{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T05:58:20Z","timestamp":1768283900693,"version":"3.49.0"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,11,29]],"date-time":"2016-11-29T00:00:00Z","timestamp":1480377600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0776-0","type":"journal-article","created":{"date-parts":[[2016,11,29]],"date-time":"2016-11-29T00:48:49Z","timestamp":1480380529000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["Detection of wormhole attacks on IPv6 mobility-based wireless sensor network"],"prefix":"10.1186","volume":"2016","author":[{"given":"Gu-Hsin","family":"Lai","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,29]]},"reference":[{"key":"776_CR1","doi-asserted-by":"crossref","unstructured":"M Ali, T Suleman, ZA Uzmi. \u201cMMAC: A mobility-adaptive, collision-free mac protocol for wireless sensor networks,\u201d in Performance, Computing, and Communications Conference, 2005. IPCCC 2005. (24th IEEE International, Phoenix, 2005), pp. 401-407","DOI":"10.1109\/PCCC.2005.1460597"},{"key":"776_CR2","unstructured":"L Hu, D Evans. \u201cUsing Directional Antennas to Prevent Wormhole Attacks,\u201d in NDSS, (San Diego, 2004)"},{"key":"776_CR3","doi-asserted-by":"publisher","unstructured":"Y-C Hu, A Perrig, DB Johnson. \u201cPacket leashes: a defense against wormhole attacks in wireless networks,\u201d in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. (IEEE Societies, San Francisco, 2003), pp. 1976-1986","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"776_CR4","first-page":"370","volume":"24","author":"Y-C Hu","year":"2006","unstructured":"Y-C Hu, A Perrig, DB Johnson, \u201cWormhole attacks in wireless networks,\u201d Selected Areas in Communications. IEEE J 24, 370\u2013380 (2006)","journal-title":"IEEE J"},{"key":"776_CR5","first-page":"2","volume":"59","author":"T Tsvetkov","year":"2011","unstructured":"T Tsvetkov, RPL: IPv6 routing protocol for low power and lossy networks. Sens Nodes Oper Netw Appl 59, 2 (2011)","journal-title":"Sens Nodes Oper Netw Appl"},{"key":"776_CR6","unstructured":"T Winter, \u201cRPL: IPv6 routing protocol for low-power and lossy networks\u201c. 2012"},{"key":"776_CR7","doi-asserted-by":"crossref","unstructured":"L Wallgren, S Raza, T Voigt. \u201cRouting Attacks and Countermeasures in the RPL-based Internet of Things,\u201d International Journal of Distributed Sensor Networks, vol. 2013, 2013. http:\/\/dsn.sagepub.com\/content\/9\/8\/794326.full","DOI":"10.1155\/2013\/794326"},{"key":"776_CR8","volume-title":"Security Considerations in the IP-based Internet of Things","author":"O Garcia-Morchon","year":"2013","unstructured":"O Garcia-Morchon, S Kumar, R Struik, S Keoh, R Hummen, Security Considerations in the IP-based Internet of Things, 2013"},{"key":"776_CR9","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1016\/j.adhoc.2007.02.001","volume":"6","author":"I Khalil","year":"2008","unstructured":"I Khalil, S Bagchi, NB Shroff, MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Netw 6, 344\u2013362 (2008)","journal-title":"Ad Hoc Netw"},{"key":"776_CR10","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s11276-006-3723-x","volume":"13","author":"R Poovendran","year":"2007","unstructured":"R Poovendran, L Lazos, A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Netw 13, 27\u201359 (2007)","journal-title":"Wireless Netw"},{"key":"776_CR11","doi-asserted-by":"publisher","unstructured":"K Sanzgiri, B Dahill, BN Levine, C Shields, EMB Royer. \u201cA secure routing protocol for ad hoc networks,\u201d in Network Protocols, 2002. Proceedings. 10th IEEE International Conference on, Paris, 2002, pp. 78-87","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"776_CR12","first-page":"193","volume-title":"Secure Routing for Mobile Ad Hoc Networks","author":"P Papadimitratos","year":"2002","unstructured":"P Papadimitratos, ZJ Haas, Secure Routing for Mobile Ad Hoc Networks (the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, 2002), pp. 193\u2013204"},{"key":"776_CR13","doi-asserted-by":"publisher","unstructured":"I Khalil, S Bagchi, NB Shroff. \u201cLITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks,\u201d in Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on, Yokohama, 2005, pp. 612-621","DOI":"10.1109\/DSN.2005.58"},{"key":"776_CR14","doi-asserted-by":"publisher","unstructured":"S Choi, D-y Kim, D-h Lee, J-i Jung. \u201cWAP: Wormhole attack prevention algorithm in mobile ad hoc networks,\u201d in Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC\u201908. (IEEE International Conference, Taichung, 2008), pp. 343-348","DOI":"10.1109\/SUTC.2008.49"},{"key":"776_CR15","unstructured":"Wikipedia contributors. (3 February 2016 16:09 UTC). ZigBee. Available: https:\/\/en.wikipedia.org\/w\/index.php?title=ZigBee&oldid=702729380 . Accessed 23 Feb 2016"},{"key":"776_CR16","unstructured":"ZigBee. (2015). The ZigBee Alliance. Available: http:\/\/www.zigbee.org\/ . Accessed 23 Feb 2016"},{"key":"776_CR17","doi-asserted-by":"publisher","unstructured":"FI Khan, T Shon, T Lee, K Kim. \u201cWormhole attack prevention mechanism for RPL based LLN network,\u201d in Ubiquitous and Future Networks (ICUFN), 2013 Fifth International Conference on, Da Nang, 2013, pp. 149-154","DOI":"10.1109\/ICUFN.2013.6614801"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0776-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0776-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0776-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T22:25:11Z","timestamp":1749767111000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0776-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,29]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["776"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0776-0","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,29]]},"article-number":"274"}}