{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T06:53:48Z","timestamp":1742799228061,"version":"3.28.0"},"reference-count":46,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006,8]]},"DOI":"10.1109\/seccomw.2006.359564","type":"proceedings-article","created":{"date-parts":[[2007,5,30]],"date-time":"2007-05-30T20:33:00Z","timestamp":1180557180000},"page":"1-12","source":"Crossref","is-referenced-by-count":37,"title":["MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks"],"prefix":"10.1109","author":[{"given":"Issa","family":"Khalil","sequence":"first","affiliation":[]},{"given":"Saurabh","family":"Bagchi","sequence":"additional","affiliation":[]},{"given":"Ness B.","family":"Shroff","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Essentials of Probability","year":"1994","author":"durrett","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/1023720.1023726","article-title":"Localization for Mobile Sensor Networks","author":"hu","year":"2004","journal-title":"ACM MOBICOM'04"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424678"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023657"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1023756.1023775"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.36"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1077391.1077395"},{"key":"ref35","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-7091-3297-5","article-title":"Global Positioning System: Theory and Practice","author":"hofmann-wellenhof","year":"1997"},{"key":"ref34","first-page":"609","article-title":"Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks","author":"liu","year":"2005","journal-title":"the 25th International Conference on Distributed Computer Systems (ICDCS'05)"},{"article-title":"ARRIVE: Algorithm for Robust Routing in Volatile Environments","year":"2003","author":"karlof","key":"ref10"},{"key":"ref40","article-title":"LAD: Localization Anomaly Detection for Wireless Sensor Networks","author":"du","year":"2005","journal-title":"Proceedings of the 19thIEEE International Parallel & Distributed Processing Symposium (IPDPS&#x2018;05)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"article-title":"Using Directional Antennas to Prevent Wormhole attacks","year":"0","author":"hu","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.58"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/941315.941317"},{"article-title":"Multipoint Relaying: An Efficent Technique for Flooding in Mobile Wireless Networks","year":"2000","author":"qayyum","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749266"},{"key":"ref19","article-title":"Mitigating Byzantine Attacks in Ad-hoc Wireless Networks","author":"awerbuch","year":"2004","journal-title":"Department of Computer Science"},{"key":"ref28","article-title":"Robust Positioning Algorithms for Distributed Ad-hoc Wireless Sensor Networks","author":"savarese","year":"2002","journal-title":"USENIX Technical Annual Conference"},{"key":"ref4","article-title":"Secure routing for mobile ad-hoc networks","author":"papadimitratos","year":"0","journal-title":"Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002)"},{"article-title":"Location sensing techniques","year":"2001","author":"hightower","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570648"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/509506.509514"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345931"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345920"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570742"},{"key":"ref7","first-page":"304","article-title":"A scalable solution to minimum cost forwarding in large sensor networks","author":"ye","year":"2001","journal-title":"the 10th International Conference on Computer Communications and Networks (ICCCN)"},{"key":"ref2","article-title":"SEAD: Secure efficient distance vector routing for mobile wireless ad-hoc networks","author":"hu","year":"2002","journal-title":"Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190336"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/ICNP.2002.1181388","article-title":"A secure protocol for ad-hoc networks","author":"sanzgiri","year":"2002","journal-title":"the Proceedings of the 10th IEEE International Conference on Network Protocols"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1078\/1434-8411-54100076"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986862"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1109\/GLOCOM.1997.632578","article-title":"Performance analysis of Mac protocols for wireless LAN in Rayleigh and shadow fast fading","volume":"1","author":"kim","year":"1997","journal-title":"IEEE Global Telecommunications Conference (GLOBECOM)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011426611520"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941313"},{"year":"0","key":"ref23","article-title":"The Network Simulator - ns-2"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311950"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986877"},{"key":"ref43","first-page":"185","article-title":"Defending against Sybil Attacks in Sensor Networks","author":"zhang","year":"2005","journal-title":"SDCS'05"},{"key":"ref25","first-page":"47","article-title":"Establishing Trust In Pure Ad-hoc Networks","author":"pirzada","year":"2004","journal-title":"Proceedings of 27th Australasian Computer Science Conference (ACSC'04)"}],"event":{"name":"2006 Securecomm and Workshops","start":{"date-parts":[[2006,8,28]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2006,9,1]]}},"container-title":["2006 Securecomm and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4198788\/4198789\/04198824.pdf?arnumber=4198824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,22]],"date-time":"2020-04-22T14:05:13Z","timestamp":1587564313000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4198824\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,8]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/seccomw.2006.359564","relation":{},"subject":[],"published":{"date-parts":[[2006,8]]}}}