{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T03:30:06Z","timestamp":1764646206314,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,27]],"date-time":"2019-03-27T00:00:00Z","timestamp":1553644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,27]]},"DOI":"10.1145\/3320326.3320403","type":"proceedings-article","created":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T15:12:03Z","timestamp":1558451523000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Security Extension for Routing Protocols in Ad hoc Mobile Networks"],"prefix":"10.1145","author":[{"given":"Zaid","family":"Kartit","sequence":"first","affiliation":[{"name":"Mohammedia School of Engineers, University Mohammed V in Rabat, Av Nations Unies, Agdal, Rabat Maroc"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ouafaa","family":"Diouri","sequence":"additional","affiliation":[{"name":"Mohammedia School of Engineers, University Mohammed V in Rabat, Av Nations Unies, Agdal, Rabat Maroc"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2019,3,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.11.001"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/UKSim.2013.48"},{"key":"e_1_3_2_1_3_1","first-page":"14","volume":"9","author":"Somasundaram K. Vijayakumar","year":"2016","unstructured":"K. Vijayakumar et K. Somasundaram , \u00ab Study on Reliable and Secure Routing Protocols on Manet\u00bb , Indian J. Sci. Technol. , vol. 9 , n\u00b0 14 , avr. 2016 . K. Vijayakumar et K. Somasundaram, \u00abStudy on Reliable and Secure Routing Protocols on Manet\u00bb, Indian J. Sci. Technol., vol. 9, n\u00b0 14, avr. 2016.","journal-title":"J. Sci. Technol."},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"International Conference on Information Technology for Organizations Development (IT4OD)","author":"Moudni H.","year":"2016","unstructured":"H. Moudni , M. Er-rouidi, H. Mouncif , et B. E. Hadadi, \u00abSecure routing protocols for mobile ad hoc networks\u00bb , International Conference on Information Technology for Organizations Development (IT4OD) , 2016 , p. 1 -- 7 . H. Moudni, M. Er-rouidi, H. Mouncif, et B. E. Hadadi, \u00abSecure routing protocols for mobile ad hoc networks\u00bb, International Conference on Information Technology for Organizations Development (IT4OD), 2016, p. 1--7."},{"key":"e_1_3_2_1_5_1","volume-title":"SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002","author":"Haas P. Papadimitratos","year":"2002","unstructured":"P. Papadimitratos et Z. J. Haas , \u00ab Secure Routing for Mobile Ad hoc Networks\u00bb , SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002 ), San Antonio, TX, January 27-31,p 13 , 2002 . P. Papadimitratos et Z. J. Haas, \u00abSecure Routing for Mobile Ad hoc Networks\u00bb, SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27-31,p 13, 2002."},{"key":"e_1_3_2_1_6_1","first-page":"1","volume-title":"Networking and Communications (WiMob)","author":"Mahmood B.","year":"2016","unstructured":"B. Mahmood , A. Ibrahim , et D. Manivannan , \u00abSAriadne : A secure source routing protocol to prevent hidden-channel attacks\u00bb IEEE 12th International Conference on Wireless and Mobile Computing , Networking and Communications (WiMob) , p. 1 -- 7 , 2016 . B. Mahmood, A. Ibrahim, et D. Manivannan, \u00abSAriadne: A secure source routing protocol to prevent hidden-channel attacks\u00bb IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), p. 1--7, 2016."