{"id":"https://openalex.org/W2171848678","doi":"https://doi.org/10.1093/comjnl/bxu036","title":"Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks","display_name":"Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks","publication_year":2014,"publication_date":"2014-05-13","ids":{"openalex":"https://openalex.org/W2171848678","doi":"https://doi.org/10.1093/comjnl/bxu036","mag":"2171848678"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxu036","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxu036","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/10251/66254","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070719868","display_name":"Guangjie Han","orcid":"https://orcid.org/0000-0002-6921-7369"},"institutions":[{"id":"https://openalex.org/I163340411","display_name":"Hohai University","ror":"https://ror.org/01wd4xt90","country_code":"CN","type":"education","lineage":["https://openalex.org/I163340411"]},{"id":"https://openalex.org/I4210128140","display_name":"Guangdong University of Petrochemical Technology","ror":"https://ror.org/030ffke25","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210128140"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"G. Han","raw_affiliation_strings":["Department of Information and Communication Systems, Hohai University, Changzhou, China","Guangdong Petrochemical Equipment Fault Diagnosis Key Laboratory, Guangdong University of Petrochemical Technology, Maoming, China"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Systems, Hohai University, Changzhou, China","institution_ids":["https://openalex.org/I163340411"]},{"raw_affiliation_string":"Guangdong Petrochemical Equipment Fault Diagnosis Key Laboratory, Guangdong University of Petrochemical Technology, Maoming, China","institution_ids":["https://openalex.org/I4210128140"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115592212","display_name":"Xiaoxue Li","orcid":"https://orcid.org/0000-0003-3581-3442"},"institutions":[{"id":"https://openalex.org/I163340411","display_name":"Hohai University","ror":"https://ror.org/01wd4xt90","country_code":"CN","type":"education","lineage":["https://openalex.org/I163340411"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"X. Li","raw_affiliation_strings":["Department of Information and Communication Systems, Hohai University, Changzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Systems, Hohai University, Changzhou, China","institution_ids":["https://openalex.org/I163340411"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089856537","display_name":"Jinfang Jiang","orcid":"https://orcid.org/0000-0002-7126-739X"},"institutions":[{"id":"https://openalex.org/I163340411","display_name":"Hohai University","ror":"https://ror.org/01wd4xt90","country_code":"CN","type":"education","lineage":["https://openalex.org/I163340411"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"J. Jiang","raw_affiliation_strings":["Department of Information and Communication Systems, Hohai University, Changzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Systems, Hohai University, Changzhou, China","institution_ids":["https://openalex.org/I163340411"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007723627","display_name":"Lei Shu","orcid":"https://orcid.org/0000-0002-6700-9347"},"institutions":[{"id":"https://openalex.org/I4210128140","display_name":"Guangdong University of Petrochemical Technology","ror":"https://ror.org/030ffke25","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210128140"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"L. Shu","raw_affiliation_strings":["Guangdong Petrochemical Equipment Fault Diagnosis Key Laboratory, Guangdong University of Petrochemical Technology, Maoming, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Petrochemical Equipment Fault Diagnosis Key Laboratory, Guangdong University of Petrochemical Technology, Maoming, China","institution_ids":["https://openalex.org/I4210128140"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061267204","display_name":"Jaime Lloret","orcid":"https://orcid.org/0000-0002-0862-0533"},"institutions":[{"id":"https://openalex.org/I60053951","display_name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","ror":"https://ror.org/01460j859","country_code":"ES","type":"education","lineage":["https://openalex.org/I60053951"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"J. Lloret","raw_affiliation_strings":["Integrated Management Coastal Research Institute, Universidad Politecnica de Valencia, Valencia, Spain"],"affiliations":[{"raw_affiliation_string":"Integrated Management Coastal Research Institute, Universidad Politecnica de Valencia, Valencia, Spain","institution_ids":["https://openalex.org/I60053951"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5070719868"],"corresponding_institution_ids":["https://openalex.org/I163340411","https://openalex.org/I4210128140"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":3.2532,"has_fulltext":false,"cited_by_count":35,"citation_normalized_percentile":{"value":0.93016539,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"58","issue":"6","first_page":"1280","last_page":"1292"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9825999736785889,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9825999736785889,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9505000114440918,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sinkhole","display_name":"Sinkhole","score":0.7572963833808899},{"id":"https://openalex.org/keywords/china","display_name":"China","score":0.6974024772644043},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5247987508773804},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.511225700378418},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.4695865511894226},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4367644488811493},