{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T14:53:00Z","timestamp":1725634380653},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.23919\/iconac.2018.8748982","type":"proceedings-article","created":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T22:15:49Z","timestamp":1562278549000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["A Novel Authentication and Security Protocol for Wireless Adhoc Networks"],"prefix":"10.23919","author":[{"given":"Umair","family":"Amin","sequence":"first","affiliation":[]},{"given":"Munam Ali","family":"Shah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","author":"varalatchoumy","journal-title":"Detecting Malicious Beacon Nodes for Secure Localization in Distributed Wireless Networks","key":"ref10"},{"year":"0","author":"kumar","journal-title":"Ramesh Poonia Routing Protocols and Security Issues in MANets","key":"ref11"},{"year":"0","author":"waraich","journal-title":"Prevention of denial of service attack over vehicle ad hoc networks using quick response table","key":"ref12"},{"year":"0","author":"usmani","journal-title":"A survey on secure gateway discovery in MANET","key":"ref13"},{"year":"0","author":"soni","journal-title":"Security assessment of routing protocols in Mobile Adhoc Networks","key":"ref14"},{"year":"0","author":"mangrulkar","journal-title":"Trust Based Secured Adhoc on Demand Distance Vector Routing Protocol for Mobile Adhoc Networks","key":"ref4"},{"year":"0","author":"stoleru","journal-title":"Secure Neighbor Discovery in Mobile Ad Hoc Networks","key":"ref3"},{"year":"0","author":"govindan","journal-title":"Trust Computations and Trust Dynamics in Mobile Adhoc Networks A Survey","key":"ref6"},{"year":"0","author":"li","journal-title":"Ouantum Communication in Distributed Wireless Sensor Networks","key":"ref5"},{"year":"0","author":"nagrath","journal-title":"Wormhole Attacks in Wireless Adhoc Networks and Their Counter Measurements A Survey","key":"ref8"},{"year":"0","author":"fulare","journal-title":"Efficient Sensor Node Authentication inWireless Integrated Sensor Networks Using Virtual Certificate Authority","key":"ref7"},{"year":"0","author":"vijendran","journal-title":"Gripsy Enhanced Secure Multipath Routing Scheme in Mobile Adhoc and Sensor Networks","key":"ref2"},{"key":"ref1","article-title":"A Novel Symmetric Key Cryptographic Authentication for Cooperative Communication in Cognitive Radio Networks","author":"shah","year":"2013","journal-title":"Automation and Computing (ICAC) 2013 19th International Conference on"},{"year":"0","author":"shim","journal-title":"A Physical layer Security-based Routing Protocol in MANets","key":"ref9"}],"event":{"name":"2018 24th International Conference on Automation and Computing (ICAC)","start":{"date-parts":[[2018,9,6]]},"location":"Newcastle upon Tyne, United Kingdom","end":{"date-parts":[[2018,9,7]]}},"container-title":["2018 24th International Conference on Automation and Computing (ICAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8742895\/8748945\/08748982.pdf?arnumber=8748982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T09:31:42Z","timestamp":1643275902000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8748982\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":14,"URL":"https:\/\/doi.org\/10.23919\/iconac.2018.8748982","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}