{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:20:24Z","timestamp":1773156024075,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/dsn.2005.58","type":"proceedings-article","created":{"date-parts":[[2005,7,27]],"date-time":"2005-07-27T13:52:28Z","timestamp":1122472348000},"page":"612-621","source":"Crossref","is-referenced-by-count":149,"title":["LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks"],"prefix":"10.1109","author":[{"given":"I.","family":"Khalil","sequence":"first","affiliation":[]},{"given":"S.","family":"Bagchi","sequence":"additional","affiliation":[]},{"given":"N.B.","family":"Shroff","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570653"},{"key":"17","year":"2000","journal-title":"Frequently Asked Questions V4 for BAA 01-01"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906874"},{"key":"15","article-title":"Multipoint relaying: An efficent technique for flooding in mobile wireless networks","volume":"rr 3898","author":"qayyum","year":"2000","journal-title":"Technical Report Research Report"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749266"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1145\/948109.948119","article-title":"Establishing pair-wise keys in distributed sensor networks","author":"liu","year":"2003","journal-title":"Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS'03)"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749281"},{"key":"11","article-title":"Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach","author":"zhu","year":"2003","journal-title":"11th IEEE International Conference on Network Protocols (ICNP'03)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986862"},{"key":"20","article-title":"Mitigating byzantine attacks in ad hoc wireless networks","author":"awerbuch","year":"2004","journal-title":"Johns Hopkins University Tech Rep Version 1"},{"key":"22","first-page":"263","article-title":"Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks","author":"liu","year":"2003","journal-title":"Proceedings of the 10th Annual Network and Distributed System Security Symposium (NDSS)"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2003.1209928"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/49.840210"},{"key":"27","year":"0","journal-title":"The network simulator - ns-2"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190336"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/SAINTW.2003.1210190"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"1","article-title":"A secure routing protocol for ad-hoc networks","volume":"um cs 2001 37","author":"dahill","year":"2001","journal-title":"University of Michigan Tech Rep"},{"key":"7","first-page":"1976","article-title":"Packet leashes: A defense against wormhole attacks in wireless networks","author":"hu","year":"2003","journal-title":"Proceedings of the 22nd INFOCOM"},{"key":"6","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"6th ACM MOBICOM"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/49.779925"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/941315.941317"},{"key":"8","article-title":"Using directional antennas to prevent wormhole attacks","author":"hu","year":"2004","journal-title":"Proc Symp Network and Distributed System Security"}],"event":{"name":"2005 International Conference on Dependable Systems and Networks (DSN'05)","location":"Yokohama, Japan"},"container-title":["2005 International Conference on Dependable Systems and Networks (DSN'05)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9904\/31476\/01467835.pdf?arnumber=1467835","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T17:35:53Z","timestamp":1497634553000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1467835\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/dsn.2005.58","relation":{},"subject":[]}}