{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:38Z","timestamp":1750220858076,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,2]]},"DOI":"10.1145\/3368756.3369018","type":"proceedings-article","created":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T13:21:21Z","timestamp":1576675281000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Bootstrapping services availability through multipath routing for enhanced security in urban IoT"],"prefix":"10.1145","author":[{"given":"Fatna El","family":"Mahdi","sequence":"first","affiliation":[{"name":"University of Mohammed V, Rabat, Morocco"}]},{"given":"Ahmed","family":"Habbani","sequence":"additional","affiliation":[{"name":"University of Mohammed V, Rabat, Morocco"}]},{"given":"Baohir","family":"Bouamoud","sequence":"additional","affiliation":[{"name":"University of Mohammed V, Rabat, Morocco"}]},{"given":"Mohammed","family":"Souidi","sequence":"additional","affiliation":[{"name":"University of Mohammed V, Rabat, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2833427"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2389823"},{"key":"e_1_3_2_1_3_1","first-page":"431","article-title":"Smart Cities and the Future Internet: Towards Cooperation Frameworks for Open Innovation,\" in The Future Internet, Berlin","author":"Schaffers H.","year":"2011","unstructured":"H. Schaffers , N. Komninos , M. Pallot , B. Trousse , M. Nilsson , and A. Oliveira , \" Smart Cities and the Future Internet: Towards Cooperation Frameworks for Open Innovation,\" in The Future Internet, Berlin , Heidelberg , 2011 , pp. 431 -- 446 . H. Schaffers, N. Komninos, M. Pallot, B. Trousse, M. Nilsson, and A. Oliveira, \"Smart Cities and the Future Internet: Towards Cooperation Frameworks for Open Innovation,\" in The Future Internet, Berlin, Heidelberg, 2011, pp. 431--446.","journal-title":"Heidelberg"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"e_1_3_2_1_5_1","volume-title":"Rabat","author":"Mahdi F. E.","year":"2017","unstructured":"F. E. Mahdi , A. Habbani , N. Mouchfiq , and B. Essaid , \" Study of security in MANETs and evaluation of network performance using ETX metric,\" presented at the Proceedings of the 2017 International Conference on Smart Digital Environment , Rabat , Morocco , 2017 . F. E. Mahdi, A. Habbani, N. Mouchfiq, and B. Essaid, \"Study of security in MANETs and evaluation of network performance using ETX metric,\" presented at the Proceedings of the 2017 International Conference on Smart Digital Environment, Rabat, Morocco, 2017."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5120\/1415-1911"},{"key":"e_1_3_2_1_7_1","volume-title":"Simulation of Black hole attack in wireless Ad-hoc networks: Atilim University","author":"Dokurer S.","year":"2006","unstructured":"S. Dokurer , Simulation of Black hole attack in wireless Ad-hoc networks: Atilim University , 2006 . S. Dokurer, Simulation of Black hole attack in wireless Ad-hoc networks: Atilim University, 2006."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5120\/1415-1911"},{"key":"e_1_3_2_1_9_1","volume-title":"Huntsville","author":"Al-Shurman M.","year":"2004","unstructured":"M. Al-Shurman , S.-M. Yoo , and S. Park , \" Black hole attack in mobile Ad Hoc networks,\" presented at the Proceedings of the 42nd annual Southeast regional conference , Huntsville , Alabama , 2004 . M. Al-Shurman, S.-M. Yoo, and S. Park, \"Black hole attack in mobile Ad Hoc networks,\" presented at the Proceedings of the 42nd annual Southeast regional conference, Huntsville, Alabama, 2004."