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.42918145656585693},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4204845428466797},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3144163489341736},{"id":"https://openalex.org/keywords/history","display_name":"History","score":0.18809637427330017},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.1602196991443634},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.13245883584022522},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.128773033618927},{"id":"https://openalex.org/keywords/seismology","display_name":"Seismology","score":0.0939168930053711},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.0853869616985321}],"concepts":[{"id":"https://openalex.org/C49223487","wikidata":"https://www.wikidata.org/wiki/Q188734","display_name":"Sinkhole","level":3,"score":0.7572963833808899},{"id":"https://openalex.org/C191935318","wikidata":"https://www.wikidata.org/wiki/Q148","display_name":"China","level":2,"score":0.6974024772644043},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5247987508773804},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.511225700378418},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.4695865511894226},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4367644488811493},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.42918145656585693},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4204845428466797},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3144163489341736},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.18809637427330017},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.1602196991443634},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.13245883584022522},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.128773033618927},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.0939168930053711},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0853869616985321},{"id":"https://openalex.org/C182348080","wikidata":"https://www.wikidata.org/wiki/Q16817","display_name":"Karst","level":2,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1093/comjnl/bxu036","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxu036","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},{"id":"pmh:oai:riunet.upv.es:10251/66254","is_oa":true,"landing_page_url":"http://hdl.handle.net/10251/66254","pdf_url":null,"source":{"id":"https://openalex.org/S4306401500","display_name":"RiuNet (Politechnical University of Valencia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60053951","host_organization_name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","host_organization_lineage":["https://openalex.org/I60053951"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"pmh:oai:riunet.upv.es:10251/66254","is_oa":true,"landing_page_url":"http://hdl.handle.net/10251/66254","pdf_url":null,"source":{"id":"https://openalex.org/S4306401500","display_name":"RiuNet (Politechnical University of Valencia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60053951","host_organization_name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","host_organization_lineage":["https://openalex.org/I60053951"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/14","score":0.7300000190734863,"display_name":"Life below water"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2552485568","https://openalex.org/W2043656548","https://openalex.org/W2002122708","https://openalex.org/W125799629","https://openalex.org/W3022213123","https://openalex.org/W4229766761","https://openalex.org/W2908627775","https://openalex.org/W1548328161","https://openalex.org/W2464972666","https://openalex.org/W2133389611"],"abstract_inverted_index":{"Recently,":[0],"wireless":[1],"sensor":[2,139],"networks":[3],"(WSNs)":[4],"have":[5],"been":[6],"widely":[7],"used":[8],"in":[9,87,91,150,165],"many":[10],"applications,":[11],"such":[12],"as":[13],"Smart":[14],"Grid.":[15],"However,":[16],"it":[17,59,94],"is":[18,40,95,175],"generally":[19],"known":[20],"that":[21,170,178],"WSNs":[22,28],"are":[23],"energy":[24,80,89,160],"limited,":[25],"which":[26,85],"makes":[27],"vulnerable":[29],"to":[30,97,102,141],"malicious":[31,35,62,153],"attacks.":[32],"Among":[33],"these":[34],"attacks,":[36,63],"a":[37,71,76,112],"sinkhole":[38,48,72,105,143],"attack":[39],"the":[41,65,104,171],"most":[42],"destructive":[43],"one,":[44],"since":[45],"only":[46],"one":[47],"node":[49,73,154],"can":[50,74],"attract":[51],"surrounding":[52,83],"nodes":[53,140],"with":[54],"unfaithful":[55],"routing":[56],"information,":[57],"and":[58,162],"executes":[60],"severe":[61],"e.g.":[64],"selective":[66],"forwarding":[67],"attack.":[68,106],"In":[69,107,145],"addition,":[70,146],"cause":[75],"large":[77],"amount":[78],"of":[79,82,135,138,152,173,179],"wastes":[81],"nodes,":[84],"results":[86,168],"abnormal":[88],"hole":[90],"WSNs.":[92],"Thus,":[93],"necessary":[96],"design":[98],"an":[99],"effective":[100],"mechanism":[101],"detect":[103,142],"this":[108],"paper,":[109],"we":[110,147],"propose":[111],"novel":[113],"Intrusion":[114],"Detection":[115],"Algorithm":[116],"based":[117],"on":[118],"neighbor":[119,136],"information":[120,137],"against":[121],"Sinkhole":[122],"Attack":[123],"(IDASA).":[124],"Different":[125],"from":[126],"traditional":[127],"intrusion":[128],"detection":[129,155],"algorithms,":[130],"IDASA":[131,149,174],"takes":[132],"full":[133],"advantage":[134],"nodes.":[144],"evaluate":[148],"terms":[151],"accuracy,":[156],"packet":[157],"loss":[158],"rate,":[159],"consumption":[161],"network":[163],"throughput":[164],"MATLAB.":[166],"Simulation":[167],"show":[169],"performance":[172],"better":[176],"than":[177],"other":[180],"related":[181],"algorithms.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2}],"updated_date":"2026-03-06T13:50:29.536080","created_date":"2025-10-10T00:00:00"}
