Detection and Isolation of Black Hole Attacks in Connected Vehicles. In 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW). 97--104 . Sami. S. Albouq and E. M. Fredericks. 2017. Lightweight Detection and Isolation of Black Hole Attacks in Connected Vehicles. In 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW). 97--104."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIINFS.2014.7036535"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. ACM, 21--32","author":"Butty\u00e1n Levente","year":"2003","unstructured":"Srdjan\u00e4pkun, Levente Butty\u00e1n , and Jean-Pierre Hubaux . 2003 . SECTOR: secure tracking of node encounters in multi-hop wireless networks . In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. ACM, 21--32 . Srdjan\u00e4pkun, Levente Butty\u00e1n, and Jean-Pierre Hubaux. 2003. SECTOR: secure tracking of node encounters in multi-hop wireless networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. ACM, 21--32."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-011-0334-2"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464456"},{"key":"e_1_3_2_1_9_1","volume-title":"In Network and Distributed System Security Symposium.","author":"Hu Lingxuan","year":"2004","unstructured":"Lingxuan Hu and David Evans . 2004 . Using Directional Antennas to Prevent Wormhole Attacks .. In In Network and Distributed System Security Symposium. Lingxuan Hu and David Evans. 2004. Using Directional Antennas to Prevent Wormhole Attacks.. In In Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861394"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"e_1_3_2_1_12_1","volume-title":"Standard specification for telecommunications and information exchange between roadside and vehicle systems-5 GHz band Dedicated Short Range Communications. ASTM International","author":"Intl A. S. T. M.","year":"2003","unstructured":"A. S. T. M. Intl . 2003. Standard specification for telecommunications and information exchange between roadside and vehicle systems-5 GHz band Dedicated Short Range Communications. ASTM International ( 2003 ). A. S. T. M. Intl. 2003. Standard specification for telecommunications and information exchange between roadside and vehicle systems-5 GHz band Dedicated Short Range Communications. ASTM International (2003)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6214260"},{"volume-title":"Mobile computing","author":"Johnson David B","key":"e_1_3_2_1_14_1","unstructured":"David B Johnson and David A Maltz . 1996. Dynamic source routing in ad hoc wireless networks . In Mobile computing . Springer , 153--181. David B Johnson and David A Maltz. 1996. Dynamic source routing in ad hoc wireless networks. In Mobile computing. Springer, 153--181."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.58"},{"key":"e_1_3_2_1_16_1","volume-title":"International Journal of Distributed Sensor Networks 2013","author":"Kim Gisung","year":"2013","unstructured":"Dong-uk Kim, Hyo-won Kim, Gisung Kim , and Sehun Kim . 2013. A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods . International Journal of Distributed Sensor Networks 2013 ( 2013 ). Dong-uk Kim, Hyo-won Kim, Gisung Kim, and Sehun Kim. 2013. A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods. International Journal of Distributed Sensor Networks 2013 (2013)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424678"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.21"},{"key":"e_1_3_2_1_19_1","volume-title":"International Journal of Computer Science and Information Security 1","author":"El-Kassas Marianne Sherif","year":"2009","unstructured":"Sherif El-Kassas Marianne Azer and Magdy El-Soudani . 2009. Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks \"A Full Image of the Wormhole Attacks \". International Journal of Computer Science and Information Security 1 ( 2009 ). Sherif El-Kassas Marianne Azer and Magdy El-Soudani. 2009. Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks \"A Full Image of the Wormhole Attacks\". International Journal of Computer Science and Information Security 1 (2009)."},{"volume-title":"Trustworthy Ubiquitous Computing","author":"Modirkhazeni Ali","key":"e_1_3_2_1_20_1","unstructured":"Ali Modirkhazeni , Norafida Ithnin , Mohammed M Kadhum , and Teddy Mantoro . 2012. Mitigation of Wormhole Attack in Wireless Sensor Networks . In Trustworthy Ubiquitous Computing . Springer , 109--147. Ali Modirkhazeni, Norafida Ithnin, Mohammed M Kadhum, and Teddy Mantoro. 2012. Mitigation of Wormhole Attack in Wireless Sensor Networks. In Trustworthy Ubiquitous Computing. Springer, 109--147."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.191995"},{"key":"e_1_3_2_1_22_1","volume-title":"the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference. 193--204","author":"Papadimitratos Panos","year":"2002","unstructured":"Panos Papadimitratos and Zygmunt J Haas . 2002 . Secure routing for mobile ad hoc networks . In the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference. 193--204 . Panos Papadimitratos and Zygmunt J Haas. 2002. Secure routing for mobile ad hoc networks. In the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference. 193--204."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1201\/EBK1439819197"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the Internet Society Network and Distributed System Security Symposium. 35--46","author":"Perrig Adrian","year":"2001","unstructured":"Adrian Perrig , Ran Canetti , Dawn Song , and J Doug Tygar . 2001 . Efficient and secure source authentication for multicast . In Proceedings of the Internet Society Network and Distributed System Security Symposium. 35--46 . Adrian Perrig, Ran Canetti, Dawn Song, and J Doug Tygar. 2001. Efficient and secure source authentication for multicast. In Proceedings of the Internet Society Network and Distributed System Security Symposium. 35--46."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2012.4"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550352"},{"key":"e_1_3_2_1_27_1","volume-title":"Second International Workshop on Computer Science and Engineering","volume":"2","author":"Safi S. M.","unstructured":"S. M. Safi , A. Movaghar , and M. Mohammadizadeh . 2009. A Novel Approach for Avoiding Wormhole Attacks in VANET . In Second International Workshop on Computer Science and Engineering , Vol. 2 . 160--165. S. M. Safi, A. Movaghar, and M. Mohammadizadeh. 2009. A Novel Approach for Avoiding Wormhole Attacks in VANET. In Second International Workshop on Computer Science and Engineering, Vol. 2. 160--165."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2012.6261721"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2007.63"}],"event":{"name":"MSWiM '17: 20th ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Miami Florida USA","acronym":"MSWiM '17"},"container-title":["Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132340.3132346","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132340.3132346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:11Z","timestamp":1750217831000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132340.3132346"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,21]]},"references-count":30,"alternative-id":["10.1145\/3132340.3132346","10.1145\/3132340"],"URL":"https:\/\/doi.org\/10.1145\/3132340.3132346","relation":{},"subject":[],"published":{"date-parts":[[2017,11,21]]},"assertion":[{"value":"2017-11-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}