},{"key":"e_1_3_2_1_10_1","first-page":"338","article-title":"Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method","volume":"5","author":"Kurosawa S.","year":"2007","unstructured":"S. Kurosawa , H. Nakayama , N. Kato , A. Jamalipour , and Y. Nemoto , \" Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method ,\" IJ Network Security , vol. 5 , pp. 338 -- 346 , 2007 . S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour, and Y. Nemoto, \"Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method,\" IJ Network Security, vol. 5, pp. 338--346, 2007.","journal-title":"IJ Network Security"},{"key":"e_1_3_2_1_11_1","article-title":"Defending AODV routing protocol against the black hole attack","volume":"8","author":"Ameza F.","year":"2010","unstructured":"F. Ameza , N. Assam , and R. Beghdad , \" Defending AODV routing protocol against the black hole attack ,\" International Journal of Computer Science and Information Security , vol. 8 , 2010 . F. Ameza, N. Assam, and R. Beghdad, \"Defending AODV routing protocol against the black hole attack,\" International Journal of Computer Science and Information Security, vol. 8, 2010.","journal-title":"International Journal of Computer Science and Information Security"},{"key":"e_1_3_2_1_12_1","volume-title":"Improving AODV protocol against blackhole attacks,\" in Proceedings of the International Multi Conference of Engineers and Computer Scientists","author":"Mistry N.","year":"2010","unstructured":"N. Mistry , D. C. Jinwala , and M. Zaveri , \" Improving AODV protocol against blackhole attacks,\" in Proceedings of the International Multi Conference of Engineers and Computer Scientists , 2010 . N. Mistry, D. C. Jinwala, and M. Zaveri, \"Improving AODV protocol against blackhole attacks,\" in Proceedings of the International Multi Conference of Engineers and Computer Scientists, 2010."},{"key":"e_1_3_2_1_13_1","volume-title":"Dpraodv: A dyanamic learning system against blackhole attack in aodv based manet,\" arXiv preprint arXiv:0909.2371","author":"Raj P. N.","year":"2009","unstructured":"P. N. Raj and P. B. Swadas , \" Dpraodv: A dyanamic learning system against blackhole attack in aodv based manet,\" arXiv preprint arXiv:0909.2371 , 2009 . P. N. Raj and P. B. Swadas, \"Dpraodv: A dyanamic learning system against blackhole attack in aodv based manet,\" arXiv preprint arXiv:0909.2371, 2009."},{"key":"e_1_3_2_1_14_1","first-page":"538","volume-title":"China, May 22--25","author":"Yu C. W.","year":"2007","unstructured":"C. W. Yu , T.-K. Wu , R. H. Cheng , and S. C. Chang , \" A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks,\" in Emerging Technologies in Knowledge Discovery and Data Mining: PAKDD 2007 International Workshops Nanjing , China, May 22--25 , 2007 Revised Selected Papers, T. Washio, Z.-H. Zhou, J. Z. Huang, X. Hu, J. Li, C. Xie, J. He, D. Zou, K.-C. Li, and M. M. Freire, Eds ., ed Berlin, Heidelberg : Springer Berlin Heidelberg , 2007, pp. 538 -- 549 . C. W. Yu, T.-K. Wu, R. H. Cheng, and S. C. Chang, \"A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks,\" in Emerging Technologies in Knowledge Discovery and Data Mining: PAKDD 2007 International Workshops Nanjing, China, May 22--25, 2007 Revised Selected Papers, T. Washio, Z.-H. Zhou, J. Z. Huang, X. Hu, J. Li, C. Xie, J. He, D. Zou, K.-C. Li, and M. M. Freire, Eds., ed Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 538--549."},{"key":"e_1_3_2_1_15_1","first-page":"362","volume-title":"Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation,\" in Future Generation Communication and Networking (FGCN","author":"Weerasinghe H.","year":"2007","unstructured":"H. Weerasinghe and H. Fu , \" Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation,\" in Future Generation Communication and Networking (FGCN 2007 ), 2007, pp. 362 -- 367 . H. Weerasinghe and H. Fu, \"Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation,\" in Future Generation Communication and Networking (FGCN 2007), 2007, pp. 362--367."},{"key":"e_1_3_2_1_16_1","first-page":"037","volume-title":"Energy Information and Commuincation (ICCPEIC)","author":"Govindasamy V.","year":"2016","unstructured":"V. Govindasamy , S. Sandosh , and C. S. Kumar , \" KD2SA: Key Distribution Scheme Shuffling algorithm for heightened secure data transmission,\" in 2016 International Conference on Computation of Power , Energy Information and Commuincation (ICCPEIC) , 2016 , pp. 037 -- 042 . V. Govindasamy, S. Sandosh, and C. S. Kumar, \"KD2SA: Key Distribution Scheme Shuffling algorithm for heightened secure data transmission,\" in 2016 International Conference on Computation of Power, Energy Information and Commuincation (ICCPEIC), 2016, pp. 037--042."