{"id":"https://openalex.org/W2040581233","doi":"https://doi.org/10.1109/rndm.2015.7325226","title":"Dynamic source routing under attacks","display_name":"Dynamic source routing under attacks","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W2040581233","doi":"https://doi.org/10.1109/rndm.2015.7325226","mag":"2040581233"},"language":"en","primary_location":{"id":"doi:10.1109/rndm.2015.7325226","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rndm.2015.7325226","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.coventry.ac.uk/ws/files/21367156/Dynamic_Source_Routing_under_Attacks.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091227367","display_name":"Mohamed A. Abdelshafy","orcid":null},"institutions":[{"id":"https://openalex.org/I32062511","display_name":"Heriot-Watt University","ror":"https://ror.org/04mghma93","country_code":"GB","type":"education","lineage":["https://openalex.org/I32062511"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Mohamed A. Abdelshafy","raw_affiliation_strings":["School of Mathematical & Computer Sciences, Heriot-Watt University, Edinburgh, UK","School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh, UK"],"affiliations":[{"raw_affiliation_string":"School of Mathematical & Computer Sciences, Heriot-Watt University, Edinburgh, UK","institution_ids":["https://openalex.org/I32062511"]},{"raw_affiliation_string":"School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh, UK","institution_ids":["https://openalex.org/I32062511"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086255000","display_name":"Peter J. B. King","orcid":"https://orcid.org/0000-0002-5250-2112"},"institutions":[{"id":"https://openalex.org/I32062511","display_name":"Heriot-Watt University","ror":"https://ror.org/04mghma93","country_code":"GB","type":"education","lineage":["https://openalex.org/I32062511"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Peter J. B. King","raw_affiliation_strings":["School of Mathematical & Computer Sciences, Heriot-Watt University, Edinburgh, UK","School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh, UK"],"affiliations":[{"raw_affiliation_string":"School of Mathematical & Computer Sciences, Heriot-Watt University, Edinburgh, UK","institution_ids":["https://openalex.org/I32062511"]},{"raw_affiliation_string":"School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh, UK","institution_ids":["https://openalex.org/I32062511"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5091227367"],"corresponding_institution_ids":["https://openalex.org/I32062511"],"apc_list":null,"apc_paid":null,"fwci":1.4041,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.8404506,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2","issue":null,"first_page":"174","last_page":"180"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7426096796989441},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7150914669036865},{"id":"https://openalex.org/keywords/dynamic-source-routing","display_name":"Dynamic Source Routing","score":0.6551932096481323},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.6472941040992737},{"id":"https://openalex.org/keywords/link-state-routing-protocol","display_name":"Link-state routing protocol","score":0.6406876444816589},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.6301240921020508},{"id":"https://openalex.org/keywords/zone-routing-protocol","display_name":"Zone Routing Protocol","score":0.5820477604866028},{"id":"https://openalex.org/keywords/dsrflow","display_name":"DSRFLOW","score":0.5768325328826904},{"id":"https://openalex.org/keywords/static-routing","display_name":"Static routing","score":0.48345884680747986},{"id":"https://openalex.org/keywords/routing-information-protocol","display_name":"Routing Information Protocol","score":0.4489089250564575},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.41358378529548645}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7426096796989441},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7150914669036865},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.6551932096481323},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.6472941040992737},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.6406876444816589},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.6301240921020508},{"id":"https://openalex.org/C189884158","wikidata":"https://www.wikidata.org/wiki/Q8073926","display_name":"Zone Routing Protocol","level":5,"score":0.5820477604866028},{"id":"https://openalex.org/C193794138","wikidata":"https://www.wikidata.org/wiki/Q5206182","display_name":"DSRFLOW","level":5,"score":0.5768325328826904},{"id":"https://openalex.org/C204948658","wikidata":"https://www.wikidata.org/wiki/Q1119410","display_name":"Static routing","level":4,"score":0.48345884680747986},{"id":"https://openalex.org/C7573999","wikidata":"https://www.wikidata.org/wiki/Q207580","display_name":"Routing Information Protocol","level":5,"score":0.4489089250564575},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.41358378529548645},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/rndm.2015.7325226","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rndm.2015.7325226","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:openaire/5cc73324-8092-4003-96e9-2b8e2f412cac","is_oa":true,"landing_page_url":"https://pureportal.coventry.ac.uk/en/publications/5cc73324-8092-4003-96e9-2b8e2f412cac","pdf_url":"https://pure.coventry.ac.uk/ws/files/21367156/Dynamic_Source_Routing_under_Attacks.pdf","source":{"id":"https://openalex.org/S4306402411","display_name":"Pure (Coventry University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I73417466","host_organization_name":"Coventry University","host_organization_lineage":["https://openalex.org/I73417466"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Abdelshafy, M & King, P J B 2015, 'Dynamic Source Routing under Attacks', Paper presented at International Workshop on Reliable Networks Design and Modeling, Munich, Germany, 5/10/15 - 7/10/15 pp. 174-180. https://doi.org/10.1109/RNDM.2015.7325226","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.atira.dk:publications/5cc73324-8092-4003-96e9-2b8e2f412cac","is_oa":true,"landing_page_url":"https://pureportal.coventry.ac.uk/en/publications/dynamic-source-routing-under-attacks(5cc73324-8092-4003-96e9-2b8e2f412cac).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306402411","display_name":"Pure (Coventry University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I73417466","host_organization_name":"Coventry University","host_organization_lineage":["https://openalex.org/I73417466"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:openaire/5cc73324-8092-4003-96e9-2b8e2f412cac","is_oa":true,"landing_page_url":"https://pureportal.coventry.ac.uk/en/publications/5cc73324-8092-4003-96e9-2b8e2f412cac","pdf_url":"https://pure.coventry.ac.uk/ws/files/21367156/Dynamic_Source_Routing_under_Attacks.pdf","source":{"id":"https://openalex.org/S4306402411","display_name":"Pure (Coventry University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I73417466","host_organization_name":"Coventry University","host_organization_lineage":["https://openalex.org/I73417466"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Abdelshafy, M & King, P J B 2015, 'Dynamic Source Routing under Attacks', Paper presented at International Workshop on Reliable Networks Design and Modeling, Munich, Germany, 5/10/15 - 7/10/15 pp. 174-180. https://doi.org/10.1109/RNDM.2015.7325226","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2040581233.pdf","grobid_xml":"https://content.openalex.org/works/W2040581233.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W161883971","https://openalex.org/W1558230724","https://openalex.org/W1969871478","https://openalex.org/W2000548713","https://openalex.org/W2011593302","https://openalex.org/W2021976191","https://openalex.org/W2026635021","https://openalex.org/W2069860632","https://openalex.org/W2073421246","https://openalex.org/W2074622755","https://openalex.org/W2083719968","https://openalex.org/W2096805446","https://openalex.org/W2099574482","https://openalex.org/W2103610384","https://openalex.org/W2127931941","https://openalex.org/W2144712919","https://openalex.org/W2148929515","https://openalex.org/W2156636630","https://openalex.org/W2157457404","https://openalex.org/W2159573553","https://openalex.org/W2282456946","https://openalex.org/W2605729466","https://openalex.org/W4229814467","https://openalex.org/W6650655300","https://openalex.org/W6675315432","https://openalex.org/W6683088517","https://openalex.org/W6683468479","https://openalex.org/W6735716460"],"related_works":["https://openalex.org/W2407048881","https://openalex.org/W2125776561","https://openalex.org/W43799986","https://openalex.org/W2884568852","https://openalex.org/W2113081707","https://openalex.org/W3110081158","https://openalex.org/W2030859761","https://openalex.org/W2104041436","https://openalex.org/W2172271487","https://openalex.org/W2035841327"],"abstract_inverted_index":{"MANET":[0,42],"routing":[1,20,43,51,67],"protocols":[2,68],"are":[3,31,99],"designed":[4],"based":[5],"on":[6],"the":[7,16,19,58,70,82,92,105,113,125,129],"assumption":[8],"that":[9,45,81],"all":[10,95,104],"nodes":[11],"cooperate":[12],"without":[13],"maliciously":[14],"disrupting":[15],"operation":[17],"of":[18,25,28,50,60,72,84,94],"protocol.":[21],"A":[22],"large":[23],"number":[24],"attack":[26],"types":[27],"varying":[29],"severity":[30],"threatening":[32],"MANET.":[33],"Dynamic":[34],"Source":[35],"Routing":[36],"(DSR)":[37],"is":[38,87],"a":[39,118,137],"well-known":[40],"reactive":[41],"protocol":[44],"does":[46],"not":[47],"support":[48],"security":[49],"messages.":[52],"In":[53],"this":[54],"paper,":[55],"we":[56],"study":[57],"performance":[59,83,107],"both":[61],"DSR":[62,86,90],"and":[63,76],"its":[64],"flow-state":[65,85],"extension":[66],"in":[69,91,117,136],"presence":[71,93],"blackhole,":[73],"grayhole,":[74],"selfish":[75],"flooding":[77],"attacks.":[78,96],"We":[79],"conclude":[80],"better":[88],"than":[89],"Flooding":[97],"attacks":[98,110,126],"found":[100],"to":[101],"dramatically":[102],"impact":[103],"standard":[106],"metrics.":[108],"Blackhole":[109],"significantly":[111],"worse":[112],"packet":[114],"delivery":[115],"ratio":[116],"static":[119,138],"network":[120],"using":[121],"unmodified":[122],"DSR.":[123],"All":[124],"greatly":[127],"increase":[128],"end-to-end":[130],"delay;":[131],"an":[132],"effect":[133],"particularly":[134],"marked":[135],"network.":[139]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
