{"id":"https://openalex.org/W4200124351","doi":"https://doi.org/10.1109/commnet52204.2021.9641959","title":"Blockchain-based Model Against selfish Attacks in Mobile ad hoc Networks","display_name":"Blockchain-based Model Against selfish Attacks in Mobile ad hoc Networks","publication_year":2021,"publication_date":"2021-12-03","ids":{"openalex":"https://openalex.org/W4200124351","doi":"https://doi.org/10.1109/commnet52204.2021.9641959"},"language":"en","primary_location":{"id":"doi:10.1109/commnet52204.2021.9641959","is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet52204.2021.9641959","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 4th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090817361","display_name":"Nada Mouchfiq","orcid":"https://orcid.org/0000-0002-6743-946X"},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Nada Mouchfiq","raw_affiliation_strings":["SSLab, ENSIAS, Mohammed V University of Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"SSLab, ENSIAS, Mohammed V University of Rabat, Morocco","institution_ids":["https://openalex.org/I126477371"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082784524","display_name":"Ahmed Habbani","orcid":"https://orcid.org/0000-0001-9156-049X"},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Ahmed Habbani","raw_affiliation_strings":["SSLab, ENSIAS, Mohammed V University of Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"SSLab, ENSIAS, Mohammed V University of Rabat, Morocco","institution_ids":["https://openalex.org/I126477371"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033074402","display_name":"Chaimae Benjbara","orcid":"https://orcid.org/0000-0002-7585-7688"},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Chaimae Benjbara","raw_affiliation_strings":["SSLab, ENSIAS, Mohammed V University of Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"SSLab, ENSIAS, Mohammed V University of Rabat, Morocco","institution_ids":["https://openalex.org/I126477371"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061782563","display_name":"Halim Berradi","orcid":"https://orcid.org/0000-0001-8224-273X"},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Halim Berradi","raw_affiliation_strings":["SSLab, ENSIAS, Mohammed V University of Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"SSLab, ENSIAS, Mohammed V University of Rabat, Morocco","institution_ids":["https://openalex.org/I126477371"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5090817361"],"corresponding_institution_ids":["https://openalex.org/I126477371"],"apc_list":null,"apc_paid":null,"fwci":0.2754,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.65396653,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8238474130630493},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.6923544406890869},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.6858119964599609},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6297016739845276},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.6094689965248108},{"id":"https://openalex.org/keywords/immutability","display_name":"Immutability","score":0.5220996141433716},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.48246198892593384},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.48087337613105774},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.47772571444511414},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4490965008735657},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4281895160675049},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.41931843757629395},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4032760560512543},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3048185706138611},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1737317144870758},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.1436041295528412},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09303241968154907}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8238474130630493},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.6923544406890869},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.6858119964599609},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6297016739845276},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.6094689965248108},{"id":"https://openalex.org/C2776126399","wikidata":"https://www.wikidata.org/wiki/Q3942906","display_name":"Immutability","level":3,"score":0.5220996141433716},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.48246198892593384},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.48087337613105774},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.47772571444511414},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4490965008735657},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4281895160675049},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.41931843757629395},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4032760560512543},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3048185706138611},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1737317144870758},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.1436041295528412},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09303241968154907},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/commnet52204.2021.9641959","is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet52204.2021.9641959","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 4th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6399999856948853,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2606467208","https://openalex.org/W2754591232","https://openalex.org/W2756025876","https://openalex.org/W2963337507","https://openalex.org/W3088647100","https://openalex.org/W3089552702","https://openalex.org/W3089745542","https://openalex.org/W3090846781","https://openalex.org/W3097190503","https://openalex.org/W3099789692","https://openalex.org/W3123658637","https://openalex.org/W3139939656","https://openalex.org/W3150721307","https://openalex.org/W3152823548","https://openalex.org/W3155086981","https://openalex.org/W3157680283","https://openalex.org/W3166361504","https://openalex.org/W3167479137","https://openalex.org/W3169649651","https://openalex.org/W3176704489","https://openalex.org/W3185504986","https://openalex.org/W3191634971","https://openalex.org/W3198149352","https://openalex.org/W4211068006","https://openalex.org/W4248175462","https://openalex.org/W6794566868"],"related_works":["https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2778153218","https://openalex.org/W1531601525","https://openalex.org/W3130746757","https://openalex.org/W4380683080","https://openalex.org/W1123412569","https://openalex.org/W2768875466","https://openalex.org/W3013627169"],"abstract_inverted_index":{"Over":[0],"the":[1,5,15,20,48,91,111,118,161,170,190],"past":[2],"several":[3],"decades,":[4],"importance":[6],"of":[7,17,22,34,94,105,122,163,192],"security":[8,182,198],"has":[9],"been":[10],"increasing,":[11],"in":[12,14,47,97,110,125,146,153,173],"particular":[13],"area":[16],"research":[18,45],"addressing":[19],"Internet":[21],"Things":[23],"(IoT)":[24],"and,":[25],"implicitly,":[26],"ad":[27,50,99,147],"hoc":[28,51,100,148],"networks":[29,149],"since":[30],"they":[31],"are":[32],"part":[33],"it.":[35],"Researchers":[36],"have":[37],"adopted":[38],"blockchain":[39,96,171],"as":[40,59,69,79],"an":[41,98,126],"interesting":[42],"and":[43,63,114,150,168,175,206],"trendy":[44],"topic":[46],"wireless":[49],"environment.":[52],"Due":[53],"to":[54,116,156,166,184,195,201,208],"its":[55,131],"strong":[56],"characteristics,":[57],"such":[58],"consensus,":[60],"immutability,":[61],"finality":[62],"provenance,":[64],"it&#x2019;s":[65],"used":[66],"not":[67],"only":[68],"a":[70,80,139,181],"secure":[71],"data":[72,85],"storage":[73],"for":[74],"critical":[75],"data,":[76],"but":[77],"also":[78],"platform":[81],"that":[82],"facilitates":[83],"trustless":[84],"exchange":[86],"between":[87],"independent":[88],"parties.":[89],"However,":[90],"main":[92],"challenge":[93],"applying":[95],"network":[101],"is":[102],"what":[103],"kind":[104],"nodes":[106,165],"should":[107],"be":[108],"involved":[109],"validation":[112,124],"process":[113],"how":[115],"adopt":[117],"heavy":[119],"computational":[120],"complexity":[121],"block":[123],"appropriate":[127],"way":[128],"while":[129],"maintaining":[130],"authentic":[132],"characteristics.":[133],"In":[134],"this":[135,154,157,178],"paper,":[136],"we":[137,159,179],"propose":[138],"new":[140],"blockchain-based":[141],"model":[142,187,194],"against":[143],"selfish":[144],"attacks":[145],"optimize":[151],"it":[152],"context,":[155],"end,":[158],"investigate":[160],"presence":[162],"MPR":[164],"adapt":[167],"integrate":[169],"principle":[172],"MANETs":[174],"based":[176],"on":[177],"conduct":[180],"analysis":[183],"evaluate":[185],"our":[186,193],"by":[188],"discussing":[189],"ability":[191],"meet":[196],"major":[197],"issues":[199],"related":[200],"confidentiality,":[202],"integrity,":[203],"availability,":[204],"non-repudiation,":[205],"vulnerability":[207],"attacks.":[209]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