},{"key":"e_1_3_2_1_17_1","first-page":"470","volume-title":"Mitigate black hole attack using trust with AODV in MANET,\" in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom)","author":"Keerthika V.","year":"2016","unstructured":"V. Keerthika and N. Malarvizhi , \" Mitigate black hole attack using trust with AODV in MANET,\" in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) , 2016 , pp. 470 -- 474 . V. Keerthika and N. Malarvizhi, \"Mitigate black hole attack using trust with AODV in MANET,\" in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016, pp. 470--474."},{"key":"e_1_3_2_1_18_1","first-page":"1","volume-title":"Communications & Signal Processing","author":"Sen J.","year":"2007","unstructured":"J. Sen , M. G. Chandra , S. G. Harihara , H. Reddy , and P. Balamuralidhar , \" A mechanism for detection of gray hole attack in mobile Ad Hoc networks,\" in 2007 6th International Conference on Information , Communications & Signal Processing , 2007 , pp. 1 -- 5 . J. Sen, M. G. Chandra, S. G. Harihara, H. Reddy, and P. Balamuralidhar, \"A mechanism for detection of gray hole attack in mobile Ad Hoc networks,\" in 2007 6th International Conference on Information, Communications & Signal Processing, 2007, pp. 1--5."},{"key":"e_1_3_2_1_19_1","first-page":"310","volume-title":"Cooperative black and gray hole attacks in mobile ad hoc networks,\" in Proceedings of the 2nd international conference on Ubiquitous information management and communication","author":"Agrawal P.","year":"2008","unstructured":"P. Agrawal , R. K. Ghosh , and S. K. Das , \" Cooperative black and gray hole attacks in mobile ad hoc networks,\" in Proceedings of the 2nd international conference on Ubiquitous information management and communication , 2008 , pp. 310 -- 314 . P. Agrawal, R. K. Ghosh, and S. K. Das, \"Cooperative black and gray hole attacks in mobile ad hoc networks,\" in Proceedings of the 2nd international conference on Ubiquitous information management and communication, 2008, pp. 310--314."},{"key":"e_1_3_2_1_20_1","first-page":"209","volume-title":"A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks,\" in 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC","author":"Xiaopeng G.","year":"2007","unstructured":"G. Xiaopeng and C. Wei , \" A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks,\" in 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007 ), 2007, pp. 209 -- 214 . G. Xiaopeng and C. Wei, \"A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks,\" in 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007), 2007, pp. 209--214."},{"key":"e_1_3_2_1_21_1","first-page":"12","article-title":"MANET routing protocols and wormhole attack against AODV","volume":"10","author":"Jhaveri R. H.","year":"2010","unstructured":"R. H. Jhaveri , A. D. Patel , J. D. Parmar , and B. I. Shah , \" MANET routing protocols and wormhole attack against AODV ,\" International Journal of Computer Science and Network Security , vol. 10 , pp. 12 -- 18 , 2010 . R. H. Jhaveri, A. D. Patel, J. D. Parmar, and B. I. Shah, \"MANET routing protocols and wormhole attack against AODV,\" International Journal of Computer Science and Network Security, vol. 10, pp. 12--18, 2010.","journal-title":"International Journal of Computer Science and Network Security"},{"key":"e_1_3_2_1_22_1","first-page":"535","volume-title":"DoS attacks in mobile ad hoc networks: A survey,\" in 2012 second international conference on advanced computing & communication technologies","author":"Jhaveri R. H.","year":"2012","unstructured":"R. H. Jhaveri , S. J. Patel , and D. C. Jinwala , \" DoS attacks in mobile ad hoc networks: A survey,\" in 2012 second international conference on advanced computing & communication technologies , 2012 , pp. 535 -- 541 . R. H. Jhaveri, S. J. Patel, and D. C. Jinwala, \"DoS attacks in mobile ad hoc networks: A survey,\" in 2012 second international conference on advanced computing & communication technologies, 2012, pp. 535--541."