{"id":"https://openalex.org/W2015538910","doi":"https://doi.org/10.1007/s10660-013-9122-3","title":"A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology","display_name":"A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology","publication_year":2013,"publication_date":"2013-05-10","ids":{"openalex":"https://openalex.org/W2015538910","doi":"https://doi.org/10.1007/s10660-013-9122-3","mag":"2015538910"},"language":"en","primary_location":{"id":"doi:10.1007/s10660-013-9122-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10660-013-9122-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10660-013-9122-3.pdf","source":{"id":"https://openalex.org/S205929853","display_name":"Electronic Commerce Research","issn_l":"1389-5753","issn":["1389-5753","1572-9362"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Electronic Commerce Research","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10660-013-9122-3.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020865597","display_name":"Fei Shi","orcid":"https://orcid.org/0000-0001-7661-7400"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Fei Shi","raw_affiliation_strings":["Department of Computer Science, Yonsei University, Seoul, South Korea","[Dept. of Computer Science, Yonsei University, Seoul, South Korea]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]},{"raw_affiliation_string":"[Dept. of Computer Science, Yonsei University, Seoul, South Korea]","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100668780","display_name":"Weijie Liu","orcid":"https://orcid.org/0000-0002-3054-766X"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Weijie Liu","raw_affiliation_strings":["Department of Information and Industrial Engineering, Yonsei University, Seoul, South Korea","(Department of Information and Industrial Engineering, Yonsei University, Seoul, South Korea)"],"affiliations":[{"raw_affiliation_string":"Department of Information and Industrial Engineering, Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]},{"raw_affiliation_string":"(Department of Information and Industrial Engineering, Yonsei University, Seoul, South Korea)","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070370423","display_name":"Dongxu Jin","orcid":null},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Dongxu Jin","raw_affiliation_strings":["Department of Computer Science, Yonsei University, Seoul, South Korea","[Dept. of Computer Science, Yonsei University, Seoul, South Korea]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]},{"raw_affiliation_string":"[Dept. of Computer Science, Yonsei University, Seoul, South Korea]","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100804747","display_name":"JooSeok Song","orcid":null},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jooseok Song","raw_affiliation_strings":["Department of Computer Science, Yonsei University, Seoul, South Korea","[Dept. of Computer Science, Yonsei University, Seoul, South Korea]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]},{"raw_affiliation_string":"[Dept. of Computer Science, Yonsei University, Seoul, South Korea]","institution_ids":["https://openalex.org/I193775966"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5020865597"],"corresponding_institution_ids":["https://openalex.org/I193775966"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890},"fwci":0.754,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.74965846,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"13","issue":"3","first_page":"329","last_page":"345"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wormhole","display_name":"Wormhole","score":0.9677883386611938},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.8632500171661377},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7598623037338257},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5952540636062622},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.586443305015564},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.579243540763855},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5761913061141968},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.49072206020355225},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4429861605167389},{"id":"https://openalex.org/keywords/hierarchy","display_name":"Hierarchy","score":0.41981008648872375},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34420663118362427},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.3299987018108368},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1003682017326355},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08751055598258972},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.08642551302909851},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.05072718858718872}],"concepts":[{"id":"https://openalex.org/C29013271","wikidata":"https://www.wikidata.org/wiki/Q7544","display_name":"Wormhole","level":2,"score":0.9677883386611938},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.8632500171661377},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7598623037338257},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5952540636062622},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.586443305015564},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.579243540763855},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5761913061141968},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.49072206020355225},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4429861605167389},{"id":"https://openalex.org/C31170391","wikidata":"https://www.wikidata.org/wiki/Q188619","display_name":"Hierarchy","level":2,"score":0.41981008648872375},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34420663118362427},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.3299987018108368},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1003682017326355},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08751055598258972},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.08642551302909851},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.05072718858718872},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C34447519","wikidata":"https://www.wikidata.org/wiki/Q179522","display_name":"Market economy","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10660-013-9122-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10660-013-9122-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10660-013-9122-3.pdf","source":{"id":"https://openalex.org/S205929853","display_name":"Electronic Commerce Research","issn_l":"1389-5753","issn":["1389-5753","1572-9362"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Electronic Commerce Research","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10660-013-9122-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10660-013-9122-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10660-013-9122-3.pdf","source":{"id":"https://openalex.org/S205929853","display_name":"Electronic Commerce Research","issn_l":"1389-5753","issn":["1389-5753","1572-9362"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Electronic Commerce Research","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2743374010","display_name":null,"funder_award_id":"2012R1A1B","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"}],"funders":[{"id":"https://openalex.org/F4320320671","display_name":"National Research Foundation","ror":"https://ror.org/05s0g1g46"},{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"},{"id":"https://openalex.org/F4320322349","display_name":"Ministry of Education, Science and Technology","ror":"https://ror.org/01p262204"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2015538910.pdf","grobid_xml":"https://content.openalex.org/works/W2015538910.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W1568073200","https://openalex.org/W1583345160","https://openalex.org/W1971026061","https://openalex.org/W1986974866","https://openalex.org/W1995486103","https://openalex.org/W2009382079","https://openalex.org/W2024671934","https://openalex.org/W2034960640","https://openalex.org/W2051605521","https://openalex.org/W2054399359","https://openalex.org/W2073306211","https://openalex.org/W2084324965","https://openalex.org/W2099574482","https://openalex.org/W2100499588","https://openalex.org/W2111603307","https://openalex.org/W2122516858","https://openalex.org/W2132218064","https://openalex.org/W2135605012","https://openalex.org/W2138410641","https://openalex.org/W2139444054","https://openalex.org/W2151993488","https://openalex.org/W2158913757","https://openalex.org/W4232457456","https://openalex.org/W4233594487","https://openalex.org/W4376502817","https://openalex.org/W6675315432"],"related_works":["https://openalex.org/W2785138955","https://openalex.org/W2130966263","https://openalex.org/W2026203830","https://openalex.org/W2953525470","https://openalex.org/W2187411498","https://openalex.org/W1482773229","https://openalex.org/W2120216356","https://openalex.org/W2126723870","https://openalex.org/W2549096953","https://openalex.org/W209318897"],"abstract_inverted_index":{"Mobile":[0],"ad":[1],"hoc":[2],"networks":[3],"are":[4,53],"vulnerable":[5],"to":[6,22,31,56,61],"a":[7,20,95],"large":[8],"group":[9],"of":[10],"attacks,":[11,72],"e.g.,":[12],"wormhole":[13,24,63,71,76,85,91,99],"attacks.":[14,25,64,86],"In":[15],"this":[16],"paper,":[17],"we":[18,93],"propose":[19],"countermeasure":[21,96],"prevent":[23,62],"We":[26],"utilize":[27],"analytical":[28],"hierarchy":[29],"process":[30],"elect":[32],"some":[33],"special":[34],"nodes,":[35,41,77],"named":[36,97],"the":[37,43,46,80,89],"local":[38],"most":[39],"trustable":[40],"for":[42],"source":[44],"and":[45],"destination":[47],"node,":[48],"respectively.":[49],"The":[50,65],"elected":[51],"nodes":[52,82],"then":[54],"required":[55],"implement":[57],"our":[58],"proposed":[59,66],"scheme":[60,67],"cannot":[68],"only":[69],"detect":[70],"but":[73],"also":[74],"locate":[75],"i.e.,":[78],"identify":[79],"malicious":[81],"that":[83],"behave":[84],"To":[87],"solve":[88],"colluding":[90],"attack,":[92],"present":[94],"bi-directional":[98],"location":[100],"mechanism.":[101]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
