{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T11:40:26Z","timestamp":1741347626646,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227257"},{"type":"electronic","value":"9783642227264"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22726-4_16","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T16:11:49Z","timestamp":1311610309000},"page":"145-154","source":"Crossref","is-referenced-by-count":4,"title":["Anonymous and Secured Communication Using OLSR in MANET"],"prefix":"10.1007","author":[{"given":"A. A. Arifa","family":"Azeez","sequence":"first","affiliation":[]},{"given":"Elizabeth","family":"Isaac","sequence":"additional","affiliation":[]},{"given":"Sabu M.","family":"Thampi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Chandee, R.S.M.S., Mishra3, D.K.: Security Issues in MANET:overview. In: Proceedings od Seventh International Conference on Wireless and Optical Communication Networks, pp. 1\u20134 (September 2010)","DOI":"10.1109\/WOCN.2010.5587317"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Khurri, A., Kuptsov, D., Gurtov, A.: On Application of Host Identity Protocolin Wireless Sensor Networks. In: Proceedings of Seventh International Conference on Mobile Addhoc and Network Systems, pp. 345\u2013358 ( May 2010)","DOI":"10.1109\/MASS.2010.5663902"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Kumari, E.H.J., Kannammal, A.: Privacy and security on anonymous routing protocols in manet. In: 2nd International Conference on Computer and Electrical Engineering, Dubai, pp. 433\u2013435 (December 2009)","DOI":"10.1109\/ICCEE.2009.147"},{"issue":"3","key":"16_CR4","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MSP.2004.1","volume":"2","author":"Y.-C. Hu","year":"2004","unstructured":"Hu, Y.-C., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Security and Privacy 2(3), 28\u201339 (2004)","journal-title":"IEEE Security and Privacy"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"N\u0107cher, M., Calafate, C.T., Cano, J.-C., Manzoni, P.: Anonymous routing protocols: impact on performance in MANETs. In: Proceedings of IEEE International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems, Moscot, pp. 1\u20133","DOI":"10.1109\/MASCOT.2009.5366143"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Panaousis, E.A., Drew, G., Millar, G.P., Ramrekha, T.A., Politis, C.: A Test-Bed Implementation For Securingolsr In Mobile AD-HOC Networks. International Journal of Network Security and Its Applications (IJNSA)\u00a02, 143 (2010)","DOI":"10.5121\/ijnsa.2010.2412"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Hiyama, M., Ikeda, M., Barolli, L., Kulla, E., Xhafa, F., Durresi, A.: Experimental Evaluation of a MANET Testbed in Indoor Stairs Scenarios. In: Proceedings of International Conference on Broadband, Wireless Computing, Communication and Applications, p. 678 (2010), issued in IEEE transactions","DOI":"10.1109\/BWCCA.2010.154"},{"key":"16_CR8","unstructured":"Ali, S., Ali, A.: Performance Analysis of AODV, DSR and OLSR in MANET. In: Proceedings on Seventh International Conference on Wireless Systems, p. 34 (2009), IEEE transactions"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Tehrani, A.H., Shahnasser, H.: Anonymous Communication in MANETs, Solutions and Challenges (2010), issued in IEEE transactions","DOI":"10.1109\/ICWITS.2010.5612268"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N.: SA-OLSR: Security Aware Optimized Link State Routing for Mobile Ad Hoc Networks. In: Proceedings of International Conference on Communication Security, vol.\u00a01, pp. 1464\u20131468 (2008), IEEE transaction","DOI":"10.1109\/ICC.2008.283"},{"key":"16_CR11","unstructured":"t-Abdesselam1, F.N., Bensaou2, B., Yoo1, J.: Detecting and Avoiding Wormhole Attacks in Optimized Link State Routing Protocol. In: Proceedings of International Conference on Dependable Systems and Networks, vol.\u00a046, 127(4) (2007), IEEE Transaction"},{"key":"16_CR12","unstructured":"Tnnesen, A.: Impementing and extending the Optimized Link State Routing Protocol-a report. University graduate centre (August 2004), http:\/\/olsr.org\/docs\/master-pres.pdf,UniK"},{"key":"16_CR13","unstructured":"Gorantala, K.: Routing Protocols in Mobile Ad-hoc Networks, Master\u2019s Thesis in Computing Science, Sweden (2006)"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Clausen, T., Jacquet, P.: Optimised link state routing protocol-report. Network working group, projrct Hipercom, INRIA (October 2003)","DOI":"10.17487\/rfc3626"},{"key":"16_CR15","unstructured":"Roost, L.J., Toft, P.N., Haraldsson, G.: The Host Identity Protocol-Experimental evaluation. Communication Networks (2005)"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Karvonen, K.: komu, M., kurtov, A.: Usable security management with Host Identity Protocol. IEEE Transactions (2009)","DOI":"10.1109\/AICCSA.2009.5069337"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22726-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T10:59:58Z","timestamp":1741345198000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22726-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227257","9783642227264"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22726-4_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}