},{"key":"e_1_3_2_1_23_1","first-page":"209","volume-title":"NPC Workshops. IFIP International Conference on","author":"Xiaopeng G.","year":"2007","unstructured":"G. Xiaopeng and C. Wei , \" A novel gray hole attack detection scheme for mobile ad-hoc networks,\" in Network and Parallel Computing Workshops, 2007 . NPC Workshops. IFIP International Conference on , 2007 , pp. 209 -- 214 . G. Xiaopeng and C. Wei, \"A novel gray hole attack detection scheme for mobile ad-hoc networks,\" in Network and Parallel Computing Workshops, 2007. NPC Workshops. IFIP International Conference on, 2007, pp. 209--214."},{"key":"e_1_3_2_1_24_1","first-page":"302","article-title":"Detection of packet forwarding misbehavior in mobile ad-hoc networks,\" in Wired\/Wireless Internet Communications, ed","author":"Gonzalez O. F.","year":"2007","unstructured":"O. F. Gonzalez , M. Howarth , and G. Pavlou , \" Detection of packet forwarding misbehavior in mobile ad-hoc networks,\" in Wired\/Wireless Internet Communications, ed : Springer , 2007 , pp. 302 -- 314 . O. F. Gonzalez, M. Howarth, and G. Pavlou, \"Detection of packet forwarding misbehavior in mobile ad-hoc networks,\" in Wired\/Wireless Internet Communications, ed: Springer, 2007, pp. 302--314.","journal-title":"Springer"},{"key":"e_1_3_2_1_25_1","first-page":"3736","volume-title":"Detection as well as removal of black hole and gray hole attack in MANET,\" in 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","author":"Sharma N.","year":"2016","unstructured":"N. Sharma and A. S. Bisen , \" Detection as well as removal of black hole and gray hole attack in MANET,\" in 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) , 2016 , pp. 3736 -- 3739 . N. Sharma and A. S. Bisen, \"Detection as well as removal of black hole and gray hole attack in MANET,\" in 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016, pp. 3736--3739."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0160"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2009.0140"},{"key":"e_1_3_2_1_28_1","first-page":"78","article-title":"Detection and prevention of wormhole attack in mobile adhoc networks","volume":"2","author":"Jain S.","year":"2010","unstructured":"S. Jain and S. Jain , \" Detection and prevention of wormhole attack in mobile adhoc networks ,\" International Journal of Computer Theory and Engineering , vol. 2 , p. 78 , 2010 . S. Jain and S. Jain, \"Detection and prevention of wormhole attack in mobile adhoc networks,\" International Journal of Computer Theory and Engineering, vol. 2, p. 78, 2010.","journal-title":"International Journal of Computer Theory and Engineering"},{"key":"e_1_3_2_1_29_1","volume-title":"Securing AODV against wormhole attacks in emergency MANET multimedia communications,\" in Proceedings of the 5th International ICST Mobile Multimedia Communications Conference","author":"Panaousis E. A.","year":"2009","unstructured":"E. A. Panaousis , L. Nazaryan , and C. Politis , \" Securing AODV against wormhole attacks in emergency MANET multimedia communications,\" in Proceedings of the 5th International ICST Mobile Multimedia Communications Conference , 2009 , p. 34. E. A. Panaousis, L. Nazaryan, and C. Politis, \"Securing AODV against wormhole attacks in emergency MANET multimedia communications,\" in Proceedings of the 5th International ICST Mobile Multimedia Communications Conference, 2009, p. 34."