{"id":"https://openalex.org/W2974184504","doi":"https://doi.org/10.1109/ic3.2019.8844935","title":"Trust-based Enhanced Secure Routing against Rank and Sybil Attacks in IoT","display_name":"Trust-based Enhanced Secure Routing against Rank and Sybil Attacks in IoT","publication_year":2019,"publication_date":"2019-08-01","ids":{"openalex":"https://openalex.org/W2974184504","doi":"https://doi.org/10.1109/ic3.2019.8844935","mag":"2974184504"},"language":"en","primary_location":{"id":"doi:10.1109/ic3.2019.8844935","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2019.8844935","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Twelfth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060616935","display_name":"Aditya Tandon","orcid":"https://orcid.org/0000-0002-2063-3484"},"institutions":[{"id":"https://openalex.org/I191972202","display_name":"Amity University","ror":"https://ror.org/02n9z0v62","country_code":"IN","type":"education","lineage":["https://openalex.org/I191972202"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Aditya Tandon","raw_affiliation_strings":["Department of Computer Science and Engineering, Amity University, Noida, U. P., India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Amity University, Noida, U. P., India","institution_ids":["https://openalex.org/I191972202"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073070613","display_name":"Prakash Srivastava","orcid":"https://orcid.org/0000-0002-6793-8939"},"institutions":[{"id":"https://openalex.org/I191972202","display_name":"Amity University","ror":"https://ror.org/02n9z0v62","country_code":"IN","type":"education","lineage":["https://openalex.org/I191972202"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Prakash Srivastava","raw_affiliation_strings":["Department of Computer Science and Engineering, Amity University, Noida, U. P., India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Amity University, Noida, U. P., India","institution_ids":["https://openalex.org/I191972202"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5060616935"],"corresponding_institution_ids":["https://openalex.org/I191972202"],"apc_list":null,"apc_paid":null,"fwci":4.5978,"has_fulltext":false,"cited_by_count":61,"citation_normalized_percentile":{"value":0.95300834,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.7885274887084961},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7834435701370239},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7014542818069458},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.6667168140411377},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6017327308654785},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.5622274279594421},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5326088666915894},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4820602536201477},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.4775044322013855},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4609535038471222},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.41350260376930237},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.22492843866348267},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.0894937515258789},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08114448189735413}],"concepts":[{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.7885274887084961},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7834435701370239},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7014542818069458},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.6667168140411377},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6017327308654785},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.5622274279594421},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5326088666915894},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4820602536201477},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.4775044322013855},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4609535038471222},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.41350260376930237},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.22492843866348267},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0894937515258789},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08114448189735413},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3.2019.8844935","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2019.8844935","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Twelfth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.5099999904632568}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1749501882","https://openalex.org/W1971673042","https://openalex.org/W1988828201","https://openalex.org/W2028956415","https://openalex.org/W2217512864","https://openalex.org/W2292010581","https://openalex.org/W2325877089","https://openalex.org/W2529623821","https://openalex.org/W2612967926","https://openalex.org/W2733889053","https://openalex.org/W2742665190","https://openalex.org/W2774385268","https://openalex.org/W2902895589","https://openalex.org/W2908213881","https://openalex.org/W2953124607","https://openalex.org/W6688741434"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2163430401"],"abstract_inverted_index":{"The":[0,66,128,190],"Internet":[1],"of":[2,76,93,110,130,163,192,205,211],"Things":[3],"(IoT)":[4],"is":[5,42,108,133,168,196],"an":[6],"emerging":[7],"technology":[8],"that":[9,48,148],"plays":[10],"a":[11,19,175],"vital":[12],"role":[13],"in":[14,104,150,187,209],"interconnecting":[15],"various":[16,74],"objects":[17],"into":[18],"network":[20,40,107],"to":[21,173],"provide":[22,174],"desired":[23],"services":[24],"within":[25],"its":[26,200],"resource":[27,51],"constrained":[28],"characteristics.":[29],"In":[30,154],"IoT,":[31],"the":[32,43,58,91,105,111,131,140,146,152,161,188,193,203,206],"Routing":[33,158],"Protocol":[34],"for":[35,62,72,85],"Low":[36],"power":[37],"and":[38,100,113,170,184,216],"Lossy":[39],"(RPL)":[41],"standardized":[44],"proactive":[45],"routing":[46,60,77,124,178],"protocol":[47,208],"achieves":[49],"satisfying":[50],"consumption,":[52,215],"but":[53],"it":[54,171],"does":[55],"not":[56],"consider":[57],"node's":[59],"behavior":[61],"forwarding":[63],"data":[64],"packets.":[65],"malicious":[67],"intruders":[68],"exploit":[69],"these":[70,87],"loopholes":[71],"launching":[73],"forms":[75],"attacks.":[78,153],"Different":[79],"security":[80],"mechanisms":[81],"have":[82],"been":[83],"introduced":[84],"detecting":[86,151,181],"attacks":[88,95,102,186],"singly.":[89],"However,":[90],"launch":[92],"multiple":[94],"such":[96],"as":[97],"Rank":[98,183],"attack":[99],"Sybil":[101,185],"simultaneously":[103,180],"IoT":[106],"one":[109],"devastating":[112],"destructive":[114],"situations.":[115],"This":[116],"problem":[117],"can":[118],"be":[119],"solved":[120],"by":[121,179,198],"establishing":[122],"secure":[123,176],"with":[125,202],"trustworthy":[126],"nodes.":[127],"trustworthiness":[129],"nodes":[132],"determined":[134],"using":[135,160],"trust":[136],"evaluation":[137],"methods,":[138],"where":[139],"parameters":[141],"considered":[142],"are":[143],"based":[144],"on":[145],"factors":[147],"influence":[149],"this":[155],"work,":[156],"Providing":[157],"Security":[159],"Technique":[162],"Collective":[164],"Trust":[165],"(PROTECT)":[166],"mechanism":[167],"introduced,":[169],"aims":[172],"RPL":[177],"both":[182],"network.":[189],"advantage":[191],"proposed":[194],"scheme":[195],"highlighted":[197],"comparing":[199],"performance":[201,204],"Sec-Trust":[207],"terms":[210],"detection":[212],"accuracy,":[213],"energy":[214],"throughput.":[217]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
