{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:13:54Z","timestamp":1725808434751},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_75","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T15:09:45Z","timestamp":1414768185000},"page":"673-686","source":"Crossref","is-referenced-by-count":0,"title":["Secure Efficient Routing against Packet Dropping Attacks in Wireless Mesh Networks"],"prefix":"10.1007","author":[{"given":"T. M.","family":"Navamani","sequence":"first","affiliation":[]},{"given":"P.","family":"Yogesh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"75_CR1","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1016\/j.comnet.2004.12.001","volume":"47","author":"X. Akyildiz","year":"2005","unstructured":"Akyildiz, X.: Wang, and W. Wang.: Wireless mesh Networks: A survey. Computer Networks\u00a047, 445\u2013487 (2005)","journal-title":"Computer Networks"},{"issue":"2","key":"75_CR2","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1109\/SURV.2011.042711.00007","volume":"14","author":"D. Benyamina","year":"2011","unstructured":"Benyamina, D., Hafid, A., Gendreau, M.: Wireless Mesh Networks Design a Survey. IEEE Communications Surveys & Tutorials\u00a014(2), 299\u2013310 (2011)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"75_CR3","unstructured":"Ajmal, M.M., Mahmood, K., Madani, S.A.: Efficient Routing in Wireless Mesh Networks by Enhanced AODV. In: International Conference on Information And Emerging Technologies (ICIET), pp. 1\u20137 (June 2010)"},{"key":"75_CR4","doi-asserted-by":"crossref","unstructured":"Shila, D.M., Cheng, Y., Anjali: Mitigating Selective Forwarding Attacks With a Channel-Aware Approach In WMNS. In: IEEE International Conference on Wireless Communications, vol.\u00a09(5), pp. 1661\u20131675 (May 2010)","DOI":"10.1109\/TWC.2010.05.090700"},{"key":"75_CR5","doi-asserted-by":"crossref","unstructured":"Glass, S.M., Muthukkumarasamy, V., Portmann, M.: Detecting Man-In-The-Middle And Wormhole Attacks in Wireless Mesh Networks. In: IEEE International Conference on Advanced Information Networking and Applications, pp. 530\u2013538 (May 2009)","DOI":"10.1109\/AINA.2009.131"},{"issue":"3","key":"75_CR6","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1109\/TDSC.2008.71","volume":"7","author":"F. Xing","year":"2010","unstructured":"Xing, F., Wang, W.: On The Survivability of Wireless Adhoc Networks With Node Misbehaviours and Failures. IEEE Transactions on Dependable and Secure Computing\u00a07(3), 284\u2013299 (2010)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"75_CR7","doi-asserted-by":"crossref","unstructured":"Shila, D.M., Cheng, Y., Anjali: Channel-Aware Detection of GrayHole Attacks in Wireless Mesh Networks. In: IEEE International Conference on Global Telecommunications, pp. 1\u20136 (December 2009)","DOI":"10.1109\/GLOCOM.2009.5425712"},{"key":"75_CR8","unstructured":"Lee, S.J., Gerla, M.: Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks. In: IEEE International Conference on Communication (ICC 2001), pp. 3201\u20133205 (2001)"},{"key":"75_CR9","doi-asserted-by":"crossref","unstructured":"Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C., Rubens, H.: ODSBR: An On-Demand Secure Byzantine Resilient Routing Protocol for Wireless Ad Hoc Networks. ACM Transactions on Information and System Security\u00a010(4) (2008)","DOI":"10.1145\/1284680.1341892"},{"key":"75_CR10","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In: IEEE INFOCOM, pp. 1976\u20131986 (December 2003)"},{"issue":"8","key":"75_CR11","doi-asserted-by":"publisher","first-page":"1096","DOI":"10.1109\/TMC.2010.249","volume":"10","author":"I. Khalil","year":"2011","unstructured":"Khalil, I., Bagchi, S.: Stealthy Attacks In Wireless AdHoc networks: Detection and Countermeasure. IEEE Transactions on Mobile Computing\u00a010(8), 1096\u20131112 (2011)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"75_CR12","unstructured":"Ramapriya, A., Navamani, T.M.: Defending against Stealthy attacks in Wireless Mesh Networks. In: International Conference on Engineering and Technology (ICET 2K12), April 18-20 (2012)"},{"key":"75_CR13","doi-asserted-by":"crossref","unstructured":"Khalil, I.: MIMI: Mitigating Packet Misrouting in Locally- Monitored Multi-Hop Wireless Ad Hoc Networks. In: IEEE International Conference on Global Telecommunications, pp. 1\u20135 (2008)","DOI":"10.1109\/GLOCOM.2008.ECP.154"},{"key":"75_CR14","doi-asserted-by":"crossref","unstructured":"Mogaibel, H.A., Othman, M.: Review of Routing Protocols and it\u2019s Metrics for Wireless Mesh Routing Protocols, In: IEEE International Association of Computer Science and Information Technology-Spring Conference, IACSITSC 2009 (April 2009)","DOI":"10.1109\/IACSIT-SC.2009.51"},{"issue":"1","key":"75_CR15","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MNET.2008.4435897","volume":"22","author":"M.E.M. Campista","year":"2008","unstructured":"Campista, M.E.M., Esposito, P.M.: Routing Metrics and Protocols for Wireless Mesh Networks. IEEE Network\u00a022(1), 6\u201312 (2008)","journal-title":"IEEE Network"},{"key":"75_CR16","unstructured":"Navamani, T.M., Yogesh, P.: Efficient routing in Wireless Mesh Networks with QoS aware Reconfiguration. In: International Conference on Instrumentation, Communication Control and Automation, ICICAC 2013, Kalasalingam University, January 3-5 (2013)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_75","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,21]],"date-time":"2023-01-21T04:21:07Z","timestamp":1674274867000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_75"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_75","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}