{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:38Z","timestamp":1750220858054,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,2]]},"DOI":"10.1145\/3368756.3369049","type":"proceedings-article","created":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T13:21:21Z","timestamp":1576675281000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A simulation analysis of MANET's link-spoofing and replay attacks with ns-3"],"prefix":"10.1145","author":[{"given":"Oussama","family":"Sbai","sequence":"first","affiliation":[{"name":"Mohammed 1st University, Oujda, Morocco"}]},{"given":"Mohamed","family":"Elboukhari","sequence":"additional","affiliation":[{"name":"Mohammed 1st University, Oujda, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"issue":"12","key":"e_1_3_2_1_2_1","first-page":"4619","article-title":"M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT","volume":"9","author":"Foschini L.","year":"2011","unstructured":"L. Foschini , Tarik Taleb , A. Corradi , and D. Bottazzi , \" M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT ,\" Clin. Cancer Res. , vol. 9 , no. 12 , pp. 4619 -- 4626 , 2011 . L. Foschini, Tarik Taleb, A. Corradi, and D. Bottazzi, \"M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT,\" Clin. Cancer Res., vol. 9, no. 12, pp. 4619--4626, 2011.","journal-title":"Clin. Cancer Res."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-009-9693-4"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2272099"},{"key":"e_1_3_2_1_5_1","first-page":"13","article-title":"MANET Network in Internet of Things System","author":"Bruzgiene A.","year":"2018","unstructured":"A. Bruzgiene , L. Narbutaite , and T. Adomkus , \" MANET Network in Internet of Things System ,\" Long-Haul Travel Motiv. by Int. Tour. to Penang , vol. i , no. tourism, p. 13 , 2018 . A. Bruzgiene, L. Narbutaite, and T. Adomkus, \"MANET Network in Internet of Things System,\" Long-Haul Travel Motiv. by Int. Tour. to Penang, vol. i, no. tourism, p. 13, 2018.","journal-title":"Long-Haul Travel Motiv. by Int. Tour. to Penang"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2018.00024"},{"key":"e_1_3_2_1_7_1","first-page":"1","volume-title":"A simulation analyse of MANET's RREQ Flooding and HELLO Flooding attacks with ns-3","author":"Sbai O.","year":"2019","unstructured":"O. Sbai and M. Elboukhari , \" A simulation analyse of MANET's RREQ Flooding and HELLO Flooding attacks with ns-3 ,\" pp. 1 -- 5 , 2019 . O. Sbai and M. Elboukhari, \"A simulation analyse of MANET's RREQ Flooding and HELLO Flooding attacks with ns-3,\" pp. 1--5, 2019."},{"key":"e_1_3_2_1_8_1","first-page":"612","article-title":"Simulation of MANET's Single and Multiple Blackhole Attack with NS-3","volume":"2018","author":"Sbai O.","year":"2018","unstructured":"O. Sbai and M. Elboukhari , \" Simulation of MANET's Single and Multiple Blackhole Attack with NS-3 ,\" Colloq. Inf. Sci. Technol. Cist , vol. 2018 -October, pp. 612 -- 617 , 2018 . O. Sbai and M. Elboukhari, \"Simulation of MANET's Single and Multiple Blackhole Attack with NS-3,\" Colloq. Inf. Sci. Technol. Cist, vol. 2018-October, pp. 612--617, 2018.","journal-title":"Colloq. Inf. Sci. Technol. Cist"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.016"},{"key":"e_1_3_2_1_10_1","first-page":"1","volume-title":"Optimized Link State Routing Protocol (OLSR)","author":"Clausen T.","year":"2003","unstructured":"T. Clausen and P. Jacquet , \" Optimized Link State Routing Protocol (OLSR) ,\" pp. 1 -- 75 , 2003 . T. Clausen and P. Jacquet, \"Optimized Link State Routing Protocol (OLSR),\" pp. 1--75, 2003."},{"key":"e_1_3_2_1_11_1","first-page":"216","volume-title":"LCN","author":"Jeon Y.","year":"2012","unstructured":"Y. Jeon , T. H. Kim , Y. Kim , and J. Kim , \" LT-OLSR: Attack-tolerant OLSR against link spoofing,\" Proc. - Conf. Local Comput. Networks , LCN , pp. 216 -- 219 , 2012 . Y. Jeon, T. H. Kim, Y. Kim, and J. Kim, \"LT-OLSR: Attack-tolerant OLSR against link spoofing,\" Proc. - Conf. Local Comput. Networks, LCN, pp. 216--219, 2012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"V. Desai \"Performance Evaluation of OLSR Protocol in MANET under the Influence of Routing Attack \" pp. 138--143 2014.  V. Desai \"Performance Evaluation of OLSR Protocol in MANET under the Influence of Routing Attack \" pp. 138--143 2014.","DOI":"10.1109\/GCWCN.2014.7030865"},{"key":"e_1_3_2_1_13_1","first-page":"618","article-title":"Classification of Mobile Ad Hoc Networks Attacks","volume":"2018","author":"Sbai O.","year":"2018","unstructured":"O. Sbai and M. Elboukhari , \" Classification of Mobile Ad Hoc Networks Attacks ,\" Colloq. Inf. Sci. Technol. Cist , vol. 2018 -Octob, pp. 618 -- 624 , 2018 . O. Sbai and M. Elboukhari, \"Classification of Mobile Ad Hoc Networks Attacks,\" Colloq. Inf. Sci. Technol. Cist, vol. 2018-Octob, pp. 618--624, 2018.","journal-title":"Colloq. Inf. Sci. Technol. Cist"},{"key":"e_1_3_2_1_14_1","unstructured":"S. Kristiansen \"Ns-3 Tutorial \" 2010.  S. Kristiansen \"Ns-3 Tutorial \" 2010."},{"volume-title":"A Two Dimensional Performance Analysis of Mobility Models for MANETs and VANETs","author":"Nisar M. A.","key":"e_1_3_2_1_15_1","unstructured":"M. A. Nisar , A. Mehmood , A. Nadeem , K. Ahsan , and M. Sarim , \" A Two Dimensional Performance Analysis of Mobility Models for MANETs and VANETs ,\" vol. 3 , no. 5, pp. 94--103, 2014. M. A. Nisar, A. Mehmood, A. Nadeem, K. Ahsan, and M. Sarim, \"A Two Dimensional Performance Analysis of Mobility Models for MANETs and VANETs,\" vol. 3, no. 5, pp. 94--103, 2014."},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"March","author":"Paper T. W.","year":"2014","unstructured":"T. W. Paper , \"802.11ac : The Fifth Generation of Wi-Fi,\" no . March , pp. 1 -- 25 , 2014 . T. W. Paper, \"802.11ac: The Fifth Generation of Wi-Fi,\" no. March, pp. 1--25, 2014."}],"event":{"name":"SCA2019: The Fourth International Conference on Smart City Applications","acronym":"SCA2019","location":"Casablanca Morocco"},"container-title":["Proceedings of the 4th International Conference on Smart City Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368756.3369049","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368756.3369049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:27Z","timestamp":1750202607000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368756.3369049"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"references-count":16,"alternative-id":["10.1145\/3368756.3369049","10.1145\/3368756"],"URL":"https:\/\/doi.org\/10.1145\/3368756.3369049","relation":{},"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2019-10-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}