{"id":"https://openalex.org/W3138141529","doi":"https://doi.org/10.1109/imcom51814.2021.9377357","title":"Hierarchical Cooperative Intrusion Detection Method for MANETs (HCIDM)","display_name":"Hierarchical Cooperative Intrusion Detection Method for MANETs (HCIDM)","publication_year":2021,"publication_date":"2021-01-04","ids":{"openalex":"https://openalex.org/W3138141529","doi":"https://doi.org/10.1109/imcom51814.2021.9377357","mag":"3138141529"},"language":"en","primary_location":{"id":"doi:10.1109/imcom51814.2021.9377357","is_oa":false,"landing_page_url":"https://doi.org/10.1109/imcom51814.2021.9377357","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022705932","display_name":"Teresia Ankome","orcid":null},"institutions":[{"id":"https://openalex.org/I101993903","display_name":"Namibia University of Science and Technology","ror":"https://ror.org/03gg1ey66","country_code":"NA","type":"education","lineage":["https://openalex.org/I101993903"]}],"countries":["NA"],"is_corresponding":true,"raw_author_name":"Teresia Ankome","raw_affiliation_strings":["Department of Computer Science, Namibia University of Science and Technology, Windhoek, Namibia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Namibia University of Science and Technology, Windhoek, Namibia","institution_ids":["https://openalex.org/I101993903"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011400080","display_name":"Guy-Alain Lusilao Zodi","orcid":null},"institutions":[{"id":"https://openalex.org/I101993903","display_name":"Namibia University of Science and Technology","ror":"https://ror.org/03gg1ey66","country_code":"NA","type":"education","lineage":["https://openalex.org/I101993903"]}],"countries":["NA"],"is_corresponding":false,"raw_author_name":"Guy-Alain Lusilao Zodi","raw_affiliation_strings":["Department of Computer Science, Namibia University of Science and Technology, Windhoek, Namibia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Namibia University of Science and Technology, Windhoek, Namibia","institution_ids":["https://openalex.org/I101993903"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5022705932"],"corresponding_institution_ids":["https://openalex.org/I101993903"],"apc_list":null,"apc_paid":null,"fwci":0.1528,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.4692876,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8428237438201904},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7739709615707397},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.7553400993347168},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7026886343955994},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.6285037994384766},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5998116135597229},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5655389428138733},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.506194531917572},{"id":"https://openalex.org/keywords/routing-table","display_name":"Routing table","score":0.45350268483161926},{"id":"https://openalex.org/keywords/optimized-link-state-routing-protocol","display_name":"Optimized Link State Routing Protocol","score":0.42973899841308594},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.38158655166625977},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3233448565006256},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2741797864437103},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10230612754821777},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07309693098068237}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8428237438201904},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7739709615707397},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.7553400993347168},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7026886343955994},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.6285037994384766},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5998116135597229},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5655389428138733},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.506194531917572},{"id":"https://openalex.org/C184896649","wikidata":"https://www.wikidata.org/wiki/Q290066","display_name":"Routing