{"id":"https://openalex.org/W2026203830","doi":"https://doi.org/10.1109/ic3.2013.6612197","title":"MAODV: Modified wormhole detection AODV protocol","display_name":"MAODV: Modified wormhole detection AODV protocol","publication_year":2013,"publication_date":"2013-08-01","ids":{"openalex":"https://openalex.org/W2026203830","doi":"https://doi.org/10.1109/ic3.2013.6612197","mag":"2026203830"},"language":"en","primary_location":{"id":"doi:10.1109/ic3.2013.6612197","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2013.6612197","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Sixth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021226917","display_name":"Umesh Kumar Chaurasia","orcid":null},"institutions":[{"id":"https://openalex.org/I38335241","display_name":"National Institute of Technology Raipur","ror":"https://ror.org/02y553197","country_code":"IN","type":"education","lineage":["https://openalex.org/I38335241"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Umesh Kumar Chaurasia","raw_affiliation_strings":["Department of Electrical Engineering, National institute of technology, Raipur, Raipur, India","Dept. of Electr. Eng., Nat. Inst. of Technol., Raipur, India"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, National institute of technology, Raipur, Raipur, India","institution_ids":["https://openalex.org/I38335241"]},{"raw_affiliation_string":"Dept. of Electr. Eng., Nat. Inst. of Technol., Raipur, India","institution_ids":["https://openalex.org/I38335241"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043477240","display_name":"Varsha Singh","orcid":"https://orcid.org/0000-0001-5835-5400"},"institutions":[{"id":"https://openalex.org/I38335241","display_name":"National Institute of Technology Raipur","ror":"https://ror.org/02y553197","country_code":"IN","type":"education","lineage":["https://openalex.org/I38335241"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Varsha Singh","raw_affiliation_strings":["Department of Electrical Engineering, National institute of technology, Raipur, Raipur, India","Dept. of Electr. Eng., Nat. Inst. of Technol., Raipur, India"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, National institute of technology, Raipur, Raipur, India","institution_ids":["https://openalex.org/I38335241"]},{"raw_affiliation_string":"Dept. of Electr. Eng., Nat. Inst. of Technol., Raipur, India","institution_ids":["https://openalex.org/I38335241"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5021226917"],"corresponding_institution_ids":["https://openalex.org/I38335241"],"apc_list":null,"apc_paid":null,"fwci":4.3493,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.9471413,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"239","last_page":"243"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10069","display_name":"Antenna Design and Analysis","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wormhole","display_name":"Wormhole","score":0.8757503032684326},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8531413078308105},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7685104608535767},{"id":"https://openalex.org/keywords/ad-hoc-on-demand-distance-vector-routing","display_name":"Ad hoc On-Demand Distance Vector Routing","score":0.7590579986572266},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.7488915920257568},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.7130385637283325},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6375208497047424},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6220654845237732},{"id":"https://openalex.org/keywords/optimized-link-state-routing-protocol","display_name":"Optimized Link State Routing Protocol","score":0.5338172912597656},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.45793959498405457},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.43878450989723206},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.38523462414741516},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32265210151672363},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.302729994058609},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11184898018836975},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08802434802055359}],"concepts":[{"id":"https://openalex.org/C29013271","wikidata":"https://www.wikidata.org/wiki/Q7544","display_name":"Wormhole","level":2,"score":0.8757503032684326},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8531413078308105},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7685104608535767},{"id":"https://openalex.org/C104503742","wikidata":"https://www.wikidata.org/wiki/Q345335","display_name":"Ad hoc On-Demand Distance Vector Routing","level":5,"score":0.7590579986572266},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.7488915920257568},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.7130385637283325},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6375208497047424},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6220654845237732},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.5338172912597656},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.45793959498405457},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.43878450989723206},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.38523462414741516},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32265210151672363},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.302729994058609},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11184898018836975},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08802434802055359},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3.2013.6612197","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2013.6612197","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Sixth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6499999761581421,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1520481638","https://openalex.org/W1831773712","https://openalex.org/W1971026061","https://openalex.org/W2036358294","https://openalex.org/W2096734654","https://openalex.org/W2105543555","https://openalex.org/W2126302863","https://openalex.org/W2146072508","https://openalex.org/W2151993488","https://openalex.org/W2152617153","https://openalex.org/W2158210197","https://openalex.org/W6638622593","https://openalex.org/W6681236487"],"related_works":["https://openalex.org/W1123412569","https://openalex.org/W2768875466","https://openalex.org/W3013627169","https://openalex.org/W2362328212","https://openalex.org/W2498610847","https://openalex.org/W2774175436","https://openalex.org/W4205295022","https://openalex.org/W26370491","https://openalex.org/W2613388499","https://openalex.org/W2377438927"],"abstract_inverted_index":{"Mobile":[0],"ad-hoc":[1,23,40,59],"networks":[2],"are":[3],"a":[4,11,64,111],"collection":[5],"of":[6,17,36,52,93,124,131,142,160,165],"wireless":[7,32],"mobile":[8,22,58],"hosts":[9],"forming":[10],"temporary":[12],"network":[13,41,75,90],"without":[14],"the":[15,53,74,89,94],"aid":[16],"any":[18],"established":[19],"infrastructure.":[20],"In":[21,61,103],"networks,":[24],"data":[25,68],"transmission":[26],"is":[27,50,127,154,171],"performed":[28,128],"within":[29],"an":[30,106],"untrusted":[31],"environment.":[33],"The":[34,152,163],"lack":[35],"centralized":[37],"infrastructure":[38],"in":[39,73,133,145],"makes":[42],"it":[43],"vulnerable":[44],"to":[45,79,109,138,150,156],"various":[46],"attacks.":[47,162],"Wormhole":[48],"attack":[49,113,126],"one":[51,71],"most":[54],"severe":[55],"attacks":[56],"with":[57],"networks.":[60],"wormhole":[62,101,112,116,125,161,167],"attack,":[63],"malicious":[65,81],"node":[66,82,144],"records":[67],"packets":[69],"at":[70],"location":[72],"and":[76,140],"tunnels":[77],"them":[78,87],"another":[80],"far":[83],"away,":[84],"which":[85],"retransmits":[86],"into":[88],"locally.":[91],"Some":[92],"researchers":[95],"have":[96],"proposed":[97],"many":[98],"solutions":[99],"for":[100],"attack.":[102],"this":[104],"paper":[105],"efficient":[107],"method":[108],"detect":[110,157],"called":[114],"modified":[115,166],"detection":[117,168],"AODV":[118,169],"protocol":[119,170],"has":[120],"been":[121],"proposed.":[122],"Detection":[123],"using":[129],"number":[130],"hops":[132],"different":[134,146],"paths":[135,147],"from":[136,148],"source":[137,149],"destination":[139,153],"delay":[141],"each":[143],"destination.":[151],"able":[155],"both":[158],"kinds":[159],"performance":[164],"justified":[172],"by":[173],"simulations.":[174]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