},{"key":"e_1_3_2_1_7_1","volume-title":"Conference: BIOSIG 2009 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 17--18","author":"Brzuska C.","year":"2009","unstructured":"C. Brzuska . M. Fischlin , A. Lehmann , et D. Schro , \u00ab Sanitizable Signatures : How to Partially Delegate Control for Authenticated Data\u00bb p. 12 , Conference: BIOSIG 2009 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 17--18 . September 2009 in Darmstadt, Germany. C. Brzuska. M. Fischlin, A. Lehmann, et D. Schro, \u00abSanitizable Signatures: How to Partially Delegate Control for Authenticated Data\u00bb p. 12, Conference: BIOSIG 2009 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 17--18. September 2009 in Darmstadt, Germany."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570682"},{"key":"e_1_3_2_1_9_1","first-page":"325","volume-title":"Secur. Commun. Netw","volume":"2","author":"Li Q.","year":"2009","unstructured":"Q. Li , M. Zhao , J. Walker , Y.-C. Hu , A. Perrig , et W. Trappe , \u00abSEAR : a secure efficient ad hoc on demand routing protocol for wireless networks\u00bb , Secur. Commun. Netw , vol. 2 , n\u00b0 4, p. 325 -- 340 , juill. 2009 . Q. Li, M. Zhao, J. Walker, Y.-C. Hu, A. Perrig, et W. Trappe, \u00abSEAR: a secure efficient ad hoc on demand routing protocol for wireless networks\u00bb, Secur. Commun. Netw, vol. 2, n\u00b0 4, p. 325--340, juill. 2009."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2007.11.002"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655925.1656096"},{"key":"e_1_3_2_1_12_1","first-page":"2","volume":"5","author":"Broadcast Authentication Protocol\u00bb Perrig","year":"2002","unstructured":"Perrig et al. \u00abThe TESLA Broadcast Authentication Protocol\u00bb . pp. 2--13 , In CryptoBytes , 5 : 2 , Summer\/Fall 2002 . Perrig et al. \u00abThe TESLA Broadcast Authentication Protocol\u00bb. pp. 2--13, In CryptoBytes, 5:2, Summer\/Fall 2002.","journal-title":"CryptoBytes"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1161-3"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/501449.501464"},{"key":"e_1_3_2_1_15_1","volume-title":"IJCSNS Tnternational Journal of Computer Science and Network Security, VOL. 14 No.","author":"K.","year":"2014","unstructured":"K. VinothKumar et A. Rajaram, \u00abAn Efficient Security Aware Routing Protocol for Mobile Ad Hoc Networks\u00bbp 8 , IJCSNS Tnternational Journal of Computer Science and Network Security, VOL. 14 No. 12, December 2014 . K. VinothKumar et A. Rajaram, \u00abAn Efficient Security Aware Routing Protocol for Mobile Ad Hoc Networks\u00bbp 8, IJCSNS Tnternational Journal of Computer Science and Network Security, VOL. 14 No. 12, December 2014."},{"key":"e_1_3_2_1_16_1","volume-title":"IEEE International Conference on Networking, Sensing and Control","author":"Chigan Leiyuan Li","year":"2006","unstructured":"Leiyuan Li et C. Chigan , \u00ab Token Routing : A Power Efficient Method for Securing AODV Routing Protocol\u00bb p. 29--34 , IEEE International Conference on Networking, Sensing and Control , 2006 . Leiyuan Li et C. Chigan, \u00abToken Routing: A Power Efficient Method for Securing AODV Routing Protocol\u00bb p. 29--34, IEEE International Conference on Networking, Sensing and Control, 2006."},{"key":"e_1_3_2_1_17_1","first-page":"5","volume":"3","author":"Pabitra Mohan Khilar Preeti Sachan","unstructured":"Preeti Sachan et Pabitra Mohan Khilar , \u00ab Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism\u00bb , Int. J. Netw. Secur. Its Appl. , vol. 3 , n\u00b0 5 , p. 229--241, sept. 2011. Preeti Sachan et Pabitra Mohan Khilar, \u00abSecuring AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism\u00bb, Int. J. Netw. Secur. Its Appl., vol. 3, n\u00b0 5, p. 229--241, sept. 2011.","journal-title":"Int. J. Netw. Secur. Its Appl."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MUE.2008.11"},{"key":"e_1_3_2_1_19_1","first-page":"2","volume":"13","author":"Luong T.