{"id":"https://openalex.org/W1998688795","doi":"https://doi.org/10.1109/cisim.2010.5643657","title":"A comprehensive review on wormhole attacks in MANET","display_name":"A comprehensive review on wormhole attacks in MANET","publication_year":2010,"publication_date":"2010-10-01","ids":{"openalex":"https://openalex.org/W1998688795","doi":"https://doi.org/10.1109/cisim.2010.5643657","mag":"1998688795"},"language":"en","primary_location":{"id":"doi:10.1109/cisim.2010.5643657","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisim.2010.5643657","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)","raw_type":"proceedings-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045512000","display_name":"Reshmi Maulik","orcid":"https://orcid.org/0000-0002-5507-2293"},"institutions":[{"id":"https://openalex.org/I4210132326","display_name":"Techno India Group (India)","ror":"https://ror.org/03zx8g717","country_code":"IN","type":"company","lineage":["https://openalex.org/I4210132326"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Reshmi Maulik","raw_affiliation_strings":["Techno India Group, Meghnad Saha Institute of Technology, Kolkata, India","Meghnad Saha Institute of Technology,Techno India Group,Kolkata,India"],"affiliations":[{"raw_affiliation_string":"Techno India Group, Meghnad Saha Institute of Technology, Kolkata, India","institution_ids":["https://openalex.org/I4210132326"]},{"raw_affiliation_string":"Meghnad Saha Institute of Technology,Techno India Group,Kolkata,India","institution_ids":["https://openalex.org/I4210132326"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001172312","display_name":"Nabendu Chaki","orcid":"https://orcid.org/0000-0003-3242-680X"},"institutions":[{"id":"https://openalex.org/I106542073","display_name":"University of Calcutta","ror":"https://ror.org/01e7v7w47","country_code":"IN","type":"education","lineage":["https://openalex.org/I106542073"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nabendu Chaki","raw_affiliation_strings":["Department of Computer Science & Engineering, University of Calcutta, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Engineering, University of Calcutta, Kolkata, India","institution_ids":["https://openalex.org/I106542073"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5045512000"],"corresponding_institution_ids":["https://openalex.org/I4210132326"],"apc_list":null,"apc_paid":null,"fwci":1.7806,"has_fulltext":false,"cited_by_count":35,"citation_normalized_percentile":{"value":0.84936229,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"2","issue":null,"first_page":"233","last_page":"238"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10069","display_name":"Antenna Design and Analysis","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wormhole","display_name":"Wormhole","score":0.7393314242362976},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.7316188216209412},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7255200743675232},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5692101716995239},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4941311180591583},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.46596860885620117},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.45451709628105164},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4352304935455322},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2629774808883667}],"concepts":[{"id":"https://openalex.org/C29013271","wikidata":"https://www.wikidata.org/wiki/Q7544","display_name":"Wormhole","level":2,"score":0.7393314242362976},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.7316188216209412},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7255200743675232},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5692101716995239},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4941311180591583},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.46596860885620117},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.45451709628105164},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4352304935455322},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2629774808883667},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cisim.2010.5643657","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisim.2010.5643657","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1600003657","https://openalex.org/W1818445400","https://openalex.org/W1831773712","https://openalex.org/W1991958904","https://openalex.org/W2009115820","https://openalex.org/W2044304742","https://openalex.org/W2050433894","https://openalex.org/W2070492530","https://openalex.org/W2096128372","https://openalex.org/W2099358238","https://openalex.org/W2106266945","https://openalex.org/W2152617153","https://openalex.org/W2153755097","https://openalex.org/W2225751409","https://openalex.org/W2547463657","https://openalex.org/W6638614592","https://openalex.org/W6638622593","https://openalex.org/W6675235080","https://openalex.org/W6689273599"],"related_works":["https://openalex.org/W2163664197","https://openalex.org/W3035283282","https://openalex.org/W2768875466","https://openalex.org/W1591014886","https://openalex.org/W2551975114","https://openalex.org/W2061944504","https://openalex.org/W2025838880","https://openalex.org/W2786222771","https://openalex.org/W1511473871","https://openalex.org/W1581687089"],"abstract_inverted_index":{"As":[0],"MANETs":[1],"use":[2],"wireless":[3],"medium":[4],"for":[5],"communication,":[6],"these":[7],"are":[8,45,55],"vulnerable":[9],"to":[10,67],"many":[11],"security":[12],"attacks.":[13],"In":[14],"this":[15],"paper":[16],"a":[17],"comprehensive":[18],"review":[19],"is":[20],"done":[21],"on":[22,32],"the":[23,28,41,69,73],"very":[24],"recent":[25],"state":[26],"of":[27,40,52,72],"art":[29],"research":[30],"results":[31,63],"wormhole":[33],"attacks":[34],"and":[35],"relevant":[36],"mitigation":[37],"measures.":[38],"100%":[39],"works":[42],"reviewed":[43],"here":[44],"published":[46,56],"in":[47,57,64],"last":[48,58],"five":[49],"years,":[50],"out":[51],"which":[53],"80%":[54],"three":[59],"years.":[60],"The":[61],"simulation":[62],"NS2":[65],"helps":[66],"quantify":[68],"comparative":[70],"performances":[71],"different":[74],"solutions":[75],"proposed.":[76]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
