{"id":"https://openalex.org/W4391769519","doi":"https://doi.org/10.1109/ccwc60891.2024.10427928","title":"Defending Against Wormhole Attacks in Wireless Networks Using the Twofish Algorithm: A Performance Analysis","display_name":"Defending Against Wormhole Attacks in Wireless Networks Using the Twofish Algorithm: A Performance Analysis","publication_year":2024,"publication_date":"2024-01-08","ids":{"openalex":"https://openalex.org/W4391769519","doi":"https://doi.org/10.1109/ccwc60891.2024.10427928"},"language":"en","primary_location":{"id":"doi:10.1109/ccwc60891.2024.10427928","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccwc60891.2024.10427928","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014450529","display_name":"Pramod Singh Rathore","orcid":"https://orcid.org/0000-0002-4917-1500"},"institutions":[{"id":"https://openalex.org/I1296725772","display_name":"University of Engineering & Management","ror":"https://ror.org/02decng19","country_code":"IN","type":"education","lineage":["https://openalex.org/I1296725772"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Pramod Singh Rathore","raw_affiliation_strings":["University of Engineering and Management,Jaipur","University of Engineering and Management, Jaipur"],"affiliations":[{"raw_affiliation_string":"University of Engineering and Management,Jaipur","institution_ids":["https://openalex.org/I1296725772"]},{"raw_affiliation_string":"University of Engineering and Management, Jaipur","institution_ids":["https://openalex.org/I1296725772"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101655568","display_name":"Mrinal Kanti Sarkar","orcid":"https://orcid.org/0000-0001-5246-1851"},"institutions":[{"id":"https://openalex.org/I1296725772","display_name":"University of Engineering & Management","ror":"https://ror.org/02decng19","country_code":"IN","type":"education","lineage":["https://openalex.org/I1296725772"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mrinal Kanti Sarkar","raw_affiliation_strings":["University of Engineering and Management,Department of Computer Science &amp; Engineering,Jaipur"],"affiliations":[{"raw_affiliation_string":"University of Engineering and Management,Department of Computer Science &amp; Engineering,Jaipur","institution_ids":["https://openalex.org/I1296725772"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5014450529"],"corresponding_institution_ids":["https://openalex.org/I1296725772"],"apc_list":null,"apc_paid":null,"fwci":1.099,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.76239728,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"0583","last_page":"0588"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9528999924659729,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.932699978351593,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7153280973434448},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5167447924613953},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.433102011680603},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37967976927757263},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15196385979652405}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7153280973434448},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5167447924613953},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.433102011680603},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37967976927757263},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15196385979652405}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccwc60891.2024.10427928","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccwc60891.2024.10427928","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W2062305910","https://openalex.org/W2116913505","https://openalex.org/W2119548540","https://openalex.org/W2140658799","https://openalex.org/W2153791732","https://openalex.org/W2192031548","https://openalex.org/W2288523697","https://openalex.org/W2407898405","https://openalex.org/W2461731586","https://openalex.org/W2526573468","https://openalex.org/W2551620606","https://openalex.org/W2754269241","https://openalex.org/W2793170359","https://openalex.org/W2885399344","https://openalex.org/W2887621811","https://openalex.org/W2895059944","https://openalex.org/W2912015692","https://openalex.org/W2952821154","https://openalex.org/W2999761546","https://openalex.org/W3013693214","https://openalex.org/W3018969206","https://openalex.org/W3032361441","https://openalex.org/W3119467607","https://openalex.org/W3139089048","https://openalex.org/W4253209750"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829"],"abstract_inverted_index":{"Wireless":[0],"Sensor":[1],"Networks":[2],"(WSNs)":[3],"are":[4],"becoming":[5],"more":[6],"essential":[7],"in":[8,129,141,150],"areas":[9],"such":[10,28],"as":[11,29],"environmental":[12],"monitoring,":[13],"industrial":[14],"automation,":[15],"and":[16,32,39,48,62,107,153],"healthcare.":[17],"However,":[18],"their":[19,46],"wireless":[20],"nature":[21],"leaves":[22],"them":[23],"vulnerable":[24],"to":[25,71,103],"security":[26,47,152],"threats":[27],"eavesdropping,":[30],"tampering,":[31],"attacks.":[33,159],"This":[34],"paper":[35],"introduces":[36],"a":[37,73,81,117,142],"robust":[38],"secure":[40],"algorithm":[41,66,70],"for":[42],"WSNs":[43,156],"that":[44,130],"enhances":[45],"reliability":[49,154],"by":[50,126],"incorporating":[51],"key":[52],"distribution,":[53],"packet":[54,60,79],"timestamping,":[55],"location-based":[56,98],"detection,":[57,59],"wormhole":[58,63,105,118,158],"encryption,":[61],"prevention.":[64],"Our":[65],"utilizes":[67],"the":[68,90,114,122,151],"TwoFish":[69],"establish":[72],"shared":[74],"key,":[75],"timestamps":[76],"each":[77],"data":[78,109],"using":[80,94],"synchronized":[82],"network":[83,124,145],"time":[84],"protocol,":[85],"monitors":[86],"hop":[87],"count,":[88],"determines":[89],"distance":[91],"between":[92],"nodes":[93],"RSSI":[95],"or":[96],"other":[97],"techniques,":[99],"exchanges":[100],"probe":[101],"packets":[102,110],"detect":[104],"attacks,":[106],"encrypts":[108],"with":[111],"TwoFish.":[112],"In":[113],"event":[115],"of":[116,134,155],"assault,":[119],"it":[120],"isolates":[121],"affected":[123],"segment":[125],"obstructing":[127],"communication":[128],"area.":[131],"The":[132],"efficacy":[133],"this":[135],"approach":[136],"is":[137],"validated":[138],"through":[139],"implementation":[140],"simulated":[143],"NS-2":[144],"environment,":[146],"demonstrating":[147],"significant":[148],"enhancements":[149],"against":[157]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