table","level":4,"score":0.45350268483161926},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.42973899841308594},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38158655166625977},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3233448565006256},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2741797864437103},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10230612754821777},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07309693098068237},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/imcom51814.2021.9377357","is_oa":false,"landing_page_url":"https://doi.org/10.1109/imcom51814.2021.9377357","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1576792025","https://openalex.org/W1585105376","https://openalex.org/W2128381560","https://openalex.org/W2135988418","https://openalex.org/W2136087296","https://openalex.org/W2146069635","https://openalex.org/W2151042733","https://openalex.org/W2152238520","https://openalex.org/W2418407099","https://openalex.org/W2771422712","https://openalex.org/W6634474346","https://openalex.org/W6678915484"],"related_works":["https://openalex.org/W3035283282","https://openalex.org/W2364523259","https://openalex.org/W1975978427","https://openalex.org/W2768875466","https://openalex.org/W1591014886","https://openalex.org/W2551975114","https://openalex.org/W2025838880","https://openalex.org/W2123281165","https://openalex.org/W1511473871","https://openalex.org/W4210799434"],"abstract_inverted_index":{"In":[0,33,133],"the":[1,86,90,96,99,168,179,182,189,197,200,209,213,215,219,225,231,234,248,271],"recent":[2],"years,":[3],"mobile":[4,37,173],"ad":[5,174,254],"hoc":[6,175,255],"wireless":[7,100],"networks":[8,220],"(MANETs)":[9],"have":[10,56],"experienced":[11],"a":[12,57,75,113,153,172,192,237,263],"tremendous":[13],"rise":[14],"in":[15,42,78,112,121,125,129,149,212,252,275,286],"popularity":[16],"and":[17,23,69,95,116,230,292],"usage":[18],"due":[19,64,84],"to":[20,25,39,50,65,82,85,110,145,163,195,217,241],"their":[21],"flexibility":[22],"ability":[24],"provide":[26,36],"connectivity":[27],"from":[28],"anywhere":[29],"at":[30],"any":[31],"time.":[32],"general,":[34],"MANETs":[35,55,79,126],"communication":[38],"participating":[40],"nodes":[41,45,162,187],"situation":[43],"where":[44],"do":[46,117],"not":[47,118],"need":[48],"access":[49],"an":[51,138,203,253,278],"existing":[52,279],"network":[53,58,131,201],"infrastructure.":[54],"topology":[59],"that":[60,158,270],"changes":[61],"over":[62],"time":[63],"lack":[66],"of":[67,71,74,89,98,171,181,191,199,208,236,288],"infrastructure":[68],"mobility":[70],"nodes.":[72],"Detection":[73,105,142,283],"malicious":[76,193,238],"node":[77,94,194],"is":[80,127,152,221,228,239,245,268],"hard":[81],"achieve":[83],"dynamic":[87],"nature":[88,97],"relationships":[91],"between":[92,161],"moving":[93],"channel.":[101],"Most":[102],"traditional":[103],"Intrusion":[104,141,282],"System":[106],"(IDS)":[107],"are":[108],"designed":[109],"operate":[111,119],"centralized":[114],"manner;":[115],"properly":[120],"MANET":[122,261],"because":[123],"data":[124],"distributed":[128,154,222],"different":[130],"devices.":[132],"this":[134],"paper,":[135],"we":[136],"present":[137],"Hierarchical":[139],"Cooperative":[140],"Method":[143],"(HCIDM)":[144],"secure":[146],"packets":[147],"routing":[148,169],"MANETs.":[150],"HCIDM":[151,177,244,272],"intrusion":[155],"detection":[156],"mechanism":[157,210],"uses":[159],"collaboration":[160],"detect":[164],"active":[165],"attacks":[166],"against":[167],"table":[170],"network.":[176],"reduces":[178],"effectiveness":[180],"attack":[183],"by":[184],"informing":[185],"other":[186],"about":[188,233],"existence":[190],"keep":[196],"performance":[198],"within":[202],"acceptable":[204],"level.":[205],"The":[206],"novelty":[207],"lies":[211],"way":[214],"responsibility":[216],"protect":[218],"among":[223],"nodes,":[224],"trust":[226],"level":[227],"computed":[229],"information":[232],"presence":[235],"communicated":[240],"potential":[242],"victim.":[243],"coded":[246],"using":[247],"Network":[249],"Simulator":[250],"(NS-2)":[251],"on":[256],"demand":[257],"distance":[258],"vector":[259],"enable":[260],"during":[262],"black":[264],"hole":[265],"attack.":[266],"It":[267],"found":[269],"works":[273],"efficiently":[274],"comparison":[276],"with":[277],"Collaborative":[280],"Clustering":[281],"Mechanism":[284],"(CCIDM),":[285],"terms":[287],"delivery":[289],"ratio,":[290],"delay":[291],"throughput.":[293]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