-T.","year":"2018","unstructured":"T.-T. Vo et T.-N. Luong , \u00abVRA-AODV: Routing Protocol Detects Blackhole and Grayhole Attacks in Mobile Ad hoc Network\u00bb , J. Comput. , vol. 13 , n\u00b0 2 , p. 14, 2018 . T.-T. Vo et T.-N. Luong, \u00abVRA-AODV: Routing Protocol Detects Blackhole and Grayhole Attacks in Mobile Ad hoc Network\u00bb, J. Comput., vol. 13, n\u00b0 2, p. 14, 2018.","journal-title":"J. Comput."},{"key":"e_1_3_2_1_20_1","volume-title":"7th Conference on Information and Knowledge Technology","author":"Eidie S.","year":"2015","unstructured":"S. Eidie , B. Akbari , et P. Poshtiban , \u00abWANI : Wormhole avoidance using neighbor information\u00bb p. 1--6 , 7th Conference on Information and Knowledge Technology 2015 . S. Eidie, B. Akbari, et P. Poshtiban, \u00abWANI: Wormhole avoidance using neighbor information\u00bb p. 1--6, 7th Conference on Information and Knowledge Technology 2015."},{"key":"e_1_3_2_1_21_1","volume-title":"International Journal of Distributed Sensor Networks","author":"Feng R.","year":"2051","unstructured":"R. Feng , S. Che , X. Wang , and N. Yu et. al., \"A Credible Routing Based on a Novel Trust Mechanism in Ad Hoc Networks \", International Journal of Distributed Sensor Networks Volume 2013 , Article ID 65 2051 , 12 pages, 2013 R. Feng, S. Che, X. Wang, and N. Yu et. al., \"A Credible Routing Based on a Novel Trust Mechanism in Ad Hoc Networks\", International Journal of Distributed Sensor Networks Volume 2013, Article ID 652051, 12 pages, 2013"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCT.2014.95"},{"issue":"5","key":"e_1_3_2_1_23_1","first-page":"110","volume":"4","author":"Khushboo Sawant","year":"2014","unstructured":"Khushboo Sawant et al Int., Survey of DOS Flooding Attacks over MANET Environment Journal of Engineering Research and Applications Vol. 4 , Issue 5 (Version 6), May 2014 , pp. 110 -- 115 . Khushboo Sawant et al Int., Survey of DOS Flooding Attacks over MANET Environment Journal of Engineering Research and Applications Vol. 4, Issue 5 (Version 6), May 2014, pp. 110--115.","journal-title":"Int., Survey of DOS Flooding Attacks over MANET Environment Journal of Engineering Research and Applications"},{"key":"e_1_3_2_1_24_1","first-page":"97","volume":"0975","author":"Thillaikarasiv","unstructured":"Thillaikarasiv et al, A Survey of Secure Routing Protocols for Wireless Mesh Networks , International Journal of Computer Applications ( 0975-8887 ) Volume 97 -- No.6, July 2014 Thillaikarasiv et al, A Survey of Secure Routing Protocols for Wireless Mesh Networks, International Journal of Computer Applications (0975-8887) Volume 97-- No.6, July 2014","journal-title":"International Journal of Computer Applications ("}],"event":{"name":"NISS19: Networking, Information Systems & Security","acronym":"NISS19","location":"Rabat Morocco"},"container-title":["Proceedings of the 2nd International Conference on Networking, Information Systems &amp; Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320326.3320403","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320326.3320403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:56Z","timestamp":1750204436000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320326.3320403"}},"subtitle":["A comparative Study"],"short-title":[],"issued":{"date-parts":[[2019,3,27]]},"references-count":24,"alternative-id":["10.1145\/3320326.3320403","10.1145\/3320326"],"URL":"https:\/\/doi.org\/10.1145\/3320326.3320403","relation":{},"subject":[],"published":{"date-parts":[[2019,3,27]]},"assertion":[{"value":"2019-03-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}