{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T09:35:31Z","timestamp":1777109731045,"version":"3.51.4"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2006,2,1]],"date-time":"2006-02-01T00:00:00Z","timestamp":1138752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Select. Areas Commun."],"published-print":{"date-parts":[[2006,2]]},"DOI":"10.1109\/jsac.2005.861394","type":"journal-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:35:41Z","timestamp":1139240141000},"page":"370-380","source":"Crossref","is-referenced-by-count":353,"title":["Wormhole attacks in wireless networks"],"prefix":"10.1109","volume":"24","author":[{"family":"Yih-Chun Hu","sequence":"first","affiliation":[]},{"given":"A.","family":"Perrig","sequence":"additional","affiliation":[]},{"given":"D.B.","family":"Johnson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.21236\/AD0707853"},{"key":"ref2","volume-title":"Specification sheet for ORiNOCO world PC card, Agere Systems Inc"},{"key":"ref3","volume-title":"ARC releases blueForm, a comprehensive solution for bluetooth systems on a chip, ARC International","year":"2001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749266"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_30"},{"key":"ref7","volume-title":"totally accurate clock FTP site, T. Clark","author":"Clark\u2019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570647"},{"key":"ref9","article-title":"Frequently asked questions v4 for BAA 01\u201301, FCS communications technology","volume-title":"Defense Advanced Research Projects Agency"},{"key":"ref10","first-page":"147","article-title":"Major security problems with the \u201cunforgeable\u201d Feige-Fiat-Shamir proofs of identity and how to overcome them","volume-title":"Proc. 6th Worldwide Comput. Congo. Comput. Commun. Security and Protection","author":"Desmedt"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"ref12","first-page":"1996","article-title":"Lecture Notes on Cryptography","author":"Goldwasser","year":"1999","journal-title":"Summer course \u201cCryptography and computer security\u201d at MIT"},{"key":"ref13","article-title":"Helion Technology Ltd","volume-title":"High performance solutions in silicon\u2014MD5 core"},{"key":"ref14","article-title":"Using directional antennas to prevent wormhole attacks","volume-title":"Proc. Svmp. Netw. Distrib. Svst. Securitv","author":"Hu"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/501416.501437"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"ref17","first-page":"139","article-title":"The dynamic source routing protocol for multihop wireless ad hoc networks","volume-title":"Ad Hoc Networking","author":"Johnson","year":"2001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313558"},{"key":"ref19","article-title":"(1998, Sep.) Symbol Technologies","volume-title":"Inc. automates system-to-gates design flow for wireless LAN ASIC with COSSAP and behavioral compiler","author":"Kawaguchi"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.2002.1017481"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1063\/1.1787942"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2001.992905"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"ref24","first-page":"3","article-title":"A computer-controlled LORAN-C receiver for precision timekeeping","volume-title":"Dept. Elect. Comput. Eng., Univ. Delaware, Newark, DE, Tech. Rep. 92","author":"Mills","year":"1992"},{"key":"ref25","first-page":"8","article-title":"A precision radio clock for WWV transmissions","volume-title":"Dept. Elect. Comput. Eng., Univ. Delaware, Newark, DE, Tech. Rep. 97\u2013","author":"Mills","year":"1997"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190336"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749281"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/secpri.2000.848446"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1982.1095533"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-006-3723-x"},{"key":"ref32","volume-title":"Proxim, Inc. Data sheet for proxim harmony 802.11a cardbus card, Sunnyvale, CA"},{"key":"ref33","article-title":"Multipoint relaying: An efficient technique for flooding in mobile wireless networks","volume-title":"INRIA, Project HIPERCOM, Tech. Rep. Res. Rep. RR-3898","author":"Qayyum","year":"2000"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/NDSS.1997.579223"},{"key":"ref37","volume-title":"Proc. 7th Int. Workshop Security Protocols","author":"Stajano"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/217382.217414"},{"key":"ref39","volume-title":"Trimble Navigation Limited. Data sheet and specifications for trimble thunderbolt GPS disciplined clock, Sunnyvale, CA"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023657"},{"key":"ref41","first-page":"294","volume-title":"deeply networked systems mote documentation and development information, Berkeley, CA","author":"Woo"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/49\/33490\/01589115.pdf?arnumber=1589115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T11:33:11Z","timestamp":1742643191000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1589115\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,2]]},"references-count":42,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jsac.2005.861394","relation":{},"ISSN":["0733-8716"],"issn-type":[{"value":"0733-8716","type":"print"}],"subject":[],"published":{"date-parts":[[2006,2]]}}}