},{"key":"e_1_3_2_1_30_1","article-title":"STUDY OF DIFFERENT ATTACKS ON MULTICAST MOBILE AD HOC NETWORK","volume":"6","author":"Shanthi N.","year":"2009","unstructured":"N. Shanthi , L. Ganesan , and K. Ramar , \" STUDY OF DIFFERENT ATTACKS ON MULTICAST MOBILE AD HOC NETWORK ,\" Journal of Theoretical & Applied Information Technology , vol. 6 , 2009 . N. Shanthi, L. Ganesan, and K. Ramar, \"STUDY OF DIFFERENT ATTACKS ON MULTICAST MOBILE AD HOC NETWORK,\" Journal of Theoretical & Applied Information Technology, vol. 6, 2009.","journal-title":"Journal of Theoretical & Applied Information Technology"},{"key":"e_1_3_2_1_31_1","first-page":"75","volume-title":"Truelink: A practical countermeasure to the wormhole attack in wireless networks,\" in Proceedings of the 2006 IEEE International Conference on Network Protocols","author":"Eriksson J.","year":"2006","unstructured":"J. Eriksson , S. V. Krishnamurthy , and M. Faloutsos , \" Truelink: A practical countermeasure to the wormhole attack in wireless networks,\" in Proceedings of the 2006 IEEE International Conference on Network Protocols , 2006 , pp. 75 -- 84 . J. Eriksson, S. V. Krishnamurthy, and M. Faloutsos, \"Truelink: A practical countermeasure to the wormhole attack in wireless networks,\" in Proceedings of the 2006 IEEE International Conference on Network Protocols, 2006, pp. 75--84."},{"key":"e_1_3_2_1_32_1","first-page":"370","volume-title":"Wormhole attacks in wireless networks,\" IEEE journal on selected areas in communications","author":"Hu Y.-C.","year":"2006","unstructured":"Y.-C. Hu , A. Perrig , and D. B. Johnson , \" Wormhole attacks in wireless networks,\" IEEE journal on selected areas in communications , vol. 24 , pp. 370 -- 380 , 2006 . Y.-C. Hu, A. Perrig, and D. B. Johnson, \"Wormhole attacks in wireless networks,\" IEEE journal on selected areas in communications, vol. 24, pp. 370--380, 2006."},{"key":"e_1_3_2_1_33_1","first-page":"4730","volume-title":"VTC2004-Fall. 2004 IEEE 60th","author":"Chigan C.","year":"2004","unstructured":"C. Chigan and R. Bandaru , \" Secure node misbehaviors in mobile ad hoc networks,\" in Vehicular Technology Conference, 2004 . VTC2004-Fall. 2004 IEEE 60th , 2004 , pp. 4730 -- 4734 . C. Chigan and R. Bandaru, \"Secure node misbehaviors in mobile ad hoc networks,\" in Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th, 2004, pp. 4730--4734."},{"key":"e_1_3_2_1_34_1","first-page":"612","volume-title":"LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks,\" in 2005 International Conference on Dependable Systems and Networks (DSN'05)","author":"Khalil I.","year":"2005","unstructured":"I. Khalil , S. Bagchi , and N. B. Shroff , \" LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks,\" in 2005 International Conference on Dependable Systems and Networks (DSN'05) , 2005 , pp. 612 -- 621 . I. Khalil, S. Bagchi, and N. B. Shroff, \"LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks,\" in 2005 International Conference on Dependable Systems and Networks (DSN'05), 2005, pp. 612--621."},{"key":"e_1_3_2_1_35_1","first-page":"1193","article-title":"Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach","volume":"2005","author":"Lazos L.","year":"2005","unstructured":"L. Lazos , R. Poovendran , C. Meadows , P. Syverson , and L. Chang , \" Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach ,\" in IEEE Wireless Communications and Networking Conference , 2005 , 2005 , pp. 1193 -- 1199 . L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L. Chang, \"Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach,\" in IEEE Wireless Communications and Networking Conference, 2005, 2005, pp. 1193--1199.","journal-title":"IEEE Wireless Communications and Networking Conference"},{"key":"e_1_3_2_1_36_1","first-page":"152","volume-title":"Informatics and Mobile Engineering","author":"Indirani G.","year":"2013","unstructured":"G. Indirani , K. Selvakumar , and V. Sivaaamasundari , \" Intrusion detection and defense mechanism for packet replication attack over MANET using swarm intelligence,\" in 2013 International Conference on Pattern Recognition , Informatics and Mobile Engineering , 2013 , pp. 152 -- 156 . G. Indirani, K. Selvakumar, and V. Sivaaamasundari, \"Intrusion detection and defense mechanism for packet replication attack over MANET using swarm intelligence,\" in 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, 2013, pp. 152--156."