{"id":"https://openalex.org/W2145407833","doi":"https://doi.org/10.1109/tvt.2008.2010049","title":"A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks","display_name":"A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks","publication_year":2008,"publication_date":"2008-12-04","ids":{"openalex":"https://openalex.org/W2145407833","doi":"https://doi.org/10.1109/tvt.2008.2010049","mag":"2145407833"},"language":"en","primary_location":{"id":"doi:10.1109/tvt.2008.2010049","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2008.2010049","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054868703","display_name":"Hidehisa Nakayama","orcid":null},"institutions":[{"id":"https://openalex.org/I103605164","display_name":"Tohoku Institute of Technology","ror":"https://ror.org/01phqre83","country_code":"JP","type":"education","lineage":["https://openalex.org/I103605164"]},{"id":"https://openalex.org/I201537933","display_name":"Tohoku University","ror":"https://ror.org/01dq60k83","country_code":"JP","type":"education","lineage":["https://openalex.org/I201537933"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"H. Nakayama","raw_affiliation_strings":["Department of Electronics and Intelligent Systems, Tohoku Institute of Technology, Sendai, Japan","Graduate School of Information Sciences, University of Tohoku, Sendai, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Intelligent Systems, Tohoku Institute of Technology, Sendai, Japan","institution_ids":["https://openalex.org/I103605164"]},{"raw_affiliation_string":"Graduate School of Information Sciences, University of Tohoku, Sendai, Japan","institution_ids":["https://openalex.org/I201537933"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020988406","display_name":"Satoshi Kurosawa","orcid":null},"institutions":[{"id":"https://openalex.org/I201537933","display_name":"Tohoku University","ror":"https://ror.org/01dq60k83","country_code":"JP","type":"education","lineage":["https://openalex.org/I201537933"]},{"id":"https://openalex.org/I4210133125","display_name":"Mitsubishi Electric (Japan)","ror":"https://ror.org/033y26782","country_code":"JP","type":"company","lineage":["https://openalex.org/I1306287861","https://openalex.org/I4210133125"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"S. Kurosawa","raw_affiliation_strings":["Graduate School of Information Sciences, University of Tohoku, Sendai, Japan","Information Technology Research and Development Center, Mitsubishi Electric Corporation Limited, Kamakura, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Sciences, University of Tohoku, Sendai, Japan","institution_ids":["https://openalex.org/I201537933"]},{"raw_affiliation_string":"Information Technology Research and Development Center, Mitsubishi Electric Corporation Limited, Kamakura, Japan","institution_ids":["https://openalex.org/I4210133125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086268677","display_name":"Abbas Jamalipour","orcid":"https://orcid.org/0000-0002-1807-7220"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"A. Jamalipour","raw_affiliation_strings":["School of Electrical Information Engineering, University of Sydney, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical Information Engineering, University of Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103153778","display_name":"Y. Nemoto","orcid":"https://orcid.org/0000-0001-8547-4990"},"institutions":[{"id":"https://openalex.org/I201537933","display_name":"Tohoku University","ror":"https://ror.org/01dq60k83","country_code":"JP","type":"education","lineage":["https://openalex.org/I201537933"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Y. Nemoto","raw_affiliation_strings":["Graduate School of Information Sciences, University of Tohoku, Sendai, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Sciences, University of Tohoku, Sendai, Japan","institution_ids":["https://openalex.org/I201537933"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013311265","display_name":"Nei Kato","orcid":"https://orcid.org/0000-0001-8769-302X"},"institutions":[{"id":"https://openalex.org/I201537933","display_name":"Tohoku University","ror":"https://ror.org/01dq60k83","country_code":"JP","type":"education","lineage":["https://openalex.org/I201537933"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"N. Kato","raw_affiliation_strings":["Graduate School of Information Sciences, University of Tohoku, Sendai, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Sciences, University of