{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:20:24Z","timestamp":1743124824156,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_76","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T15:09:45Z","timestamp":1414768185000},"page":"687-695","source":"Crossref","is-referenced-by-count":0,"title":["Key Management with Improved Location Aided Cluster Based Routing Protocol in MANETs"],"prefix":"10.1007","author":[{"given":"Yogita","family":"Wankhade","sequence":"first","affiliation":[]},{"given":"Vidya","family":"Dhamdhere","sequence":"additional","affiliation":[]},{"given":"Pankaj","family":"Vidhate","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"76_CR1","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1109\/49.779920","volume":"17","author":"A. Iwata","year":"1999","unstructured":"Iwata, A., Chiang, C., Pei, G., Gerla, M., Chen, T.: Scalable routing strategies for ad hoc wireless networks. IEEE J. Select Areas Communication\u00a017(8), 1369\u20131379 (1999)","journal-title":"IEEE J. Select Areas Communication"},{"key":"76_CR2","doi-asserted-by":"crossref","unstructured":"Mangai, S.V., Tamilarasi, A.: A new approach to geographic routing for location aided cluster based MANETs. EURASIP Journal on Wireless Communications and Networking (2011)","DOI":"10.1186\/1687-1499-2011-18"},{"key":"76_CR3","unstructured":"Brutch, P., Ko, C.: Challenges in Intrusion Detection for Ad Hoc Networks. In: IEEE Workshop on Security and Assurance in Ad hoc Networks, Orlando, FL, January 28 (2003)"},{"key":"76_CR4","unstructured":"Wrona, K.: Distributed Security: Ad Hoc Networks & Beyond. In: PAMPAS Workshop, London, September 16-17 (2002)"},{"key":"76_CR5","unstructured":"Sterne, D., et al.: A General Cooperative Intrusion Detection Architecture for MANETs. In: Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), pp. 57\u201370 (March 2005)"},{"key":"76_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad Hoc Networks. In: Proc of the 6th International Conference on Mobile Computing and Network (MobiCom), pp. 275\u2013283 (2000)","DOI":"10.1145\/345910.345958"},{"key":"76_CR7","unstructured":"Albers, P., Camp, O., Percher, J., Jouga, B., Me, L., Puttini, R.: Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. In: Proceedings of the 1st International Workshop on Wireless Information Systems (WIS 2002), pp. 1\u201312 (April 2002)"},{"key":"76_CR8","unstructured":"Albers, P., Camp, O., Percher, J.M., Jouga, B., Puttini, R.: Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches. In: Proceedings of the First International Workshop on Wireless Information Systems, WIS 2002 (2002)"},{"key":"76_CR9","doi-asserted-by":"crossref","unstructured":"Kachirski, O., Guha, R.: Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks. In: Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS 2003). IEEE (2003)","DOI":"10.1109\/HICSS.2003.1173873"},{"key":"76_CR10","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1109\/KMN.2002.1115178","volume-title":"Proceedings of the IEEE Workshop on Knowledge Media Networking","author":"O. Kachirski","year":"2002","unstructured":"Kachirski, O., Guha, R.: Intrusion detection using mobile agents in wireless ad hoc networks. In: Proceedings of the IEEE Workshop on Knowledge Media Networking, pp. 153\u2013158. IEEE Computer Society, Washington, DC (2002)"},{"key":"76_CR11","unstructured":"Sun, B., Wu, K., et al.: Zone-Based Intrusion Detection System for Mobile Ad Hoc Networks. International Journal of Ad Hoc and Sensors Wireless Network (2003)"},{"key":"76_CR12","unstructured":"Huang, Y., Fan, W., et al.: Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. In: Proc of 23rd IEEE International Conference on Distributed Computing System (ICDCS), pp. 478\u2013487 (2003)"},{"key":"76_CR13","doi-asserted-by":"crossref","unstructured":"Huang, Y., Lee, W.: A Cooperative Intrusion Detection System for Ad Hoc Networks. In: Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2003), pp. 135\u2013147 (October 2003)","DOI":"10.1145\/986858.986877"},{"key":"76_CR14","doi-asserted-by":"crossref","unstructured":"Tseng, C.-Y., Balasubramayan, P., et al.: A Specification-Based Intrusion Detection System for AODV. In: Proc of the ACM Workshop on Secure in Ad Hoc and Sensor Network, SASN (2003)","DOI":"10.1145\/986858.986876"},{"key":"76_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/11856214_13","volume-title":"Recent Advances in Intrusion Detection","author":"C.H. Tseng","year":"2006","unstructured":"Tseng, C.H., Wang, S.-H., Ko, C., Levitt, K.N.: DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol.\u00a04219, pp. 249\u2013271. Springer, Heidelberg (2006)"},{"key":"76_CR16","unstructured":"Choon, O.T.: Grid-based intrusion detection system. IEEE (2003)"},{"key":"76_CR17","doi-asserted-by":"crossref","unstructured":"Guha, R., Kachirski, O., et al.: Case-Based Agents for Packet-Level Intrusion Detection in Ad Hoc Networks. In: Proc. of 17th International Symposium on Computer & Info Science, pp. 315\u2013230 (2002)","DOI":"10.1201\/9780429332821-72"},{"key":"76_CR18","unstructured":"Smith, A.B.: An Examination of Intrusion Detection Architecture for Wireless Ad Hoc Networks. In: Proceeding of 5th National Colloquium for Information Systems Security Education (2001)"},{"key":"76_CR19","doi-asserted-by":"crossref","unstructured":"Sterne, D., Lawler, G.: A dynamic intrusion detection hierarchy for MANETs. In: Proceedings of the 32nd international conference on Sarnoff Symposium, SARNOFF 2009. IEEE Press, Piscataway (2009)","DOI":"10.1109\/SARNOF.2009.4850381"},{"key":"76_CR20","doi-asserted-by":"crossref","unstructured":"Nakkeeran, R., Albert, T.A., Ezumalai, R.: Agent Based Efficient Anomaly Intrusion Detection System in Ad hoc networks. IACSIT International Journal of Engineering and Technology\u00a02 (February 2010)","DOI":"10.7763\/IJET.2010.V2.99"},{"key":"76_CR21","unstructured":"Schulter, A., Reis, J.A., Koch, F., Westphall, C.B.: A Grid-based Intrusion Detection System. In: Proceedings of the International Conference on Networking, International Conference on Systems. IEEE Computer Society (2006)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_76","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T14:51:27Z","timestamp":1676904687000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_76"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_76","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}