},{"key":"e_1_3_2_1_37_1","first-page":"8","article-title":"Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures","author":"Hong S.","year":"2015","unstructured":"S. Hong , L. Xu , H. Wang , and G. Gu , \" Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures ,\" in NDSS , 2015 , pp. 8 -- 11 . S. Hong, L. Xu, H. Wang, and G. Gu, \"Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures,\" in NDSS, 2015, pp. 8--11.","journal-title":"NDSS"},{"key":"e_1_3_2_1_38_1","first-page":"8","article-title":"SPHINX: Detecting Security Attacks in Software-Defined Networks","author":"Dhawan M.","year":"2015","unstructured":"M. Dhawan , R. Poddar , K. Mahajan , and V. Mann , \" SPHINX: Detecting Security Attacks in Software-Defined Networks ,\" in NDSS , 2015 , pp. 8 -- 11 . M. Dhawan, R. Poddar, K. Mahajan, and V. Mann, \"SPHINX: Detecting Security Attacks in Software-Defined Networks,\" in NDSS, 2015, pp. 8--11.","journal-title":"NDSS"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi11040085"},{"key":"e_1_3_2_1_40_1","unstructured":"R. P. Jover \"The current state of affairs in 5G security and the main remaining security challenges \" arXiv preprint arXiv:1904.08394 2019.  R. P. Jover \"The current state of affairs in 5G security and the main remaining security challenges \" arXiv preprint arXiv:1904.08394 2019."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/941311.941318","volume-title":"Secure data transmission in mobile ad hoc networks,\" in Proceedings of the 2nd ACM workshop on Wireless security","author":"Papadimitratos P.","year":"2003","unstructured":"P. Papadimitratos and Z. J. Haas , \" Secure data transmission in mobile ad hoc networks,\" in Proceedings of the 2nd ACM workshop on Wireless security , 2003 , pp. 41 -- 50 . P. Papadimitratos and Z. J. Haas, \"Secure data transmission in mobile ad hoc networks,\" in Proceedings of the 2nd ACM workshop on Wireless security, 2003, pp. 41--50."},{"key":"e_1_3_2_1_42_1","volume-title":"Rabat","author":"Benjbara C.","year":"2017","unstructured":"C. Benjbara , A. Habbani , F. E. Mahdi , and B. Essaid , \" Multi-path routing protocol in the smart digital environment,\" presented at the Proceedings of the 2017 International Conference on Smart Digital Environment , Rabat , Morocco , 2017 . C. Benjbara, A. Habbani, F. E. Mahdi, and B. Essaid, \"Multi-path routing protocol in the smart digital environment,\" presented at the Proceedings of the 2017 International Conference on Smart Digital Environment, Rabat, Morocco, 2017."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/NGNS.2014.6990231"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"S. Hamma E. Cizeron H. Issaka and J.-P. Gu\u00e9don \"Performance evaluation of reactive and proactive routing protocol in IEEE 802.11 ad hoc network \" in Optics East 2006 2006 p. 10.  S. Hamma E. Cizeron H. Issaka and J.-P. Gu\u00e9don \"Performance evaluation of reactive and proactive routing protocol in IEEE 802.11 ad hoc network \" in Optics East 2006 2006 p. 10.","DOI":"10.1117\/12.686251"},{"key":"e_1_3_2_1_45_1","volume-title":"Reactive and Hybrid Routing Protocols for MANET in Multiple CBR Scenario,\" www.ijcst.com","author":"J. V, S. K R, M.","year":"2015","unstructured":"J. V, S. K R, M. N M, and D. T , \" Performance Study of Proactive , Reactive and Hybrid Routing Protocols for MANET in Multiple CBR Scenario,\" www.ijcst.com , vol. 6 , 2015 . J. V, S. K R, M. N M, and D. T, \"Performance Study of Proactive, Reactive and Hybrid Routing Protocols for MANET in Multiple CBR Scenario,\" www.ijcst.com, vol. 6, 2015."