Tohoku, Sendai, Japan","institution_ids":["https://openalex.org/I201537933"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5054868703"],"corresponding_institution_ids":["https://openalex.org/I103605164","https://openalex.org/I201537933"],"apc_list":null,"apc_paid":null,"fwci":4.6217,"has_fulltext":false,"cited_by_count":139,"citation_normalized_percentile":{"value":0.95148106,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"58","issue":"5","first_page":"2471","last_page":"2481"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.7686470746994019},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.739841878414154},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.6659971475601196},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6047725677490234},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.5465741157531738},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5282655954360962},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.52381831407547},{"id":"https://openalex.org/keywords/ad-hoc-on-demand-distance-vector-routing","display_name":"Ad hoc On-Demand Distance Vector Routing","score":0.5230836868286133},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.468874454498291},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.46735480427742004},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.44226574897766113},{"id":"https://openalex.org/keywords/network-simulation","display_name":"Network simulation","score":0.4352455139160156},{"id":"https://openalex.org/keywords/dynamic-network-analysis","display_name":"Dynamic network analysis","score":0.4161398410797119},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.38465094566345215},{"id":"https://openalex.org/keywords/optimized-link-state-routing-protocol","display_name":"Optimized Link State Routing Protocol","score":0.3473284840583801},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3290539085865021},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.28339990973472595},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.23731639981269836},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2252536416053772},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16499507427215576}],"concepts":[{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.7686470746994019},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.739841878414154},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.6659971475601196},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6047725677490234},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.5465741157531738},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5282655954360962},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.52381831407547},{"id":"https://openalex.org/C104503742","wikidata":"https://www.wikidata.org/wiki/Q345335","display_name":"Ad hoc On-Demand Distance Vector Routing","level":5,"score":0.5230836868286133},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.468874454498291},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.46735480427742004},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.44226574897766113},{"id":"https://openalex.org/C139940560","wikidata":"https://www.wikidata.org/wiki/Q290036","display_name":"Network simulation","level":2,"score":0.4352455139160156},{"id":"https://openalex.org/C13540734","wikidata":"https://www.wikidata.org/wiki/Q5318996","display_name":"Dynamic network analysis","level":2,"score":0.4161398410797119},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.38465094566345215},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.3473284840583801},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3290539085865021},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.28339990973472595},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.23731639981269836},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2252536416053772},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16499507427215576},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tvt.2008.2010049","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2008.2010049","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W1497474439","https://openalex.org/W1498841687","https://openalex.org/W1585105376","https://openalex.org/W1585904702","https://openalex.org/W1592014423","https://openalex.org/W1598276955","https://openalex.org/W1601456732","https://openalex.org/W1639305476","https://openalex.org/W1660562555","https://openalex.org/W1965489815","https://openalex.org/W1982488304","https://openalex.org/W1996360405","https://openalex.org/W2007035529","https://openalex.org/W2029192198","https://openalex.org/W2030007850","https://openalex