{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:59:19Z","timestamp":1773615559892,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,3,6]],"date-time":"2012-03-06T00:00:00Z","timestamp":1330992000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1186\/1687-1499-2012-89","type":"journal-article","created":{"date-parts":[[2012,3,6]],"date-time":"2012-03-06T15:14:16Z","timestamp":1331046856000},"source":"Crossref","is-referenced-by-count":19,"title":["Mitigating ARP poisoning-based man-in-the-middle attacks in wired or wireless LAN"],"prefix":"10.1186","volume":"2012","author":[{"given":"Seung Yeob","family":"Nam","sequence":"first","affiliation":[]},{"given":"Sirojiddin","family":"Jurayev","sequence":"additional","affiliation":[]},{"given":"Seung-Sik","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Kwonhue","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Gyu Sang","family":"Choi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,3,6]]},"reference":[{"key":"358_CR1","volume-title":"RFC","author":"DC Plummer","year":"1982","unstructured":"Plummer DC: An ethernet address resolution protocol. RFC 1982., 826:"},{"key":"358_CR2","volume-title":"TCP\/IP Illustrated","author":"RW Stevens","year":"2001","unstructured":"Stevens RW: TCP\/IP Illustrated. Volume 1. Addison Wesley, Boston; 2001."},{"key":"358_CR3","volume-title":"Understanding Linux Network Internals","author":"C Benvenuti","year":"2006","unstructured":"Benvenuti C: Understanding Linux Network Internals. O'Reilly, California; 2006."},{"key":"358_CR4","unstructured":"Hacking UNIX 2003: A tutorial for performing various attacks including ARP poisoning attack on UNIX systems.[ http:\/\/duho.cjb.net ]"},{"key":"358_CR5","unstructured":"Whalen S: An introduction to arp spoofing.[ http:\/\/packetstormsecurity.org\/papers\/protocols\/intro_to_arp_spoofing.pdf ]"},{"key":"358_CR6","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/11506157_4","volume-title":"Proc of Australasian Conference on Information Security and Privacy (ACISP)","author":"V Goyal","year":"2005","unstructured":"Goyal V, Tripathy R: An efficient solution to the ARP cache poisoning problem. In Proc of Australasian Conference on Information Security and Privacy (ACISP). Volume 1. Brisbane, Australia; 2005:40-51."},{"key":"358_CR7","unstructured":"Fleck B, Dimov J: Wireless access points and arp poisoning.[ http:\/\/bandwidthco.com\/whitepapers\/netforensics\/arp-rarp\/Wireless%20Access%20Points%20and%20ARP%20Poisoning.pdf ]"},{"key":"358_CR8","volume-title":"Network Security Technologies and Solutions","author":"Y Bhaiji","year":"2008","unstructured":"Bhaiji Y: Network Security Technologies and Solutions. Cisco Press, New York; 2008."},{"key":"358_CR9","first-page":"66","volume-title":"Proc of Annual Computer Security Applications Conference (ACSAC)","author":"D Bruschi","year":"2003","unstructured":"Bruschi D, Ornaghi A, Rosti E: S-ARP: a Secure address resolution protocol. In Proc of Annual Computer Security Applications Conference (ACSAC). Volume 1. Las Vegas, Nevada, USA; 2003:66-74."},{"issue":"15","key":"358_CR10","doi-asserted-by":"publisher","first-page":"4322","DOI":"10.1016\/j.comnet.2007.05.007","volume":"51","author":"W Lootah","year":"2007","unstructured":"Lootah W, Enck W, McDaniel P: TARP: Ticket-based address resolution protocol. Comput Netw 2007, 51(15):4322-4337. 10.1016\/j.comnet.2007.05.007","journal-title":"Comput Netw"},{"key":"358_CR11","unstructured":"Teterin I: Antidote.[ http:\/\/online.securityfocus.com\/archive\/1\/299929 ]"},{"key":"358_CR12","volume-title":"Securing Wireless Networks from ARP Cache Poisoning","author":"R Philip","year":"2007","unstructured":"Philip R: Securing Wireless Networks from ARP Cache Poisoning. Master's Thesis, San Jose State University; 2007."},{"issue":"2","key":"358_CR13","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/LCOMM.2010.02.092108","volume":"14","author":"SY Nam","year":"2010","unstructured":"Nam SY, Kim D, Kim J: Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks. IEEE Commun Lett 2010, 14(2):187-189.","journal-title":"IEEE Commun Lett"},{"issue":"3","key":"358_CR14","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1002\/bltj.2069","volume":"2","author":"A Kamerman","year":"1997","unstructured":"Kamerman A, Monteban L: WaveLAN-II, A high-performance wireless LAN for the unlicensed band. Bell Lab Techn J 1997, 2(3):118-133.","journal-title":"Bell Lab Techn J"},{"key":"358_CR15","first-page":"126","volume-title":"Proc of ACM International Symposium on Modeling, analysis and simulation of wireless and mobile systems (MSWiM'04)","author":"M Lacage","year":"2004","unstructured":"Lacage M, Manshaei MH, Turletti T: IEEE 802.11 rate adaptation: a practical approach. In Proc of ACM International Symposium on Modeling, analysis and simulation of wireless and mobile systems (MSWiM'04). Volume 1. Venice, Italy; 2004:126-134."},{"key":"358_CR16","first-page":"139","volume-title":"Proc of CRYPTO","author":"C Dwork","year":"1992","unstructured":"Dwork C, Naor M: Pricing via processing or combatting junk mail. In Proc of CRYPTO. Volume 1. Santa Barbara, California, USA; 1992:139-147."},{"key":"358_CR17","first-page":"171","volume-title":"Proc of IEEE International Conference on Peer-to-Peer Computing","author":"N Borisov","year":"2006","unstructured":"Borisov N: Computational puzzles as sybil defenses. In Proc of IEEE International Conference on Peer-to-Peer Computing. Volume 1. Cambridge, UK; 2006:171-176."},{"key":"358_CR18","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1145\/1282380.1282413","volume-title":"Proc of SIGCOMM","author":"B Parno","year":"2007","unstructured":"Parno B, Wendlandt D, Shi E, Perrig A, Maggs B, Hu YC: Portcullis: protecting connection setup from denial-of-capability attacks. In Proc of SIGCOMM. Volume 1. Kyoto, Japan; 2007:289-300."},{"issue":"2","key":"358_CR19","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 1978, 21(2):120-126. 10.1145\/359340.359342","journal-title":"Commun ACM"},{"key":"358_CR20","volume-title":"Network Security-Private Communication in a Public World","author":"C Kaufman","year":"2002","unstructured":"Kaufman C, Perlman R, Speciner M: Network Security-Private Communication in a Public World. 2nd edition. Prentice Hall, Upper Saddle River; 2002.","edition":"2"},{"key":"358_CR21","unstructured":"Gratuitous ARP - The Wireshark Wiki[ http:\/\/wiki.wireshark.org\/Gratuitous_ARP ]"},{"key":"358_CR22","first-page":"950","volume-title":"Proc of IEEE Globecom","author":"P Chatzimisios","year":"2003","unstructured":"Chatzimisios P, Boucouvalas AC, Vitsas V: IEEE 802.11 packet delay-a finite retry limit analysis. In Proc of IEEE Globecom. Volume 2. San Francisco, USA; 2003:950-954."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2012-89\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2012-89.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2012-89.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T23:07:41Z","timestamp":1687302461000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2012-89"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,6]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["358"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2012-89","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,3,6]]},"article-number":"89"}}