{"id":"https://openalex.org/W2109915163","doi":"https://doi.org/10.1109/comsnets.2011.5716475","title":"TraceGray: An application-layer scheme for intrusion detection in MANET using mobile agents","display_name":"TraceGray: An application-layer scheme for intrusion detection in MANET using mobile agents","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W2109915163","doi":"https://doi.org/10.1109/comsnets.2011.5716475","mag":"2109915163"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets.2011.5716475","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets.2011.5716475","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004587993","display_name":"Ani Taggu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210102005","display_name":"Rajiv Gandhi University","ror":"https://ror.org/017wgkd42","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210102005"]},{"id":"https://openalex.org/I286135121","display_name":"Rajiv Gandhi University of Health Sciences","ror":"https://ror.org/0157vkf66","country_code":"IN","type":"education","lineage":["https://openalex.org/I286135121"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ani Taggu","raw_affiliation_strings":["Computer Science and Engineering Department, Rajiv Gandhi University, Itanagar, India","Computer Science and Engineering Department, Rajiv Gandhi University, Itanagar, India 791 112"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Rajiv Gandhi University, Itanagar, India","institution_ids":["https://openalex.org/I4210102005"]},{"raw_affiliation_string":"Computer Science and Engineering Department, Rajiv Gandhi University, Itanagar, India 791 112","institution_ids":["https://openalex.org/I286135121"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010120971","display_name":"Amar Taggu","orcid":"https://orcid.org/0000-0002-5944-8892"},"institutions":[{"id":"https://openalex.org/I160302567","display_name":"North Eastern Regional Institute of Science and Technology","ror":"https://ror.org/01wbhqj28","country_code":"IN","type":"education","lineage":["https://openalex.org/I160302567"]},{"id":"https://openalex.org/I4210102005","display_name":"Rajiv Gandhi University","ror":"https://ror.org/017wgkd42","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210102005"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Amar Taggu","raw_affiliation_strings":["Computer Science and Engineering Department, Rajiv Gandhi University, Itanagar, India","Department of Computer Science and Engineering, NERIST, Nirjuli, India 791 109"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Rajiv Gandhi University, Itanagar, India","institution_ids":["https://openalex.org/I4210102005"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, NERIST, Nirjuli, India 791 109","institution_ids":["https://openalex.org/I160302567"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5004587993"],"corresponding_institution_ids":["https://openalex.org/I286135121","https://openalex.org/I4210102005"],"apc_list":null,"apc_paid":null,"fwci":1.7504,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.85716295,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"6","issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.820480465888977},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.7921332716941833},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7512386441230774},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6532679796218872},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.617411732673645},{"id":"https://openalex.org/keywords/traverse","display_name":"Traverse","score":0.5591979026794434},{"id":"https://openalex.org/keywords/network-layer","display_name":"Network layer","score":0.4977765381336212},{"id":"https://openalex.org/keywords/optimized-link-state-routing-protocol","display_name":"Optimized Link State Routing Protocol","score":0.4704640805721283},{"id":"https://openalex.org/keywords/triangular-routing","display_name":"Triangular routing","score":0.4679599702358246},{"id":"https://openalex.org/keywords/dynamic-source-routing","display_name":"Dynamic Source Routing","score":0.42732366919517517},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.408694326877594},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.39111271500587463},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3472491204738617},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.16594508290290833},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12812072038650513}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.820480465888977},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.7921332716941833},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7512386441230774},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6532679796218872},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.617411732673645},{"id":"https://openalex.org/C176809094","wikidata":"https://www.wikidata.org/wiki/Q15401496","display_name":"Traverse","level":2,"score":0.5591979026794434},{"id":"https://openalex.org/C117468950","wikidata":"https://www.wikidata.org/wiki/Q208074","display_name":"Network layer","level":3,"score":0.4977765381336212},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.4704640805721283},{"id":"https://openalex.org/C22655229","wikidata":"https://www.wikidata.org/wiki/Q17143627","display_name":"Triangular routing","level":5,"score":0.4679599702358246},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.42732366919517517},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.408694326877594},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.39111271500587463},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3472491204738617},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.16594508290290833},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12812072038650513},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets.2011.5716475","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets.2011.5716475","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W179746137","https://openalex.org/W1482167372","https://openalex.org/W1497223332","https://openalex.org/W1525180324","https://openalex.org/W1979484381","https://openalex.org/W2003811039","https://openalex.org/W2015699099","https://openalex.org/W2127699957","https://openalex.org/W2131152570","https://openalex.org/W2145406783","https://openalex.org/W2146578651","https://openalex.org/W4243082082","https://openalex.org/W6628773143"],"related_works":["https://openalex.org/W2377402383","https://openalex.org/W2380835401","https://openalex.org/W2381912691","https://openalex.org/W2139978795","https://openalex.org/W2146887071","https://openalex.org/W2549696331","https://openalex.org/W2392101496","https://openalex.org/W2124988106","https://openalex.org/W2109915163","https://openalex.org/W2104967583"],"abstract_inverted_index":{"Many":[0],"intrusion":[1,54],"detection":[2,55,134],"algorithms":[3,25,65],"have":[4],"been":[5],"proposed":[6],"to":[7,23,51,99,115],"detect":[8],"network":[9,94],"attacks":[10],"on":[11],"Mobile":[12],"Ad-Hoc":[13],"Networks":[14],"(MANET).":[15],"Most":[16],"of":[17,135],"such":[18],"proposals":[19],"require":[20],"extensive":[21],"modifications":[22],"routing":[24,64,118],"or":[26,66,120],"lower":[27,121],"layers":[28,68,122],"which":[29],"might":[30],"not":[31],"be":[32],"always":[33],"feasible":[34],"in":[35,56,76,85,106,139],"practice.":[36],"This":[37],"paper":[38],"proposes":[39],"a":[40,57,86,96,100],"simple":[41],"but":[42],"non-trivial":[43],"scheme":[44],"TraceGray,":[45],"that":[46],"uses":[47],"mobile":[48,103],"agents":[49,104],"(MA)":[50],"carry":[52],"out":[53],"MANET":[58],"without":[59],"modifying":[60],"either":[61],"the":[62,70,77,93,107],"underlying":[63],"other":[67],"like":[69],"datalink":[71],"layer.":[72],"TraceGray":[73],"works":[74],"only":[75],"application":[78,108],"layer":[79],"and":[80,123],"detects":[81],"multiple":[82,136],"gray":[83,137],"holes":[84,138],"DSR":[87],"protocol":[88,126],"based":[89,130],"MANET,":[90],"while":[91],"traversing":[92],"from":[95],"given":[97],"source":[98],"destination.":[101],"Since":[102],"work":[105],"layer,":[109],"our":[110],"approach":[111],"requires":[112],"no":[113],"changes":[114],"any":[116],"existing":[117],"protocols":[119],"is":[124],"essentially":[125],"independent.":[127],"The":[128],"ns-2":[129],"implementation":[131],"show":[132],"successful":[133],"networks":[140],"with":[141],"moderate":[142],"mobility.":[143]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
