{"id":"https://openalex.org/W2008892019","doi":"https://doi.org/10.1109/icacci.2013.6637473","title":"Resilient PUMA (Protocol for Unified Multicasting through Announcement) against internal attacks in Mobile Ad hoc Networks","display_name":"Resilient PUMA (Protocol for Unified Multicasting through Announcement) against internal attacks in Mobile Ad hoc Networks","publication_year":2013,"publication_date":"2013-08-01","ids":{"openalex":"https://openalex.org/W2008892019","doi":"https://doi.org/10.1109/icacci.2013.6637473","mag":"2008892019"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2013.6637473","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2013.6637473","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112191322","display_name":"A. Menaka Pushpa","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"A. Menaka Pushpa","raw_affiliation_strings":["Department of CSE, Easwari Engineering College, Chennai, India","Dept of CSE, Easwari Engineering College, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Easwari Engineering College, Chennai, India","institution_ids":[]},{"raw_affiliation_string":"Dept of CSE, Easwari Engineering College, Chennai, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010304068","display_name":"K. Kathiravan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"K. Kathiravan","raw_affiliation_strings":["Department of CSE, Easwari Engineering College, Chennai, India","Dept of CSE, Easwari Engineering College, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Easwari Engineering College, Chennai, India","institution_ids":[]},{"raw_affiliation_string":"Dept of CSE, Easwari Engineering College, Chennai, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5112191322"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.5372,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.90060857,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1906","last_page":"1912"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7984797358512878},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7832616567611694},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5153193473815918},{"id":"https://openalex.org/keywords/protocol-independent-multicast","display_name":"Protocol Independent Multicast","score":0.46053576469421387},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.4447748363018036},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3806447386741638},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3804898262023926},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.37176811695098877}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7984797358512878},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7832616567611694},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5153193473815918},{"id":"https://openalex.org/C44892269","wikidata":"https://www.wikidata.org/wiki/Q782752","display_name":"Protocol Independent Multicast","level":3,"score":0.46053576469421387},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.4447748363018036},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3806447386741638},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3804898262023926},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.37176811695098877}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2013.6637473","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2013.6637473","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1492973630","https://openalex.org/W1530436711","https://openalex.org/W1598276955","https://openalex.org/W1773851490","https://openalex.org/W1867963980","https://openalex.org/W1981102606","https://openalex.org/W1987220151","https://openalex.org/W2004308396","https://openalex.org/W2025146798","https://openalex.org/W2028829725","https://openalex.org/W2072463110","https://openalex.org/W2096754592","https://openalex.org/W2098219839","https://openalex.org/W2123222113","https://openalex.org/W2127699957","https://openalex.org/W2144697507","https://openalex.org/W2148807201","https://openalex.org/W2157283388","https://openalex.org/W2169522546","https://openalex.org/W2383218167","https://openalex.org/W3112127769","https://openalex.org/W6629428752","https://openalex.org/W6631687241","https://openalex.org/W6635850559","https://openalex.org/W6678142983","https://openalex.org/W6862240463"],"related_works":["https://openalex.org/W2371847117","https://openalex.org/W4321384965","https://openalex.org/W80466176","https://openalex.org/W4239966178","https://openalex.org/W2370873522","https://openalex.org/W2080190883","https://openalex.org/W2393131931","https://openalex.org/W2542798775","https://openalex.org/W2099023627","https://openalex.org/W2352065055"],"abstract_inverted_index":{"In":[0,88],"Mobile":[1],"Ad":[2],"hoc":[3],"Networks,":[4],"entire":[5],"communication":[6,66],"solely":[7],"depends":[8],"on":[9,167],"multi-hop":[10],"routing":[11,83,96,172],"in":[12,85],"order":[13],"to":[14,47,145],"cover":[15],"the":[16,29,44,79,147],"larger":[17],"area":[18],"through":[19],"wireless":[20],"medium.":[21],"When":[22],"MANET":[23],"is":[24,43],"applicable":[25],"for":[26,112,135,179],"civilian":[27],"purpose,":[28],"cooperation":[30],"among":[31],"nodes":[32,61],"creates":[33],"more":[34,71],"security":[35,69,168],"issues.":[36],"Neighbor":[37],"dependency":[38],"without":[39],"any":[40],"centralized":[41],"authority":[42],"major":[45],"vulnerability":[46],"different":[48],"types":[49,101],"of":[50,81,102,149,170],"internal":[51,104,115,160,180],"attacks.":[52,105,139,161],"Internal":[53],"attacks":[54,181],"can":[55],"be":[56],"triggered":[57],"either":[58],"by":[59],"selfish":[60],"or":[62],"malicious":[63],"nodes.":[64],"Multicast":[65],"makes":[67],"this":[68,86,89,163],"issue":[70],"severe":[72],"where":[73],"non":[74],"group":[75],"members":[76],"are":[77,143],"also":[78],"part":[80],"multicast":[82,95],"structure":[84],"communication.":[87],"paper,":[90],"we":[91,107],"analyzed":[92],"a":[93,110],"mesh-based":[94],"protocol":[97,150,173],"PUMA":[98,171],"against":[99,159],"various":[100],"protocol-dependent":[103],"Also":[106],"have":[108],"proposed":[109,177],"solution":[111],"two":[113],"particular":[114],"attacks;":[116],"watchdog-based":[117],"data":[118],"packet":[119,133,137],"dropper":[120],"attacker":[121],"identification":[122],"and":[123,156,174],"validating":[124],"parent's":[125],"information":[126],"from":[127],"core":[128],"using":[129,182],"newly":[130],"added":[131],"control":[132,157],"MA-to-Core":[134],"MA":[136],"modification":[138],"NS2":[140],"simulation":[141,183],"results":[142],"used":[144],"observe":[146],"response":[148],"performance":[151],"metrics":[152],"such":[153],"as":[154],"PDR":[155],"overhead":[158],"Particularly":[162],"research":[164],"work":[165],"focuses":[166],"vulnerabilities":[169],"evaluate":[175],"our":[176],"solutions":[178],"results.":[184]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