},{"key":"e_1_3_2_1_46_1","volume-title":"Rabat","author":"Souidi M.","year":"2017","unstructured":"M. Souidi , A. Habbani , H. Berradi , and B. Essaid , \" Node localization to optimize the MPR selection in smart mobile communication,\" presented at the Proceedings of the 2017 International Conference on Smart Digital Environment , Rabat , Morocco , 2017 . M. Souidi, A. Habbani, H. Berradi, and B. Essaid, \"Node localization to optimize the MPR selection in smart mobile communication,\" presented at the Proceedings of the 2017 International Conference on Smart Digital Environment, Rabat, Morocco, 2017."},{"key":"e_1_3_2_1_47_1","volume-title":"Geographic forwarding rules to reduce broadcast redundancy in mobile ad hoc wireless networks","author":"Souidi M.","year":"2018","unstructured":"M. Souidi , A. Habbani , B. Halim , and F. El Mahdi , Geographic forwarding rules to reduce broadcast redundancy in mobile ad hoc wireless networks , 2018 . M. Souidi, A. Habbani, B. Halim, and F. El Mahdi, Geographic forwarding rules to reduce broadcast redundancy in mobile ad hoc wireless networks, 2018."},{"key":"e_1_3_2_1_48_1","first-page":"2235","volume-title":"Simulation and Performance Analysis of MP-OLSR for Mobile Ad Hoc Networks,\" in 2008 IEEE Wireless Communications and Networking Conference","author":"Yi J.","year":"2008","unstructured":"J. Yi , E. Cizeron , S. Hamma , and B. Parrein , \" Simulation and Performance Analysis of MP-OLSR for Mobile Ad Hoc Networks,\" in 2008 IEEE Wireless Communications and Networking Conference , 2008 , pp. 2235 -- 2240 . J. Yi, E. Cizeron, S. Hamma, and B. Parrein, \"Simulation and Performance Analysis of MP-OLSR for Mobile Ad Hoc Networks,\" in 2008 IEEE Wireless Communications and Networking Conference, 2008, pp. 2235--2240."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.14738\/tmlai.54.2979"},{"key":"e_1_3_2_1_50_1","volume-title":"USA","author":"Couto D. S. J. D.","year":"2003","unstructured":"D. S. J. D. Couto , D. Aguayo , J. Bicket , and R. Morris , \" A high-throughput path metric for multi-hop wireless routing,\" presented at the Proceedings of the 9th annual international conference on Mobile computing and networking, San Diego, CA , USA , 2003 . D. S. J. D. Couto, D. Aguayo, J. Bicket, and R. Morris, \"A high-throughput path metric for multi-hop wireless routing,\" presented at the Proceedings of the 9th annual international conference on Mobile computing and networking, San Diego, CA, USA, 2003."},{"key":"e_1_3_2_1_51_1","first-page":"201","article-title":"OLSR-RAIP5: optimized link state routing with redundant array of independent paths 5","volume":"2015","author":"Echchaachoui A.","year":"2016","unstructured":"A. Echchaachoui , F. Elmahdi , and M. Elkoutbi , \" OLSR-RAIP5: optimized link state routing with redundant array of independent paths 5 ,\" in Proceedings of the Mediterranean Conference on Information & Communication Technologies 2015 , 2016 , pp. 201 -- 210 . A. Echchaachoui, F. Elmahdi, and M. Elkoutbi, \"OLSR-RAIP5: optimized link state routing with redundant array of independent paths 5,\" in Proceedings of the Mediterranean Conference on Information & Communication Technologies 2015, 2016, pp. 201--210.","journal-title":"Proceedings of the Mediterranean Conference on Information & Communication Technologies"}],"event":{"name":"SCA2019: The Fourth International Conference on Smart City Applications","acronym":"SCA2019","location":"Casablanca Morocco"},"container-title":["Proceedings of the 4th International Conference on Smart City Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368756.3369018","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368756.3369018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:27Z","timestamp":1750202607000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368756.3369018"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"references-count":51,"alternative-id":["10.1145\/3368756.3369018","10.1145\/3368756"],"URL":"https:\/\/doi.org\/10.1145\/3368756.3369018","relation":{},"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2019-10-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}