{"id":"https://openalex.org/W1969331628","doi":"https://doi.org/10.1109/ic3.2013.6612195","title":"Trust based Ad-hoc on Demand Routing protocol for MANET","display_name":"Trust based Ad-hoc on Demand Routing protocol for MANET","publication_year":2013,"publication_date":"2013-08-01","ids":{"openalex":"https://openalex.org/W1969331628","doi":"https://doi.org/10.1109/ic3.2013.6612195","mag":"1969331628"},"language":"en","primary_location":{"id":"doi:10.1109/ic3.2013.6612195","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2013.6612195","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Sixth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087018492","display_name":"Naveen Kumar Gupta","orcid":null},"institutions":[{"id":"https://openalex.org/I154970844","display_name":"Jaypee Institute of Information Technology","ror":"https://ror.org/05sttyy11","country_code":"IN","type":"education","lineage":["https://openalex.org/I154970844"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Naveen Kumar Gupta","raw_affiliation_strings":["Computer Science Department, JIIT, Noida, India","Comput. Sci. Dept., JIIT, Noida, India"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, JIIT, Noida, India","institution_ids":["https://openalex.org/I154970844"]},{"raw_affiliation_string":"Comput. Sci. Dept., JIIT, Noida, India","institution_ids":["https://openalex.org/I154970844"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004937111","display_name":"Kavita Pandey","orcid":"https://orcid.org/0000-0003-2613-4800"},"institutions":[{"id":"https://openalex.org/I154970844","display_name":"Jaypee Institute of Information Technology","ror":"https://ror.org/05sttyy11","country_code":"IN","type":"education","lineage":["https://openalex.org/I154970844"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kavita Pandey","raw_affiliation_strings":["Computer Science Department, JIIT, Noida, India","Comput. Sci. Dept., JIIT, Noida, India"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, JIIT, Noida, India","institution_ids":["https://openalex.org/I154970844"]},{"raw_affiliation_string":"Comput. Sci. Dept., JIIT, Noida, India","institution_ids":["https://openalex.org/I154970844"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087018492"],"corresponding_institution_ids":["https://openalex.org/I154970844"],"apc_list":null,"apc_paid":null,"fwci":1.8999,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.86639454,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"225","last_page":"231"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8436636924743652},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7961505651473999},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.7708765268325806},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.6211114525794983},{"id":"https://openalex.org/keywords/optimized-link-state-routing-protocol","display_name":"Optimized Link State Routing Protocol","score":0.5970959067344666},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.517264187335968},{"id":"https://openalex.org/keywords/packet-drop-attack","display_name":"Packet drop attack","score":0.491972416639328},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.4904925227165222},{"id":"https://openalex.org/keywords/ad-hoc-on-demand-distance-vector-routing","display_name":"Ad hoc On-Demand Distance Vector Routing","score":0.4648723900318146},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.43838199973106384},{"id":"https://openalex.org/keywords/wireless-routing-protocol","display_name":"Wireless Routing Protocol","score":0.4240551292896271},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35086220502853394},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34534522891044617},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3002009391784668},{"id":"https://openalex.org/keywords/link-state-routing-protocol","display_name":"Link-state routing protocol","score":0.2731987237930298},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08777981996536255},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08486822247505188}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8436636924743652},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7961505651473999},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.7708765268325806},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.6211114525794983},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.5970959067344666},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.517264187335968},{"id":"https://openalex.org/C35546906","wikidata":"https://www.wikidata.org/wiki/Q2900718","display_name":"Packet