.org/W2072463110","https://openalex.org/W2073276729","https://openalex.org/W2079406686","https://openalex.org/W2102258543","https://openalex.org/W2105973333","https://openalex.org/W2118657452","https://openalex.org/W2119896609","https://openalex.org/W2120118843","https://openalex.org/W2123861314","https://openalex.org/W2127182941","https://openalex.org/W2127857354","https://openalex.org/W2127931941","https://openalex.org/W2131152570","https://openalex.org/W2144508499","https://openalex.org/W2147882403","https://openalex.org/W2148135143","https://openalex.org/W2152580429","https://openalex.org/W2156186849","https://openalex.org/W2157283388","https://openalex.org/W2158210197","https://openalex.org/W2158923961","https://openalex.org/W2161457646","https://openalex.org/W2164887869","https://openalex.org/W2165251806","https://openalex.org/W2171500735","https://openalex.org/W2297141755","https://openalex.org/W2401641955","https://openalex.org/W2798909945","https://openalex.org/W3016210511","https://openalex.org/W3017143921","https://openalex.org/W3112127769","https://openalex.org/W4230399697","https://openalex.org/W4232836212","https://openalex.org/W4285719527","https://openalex.org/W4289127653","https://openalex.org/W4299552862","https://openalex.org/W6634792877","https://openalex.org/W6678111283","https://openalex.org/W6682323612","https://openalex.org/W6713346467"],"related_works":["https://openalex.org/W2498610847","https://openalex.org/W2995307897","https://openalex.org/W4381803840","https://openalex.org/W2617010542","https://openalex.org/W2092866584","https://openalex.org/W2383797298","https://openalex.org/W1544340523","https://openalex.org/W1966866667","https://openalex.org/W2392962406","https://openalex.org/W2523339545"],"abstract_inverted_index":{"Mobile":[0],"ad":[1],"hoc":[2],"networks":[3,218],"(MANETs)":[4],"are":[5,16,77],"usually":[6,103],"formed":[7],"without":[8],"any":[9,117],"major":[10],"infrastructure.":[11],"As":[12],"a":[13,27,58,91,128,136,148,154,187],"result,":[14],"they":[15],"relatively":[17],"vulnerable":[18],"to":[19,40,80,105,163,198],"malicious":[20,42,53,83,118],"network":[21,49,193],"attacks,":[22],"and":[23,109,186,203],"therefore,":[24],"security":[25],"is":[26,38,63,95,102,140],"more":[28],"significant":[29],"issue":[30],"than":[31],"infrastructure-based":[32],"wireless":[33],"networks.":[34],"In":[35,73,88,143],"MANETs,":[36],"it":[37,62],"difficult":[39],"identify":[41],"hosts":[43,84],"as":[44,97],"the":[45,48,66,70,74,86,107,110,113,122,125,132,160,176,192,200,222,225],"topology":[46,111,126],"of":[47,65,112,127,135,210,224],"dynamically":[50,130],"changes.":[51],"A":[52],"host":[54,119],"can":[55],"easily":[56],"interrupt":[57],"route":[59],"for":[60,206],"which":[61,94],"one":[64],"forming":[67],"nodes":[68],"in":[69,219],"communication":[71],"path.":[72],"literature,":[75],"there":[76],"several":[78],"proposals":[79],"detect":[81],"such":[82],"inside":[85],"network.":[87,123],"those":[89],"methods,":[90],"baseline":[92,138],"profile,":[93],"defined":[96],"per":[98],"static":[99,137],"training":[100,161],"data,":[101],"used":[104],"verify":[106],"identity":[108],"network,":[114],"thus":[115],"preventing":[116],"from":[120],"joining":[121],"Since":[124],"MANET":[129,201],"changes,":[131],"mere":[133],"use":[134,191],"profile":[139],"not":[141],"efficient.":[142],"this":[144],"paper,":[145],"we":[146],"propose":[147],"new":[149],"anomaly-detection":[150],"scheme":[151],"based":[152,179],"on":[153,180],"dynamic":[155,171],"learning":[156,172],"process":[157,173],"that":[158],"allows":[159],"data":[162],"be":[164],"updated":[165],"at":[166],"particular":[167],"time":[168],"intervals.":[169],"Our":[170],"involves":[174],"calculating":[175],"projection":[177],"distances":[178],"multidimensional":[181],"statistics":[182],"using":[183],"weighted":[184],"coefficients":[185],"forgetting":[188],"curve.":[189],"We":[190],"simulator":[194],"2":[195],"(ns-2)":[196],"system":[197],"conduct":[199],"simulations":[202],"consider":[204],"scenarios":[205],"detecting":[207],"five":[208],"types":[209],"attacks.":[211],"The":[212],"simulation":[213],"results":[214],"involving":[215],"two":[216],"different":[217],"size":[220],"show":[221],"effectiveness":[223],"proposed":[226],"techniques.":[227]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":9},{"year":2017,"cited_by_count":12},{"year":2016,"cited_by_count":15},{"year":2015,"cited_by_count":9},{"year":2014,"cited_by_count":23},{"year":2013,"cited_by_count":21},{"year":2012,"cited_by_count":10}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
