{"id":"https://openalex.org/W1995145575","doi":"https://doi.org/10.1109/icnsc.2010.5461523","title":"An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks","display_name":"An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks","publication_year":2010,"publication_date":"2010-04-01","ids":{"openalex":"https://openalex.org/W1995145575","doi":"https://doi.org/10.1109/icnsc.2010.5461523","mag":"1995145575"},"language":"en","primary_location":{"id":"doi:10.1109/icnsc.2010.5461523","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnsc.2010.5461523","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on Networking, Sensing and Control (ICNSC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026193065","display_name":"Marianne A. Azer","orcid":"https://orcid.org/0000-0002-8068-5120"},"institutions":[{"id":"https://openalex.org/I57629906","display_name":"Nile University","ror":"https://ror.org/03cg7cp61","country_code":"EG","type":"education","lineage":["https://openalex.org/I57629906"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Marianne A. Azer","raw_affiliation_strings":["Nile University, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Nile University, Cairo, Egypt","institution_ids":["https://openalex.org/I57629906"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058274053","display_name":"Sherif El-Kassas","orcid":null},"institutions":[{"id":"https://openalex.org/I80693520","display_name":"American University in Cairo","ror":"https://ror.org/0176yqn58","country_code":"EG","type":"education","lineage":["https://openalex.org/I80693520"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Sherif M. El-Kassas","raw_affiliation_strings":["Department of Computer Science, American University, Cairo, Egypt","[Department of Computer Science, American University, Cairo, Egypt]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, American University, Cairo, Egypt","institution_ids":["https://openalex.org/I80693520"]},{"raw_affiliation_string":"[Department of Computer Science, American University, Cairo, Egypt]","institution_ids":["https://openalex.org/I80693520"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111939824","display_name":"Magdy S. El-Soudani","orcid":null},"institutions":[{"id":"https://openalex.org/I145487455","display_name":"Cairo University","ror":"https://ror.org/03q21mh05","country_code":"EG","type":"education","lineage":["https://openalex.org/I145487455"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Magdy S. El-Soudani","raw_affiliation_strings":["Electronics and Communications Engineering Department, Cairo University, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Electronics and Communications Engineering Department, Cairo University, Cairo, Egypt","institution_ids":["https://openalex.org/I145487455"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026193065"],"corresponding_institution_ids":["https://openalex.org/I57629906"],"apc_list":null,"apc_paid":null,"fwci":2.4929,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.89202344,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"5585","issue":null,"first_page":"366","last_page":"371"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8033724427223206},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.6716527342796326},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6441166400909424},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6136652827262878},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.5474666953086853},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5372758507728577},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5346739888191223},{"id":"https://openalex.org/keywords/wormhole","display_name":"Wormhole","score":0.5328230261802673},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5170744061470032},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.48731860518455505},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.45830798149108887},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4296817481517792},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.41229674220085144},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.3903891444206238},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3662640452384949},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.17434754967689514},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08728674054145813}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8033724427223206},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.6716527342796326},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6441166400909424},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6136652827262878},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.5474666953086853},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5372758507728577},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5346739888191223},{"id":"https://openalex.org/C29013271","wikidata":"https://www.wikidata.org/wiki/Q7544","display_name":"Wormhole","level":2,"score":0.5328230261802673},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5170744061470032},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.48731860518455505},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.45830798149108887},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4296817481517792},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.41229674220085144},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.3903891444206238},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3662640452384949},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.17434754967689514},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08728674054145813},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icnsc.2010.5461523","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnsc.2010.5461523","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on Networking, Sensing and Control (ICNSC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W93933837","https://openalex.org/W1580304666","https://openalex.org/W1583345160","https://openalex.org/W2019992918","https://openalex.org/W2075083124","https://openalex.org/W2090011098","https://openalex.org/W2096128372","https://openalex.org/W2099574482","https://openalex.org/W2105543555","https://openalex.org/W2117641543","https://openalex.org/W2128381560","https://openalex.org/W2133372405","https://openalex.org/W2137949826","https://openalex.org/W2138643266","https://openalex.org/W2138806178","https://openalex.org/W2146072508","https://openalex.org/W2150411054","https://openalex.org/W2151993488","https://openalex.org/W2153755097","https://openalex.org/W2167930752","https://openalex.org/W4231753281","https://openalex.org/W6603756503","https://openalex.org/W6634669601","https://openalex.org/W6634699991","https://openalex.org/W6681236487"],"related_works":["https://openalex.org/W3035283282","https://openalex.org/W2768875466","https://openalex.org/W1591014886","https://openalex.org/W2551975114","https://openalex.org/W2025838880","https://openalex.org/W2123281165","https://openalex.org/W1511473871","https://openalex.org/W2003275014","https://openalex.org/W4210799434","https://openalex.org/W1581687089"],"abstract_inverted_index":{"Due":[0],"to":[1,50,124,136,155,158,186],"their":[2,16,60],"diverse":[3],"applications,":[4],"ad":[5],"hoc":[6],"networks":[7],"are":[8,48,65],"appealing":[9],"for":[10,83,197],"use":[11],"in":[12,68,109,145,161,171],"many":[13,51],"domains.":[14],"However,":[15],"features":[17],"of":[18,22,31,41,45,102,192],"open":[19],"medium,":[20],"absence":[21],"infrastructure,":[23],"dynamic":[24],"changing":[25],"network":[26,107,163],"topology,":[27],"cooperative":[28],"algorithms,":[29],"lack":[30,40],"centralized":[32],"monitoring":[33],"and":[34,39,88,104,111,178],"management":[35],"point,":[36],"resource":[37],"constraints":[38],"a":[42,56,69,81,95],"clear":[43],"line":[44],"defense,":[46],"they":[47],"vulnerable":[49],"attacks.":[52],"Therefore,":[53],"there":[54],"is":[55,92,149,175,190],"major":[57],"concern":[58],"about":[59],"security.":[61],"Amongst":[62],"attacks":[63],"we":[64,79],"particularly":[66],"interested":[67],"severe":[70],"attack":[71,86,114],"called":[72,99],"the":[73,84,100,113,128,138,162,187,193],"wormhole":[74,85],"attack.":[75],"In":[76,122],"this":[77,126],"paper,":[78],"propose":[80],"scheme":[82,91,174],"detection":[87],"prevention.":[89],"This":[90,148],"based":[93,141],"on":[94,142],"social":[96],"science":[97],"theory":[98],"diffusion":[101],"innovations":[103],"serves":[105],"all":[106],"nodes":[108,160],"detecting":[110],"preventing":[112],"even":[115],"without":[116],"prior":[117],"interaction":[118],"with":[119],"malicious":[120],"nodes.":[121],"order":[123],"implement":[125],"scheme,":[127],"routing":[129],"protocol":[130],"must":[131],"be":[132,169],"modified":[133],"such":[134,198],"as":[135],"allow":[137],"route":[139],"selection":[140],"nodes'":[143],"opinions":[144],"each":[146,153],"others.":[147],"done":[150],"by":[151],"allowing":[152],"node":[154],"assign":[156],"weights":[157],"other":[159],"through":[164],"different":[165],"phases":[166],"that":[167],"will":[168],"explained":[170],"details.":[172],"The":[173],"totally":[176],"decentralized":[177],"does":[179],"not":[180],"add":[181],"an":[182],"extra":[183],"computational":[184],"complexity":[185],"nodes;":[188],"which":[189],"one":[191],"most":[194],"important":[195],"requirements":[196],"networks.":[199]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