drop attack","level":5,"score":0.491972416639328},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.4904925227165222},{"id":"https://openalex.org/C104503742","wikidata":"https://www.wikidata.org/wiki/Q345335","display_name":"Ad hoc On-Demand Distance Vector Routing","level":5,"score":0.4648723900318146},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.43838199973106384},{"id":"https://openalex.org/C47318570","wikidata":"https://www.wikidata.org/wiki/Q8026863","display_name":"Wireless Routing Protocol","level":4,"score":0.4240551292896271},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35086220502853394},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34534522891044617},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3002009391784668},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.2731987237930298},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08777981996536255},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08486822247505188},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3.2013.6612195","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2013.6612195","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Sixth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6200000047683716,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W613224761","https://openalex.org/W1986754724","https://openalex.org/W2000548713","https://openalex.org/W2011593302","https://openalex.org/W2027447357","https://openalex.org/W2031736796","https://openalex.org/W2099574482","https://openalex.org/W2122516858","https://openalex.org/W2124651399","https://openalex.org/W2138118995","https://openalex.org/W2146870773","https://openalex.org/W2162881936","https://openalex.org/W2163711090","https://openalex.org/W2339036384","https://openalex.org/W2538415882","https://openalex.org/W4236944153","https://openalex.org/W6650655300"],"related_works":["https://openalex.org/W2060805688","https://openalex.org/W2265231577","https://openalex.org/W988902895","https://openalex.org/W2166350391","https://openalex.org/W2160109169","https://openalex.org/W2362328212","https://openalex.org/W2377438927","https://openalex.org/W1966866667","https://openalex.org/W2753991241","https://openalex.org/W2149597493"],"abstract_inverted_index":{"Mobile":[0],"Ad-hoc":[1],"networks":[2],"(MANET)":[3],"is":[4,37,74,93,124,146],"a":[5,72],"set":[6],"of":[7,42,52,57,71,120,129,142,151,159,165,167],"wireless":[8,34],"nodes":[9,19,25,46],"without":[10],"any":[11],"fixed":[12],"infrastructure":[13],"or":[14],"base":[15],"station,":[16],"in":[17,64,91,186],"which":[18,68,123],"communicate":[20],"directly":[21],"to":[22,39,48,67,133],"the":[23,55,69,118,127,135,143,163,176,184,187],"other":[24],"within":[26],"its":[27,49],"transmission":[28],"range":[29],"over":[30],"relatively":[31],"bandwidth":[32],"constrained":[33],"links.":[35],"MANET":[36,65,92],"vulnerable":[38],"various":[40],"types":[41],"attacks":[43,63],"from":[44,137],"malicious":[45,138],"due":[47,66],"spontaneous":[50],"nature":[51],"communication":[53,90],"and":[54,95,131,157,170,182],"absence":[56],"centralized":[58],"administrator.":[59],"There":[60],"are":[61],"many":[62],"legitimacy":[70],"network":[73,136],"compromised":[75],"such":[76],"as,":[77],"Black":[78],"Hole":[79,82],"Attack,":[80,83],"Worm":[81],"Byzantine":[84],"attack,":[85],"DoS":[86],"attack.":[87],"So,":[88],"secure":[89],"essential":[94],"challenging":[96],"task.":[97],"In":[98],"this":[99],"paper,":[100],"we":[101],"present":[102],"trust":[103,132],"based":[104],"Ad":[105],"hoc":[106],"On":[107],"Demand":[108],"Routing":[109],"protocol":[110,145],"for":[111],"MANET.":[112],"Our":[113],"proposed":[114,144,177],"algorithm":[115],"works":[116],"on":[117,126],"concept":[119,128],"honest":[121],"value":[122],"calculated":[125],"hop":[130],"protect":[134],"node.":[139],"The":[140],"performance":[141,181],"analyzed":[147],"using":[148],"throughput,":[149],"number":[150,158,166],"drop":[152],"packets,":[153],"packet":[154],"delivery":[155],"ratio":[156],"received":[160],"packets":[161],"with":[162],"variation":[164],"nodes,":[168],"speed":[169],"simulation":[171],"time.":[172],"Results":[173],"show":[174],"that":[175],"method":[178],"has":[179],"better":[180],"enhance":[183],"security":[185],"network.":[188]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":5}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
