{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:38:13Z","timestamp":1730252293757,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1109\/icnsc.2012.6204903","type":"proceedings-article","created":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T14:52:12Z","timestamp":1338562332000},"page":"122-126","source":"Crossref","is-referenced-by-count":2,"title":["Wormhole attack prevention using clustering and digital signatures in reactive routing"],"prefix":"10.1109","author":[{"given":"Amarjit","family":"Malhotra","sequence":"first","affiliation":[]},{"given":"Deepti","family":"Bhardwaj","sequence":"additional","affiliation":[]},{"given":"Ankush","family":"Garg","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Ad hoc network specific attacks","year":"0","author":"burg","key":"15"},{"journal-title":"A Self-Organizing Approach to MANET Clustering","year":"0","author":"chatterjee","key":"13"},{"journal-title":"Demand-Driven Clustering in MANETs","year":"0","author":"cramer","key":"14"},{"journal-title":"The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4","year":"2007","author":"maltz","key":"11"},{"journal-title":"Ad Hoc On-Demand Distance Vector (AODV) Routing Draft-ietf-manet-aodv-03","year":"0","author":"perkins","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT.2010.5640416"},{"key":"2","article-title":"Packet leashes: A defense against wormhole attacks in wireless networks","author":"hu","year":"2003","journal-title":"IEEE INFOCOM"},{"journal-title":"Ad Hoc Mobile Wireless Networks Protocols and Systems","year":"0","author":"toh","key":"1"},{"key":"10","first-page":"188","article-title":"Detecting and evading wormholes in mobile ad-hoc wireless networks","volume":"3","author":"pirzada","year":"2006","journal-title":"International Journal of Security and Networks"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ISA.2008.44"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/IRANIANCEE.2010.5507050"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/WIMESH.2006.288607"},{"journal-title":"2008 IEEE International Conference on Sensor Networks Ubiquitous and Trustworthy Computing","year":"0","author":"choi","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986862"},{"key":"8","first-page":"140","article-title":"Preventing replay attacks for secure routing in ad hoc networks","volume":"2865","author":"zhen","year":"2003","journal-title":"LNCS"}],"event":{"name":"2012 9th IEEE International Conference on Networking, Sensing and Control (ICNSC)","start":{"date-parts":[[2012,4,11]]},"location":"Beijing, China","end":{"date-parts":[[2012,4,14]]}},"container-title":["Proceedings of 2012 9th IEEE International Conference on Networking, Sensing and Control"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6201003\/6204880\/06204903.pdf?arnumber=6204903","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T10:45:01Z","timestamp":1490093101000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6204903\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icnsc.2012.6204903","relation":{},"subject":[],"published":{"date-parts":[[2012,4]]}}}