{"id":"https://openalex.org/W1966182548","doi":"https://doi.org/10.1109/wowmom.2010.5534944","title":"Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording","display_name":"Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording","publication_year":2010,"publication_date":"2010-06-01","ids":{"openalex":"https://openalex.org/W1966182548","doi":"https://doi.org/10.1109/wowmom.2010.5534944","mag":"1966182548"},"language":"en","primary_location":{"id":"doi:10.1109/wowmom.2010.5534944","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wowmom.2010.5534944","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032724669","display_name":"Yanzhi Ren","orcid":"https://orcid.org/0000-0002-2286-1384"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yanzhi Ren","raw_affiliation_strings":["Department of ECE, Castle Point on Hudson, Stevens Institute of Technology, Hoboken, NJ, USA","Dept. of ECE, Stevens Institute of Technology Castle Point on Hudson, Hoboken, NJ 07030#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of ECE, Castle Point on Hudson, Stevens Institute of Technology, Hoboken, NJ, USA","institution_ids":["https://openalex.org/I108468826"]},{"raw_affiliation_string":"Dept. of ECE, Stevens Institute of Technology Castle Point on Hudson, Hoboken, NJ 07030#TAB#","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046998111","display_name":"Mooi Choo Chuah","orcid":"https://orcid.org/0000-0002-0117-0621"},"institutions":[{"id":"https://openalex.org/I186143895","display_name":"Lehigh University","ror":"https://ror.org/012afjb06","country_code":"US","type":"education","lineage":["https://openalex.org/I186143895"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mooi Choo Chuah","raw_affiliation_strings":["Department of CSE, Lehigh University, Bethlehem, PA, USA","Dept. of CSE, Lehigh University Castle Point on Hudson, Hoboken, NJ 07030 Bethlehem, PA 18015#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Lehigh University, Bethlehem, PA, USA","institution_ids":["https://openalex.org/I186143895"]},{"raw_affiliation_string":"Dept. of CSE, Lehigh University Castle Point on Hudson, Hoboken, NJ 07030 Bethlehem, PA 18015#TAB#","institution_ids":["https://openalex.org/I186143895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068383847","display_name":"Jie Yang","orcid":"https://orcid.org/0000-0002-8244-2181"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jie Yang","raw_affiliation_strings":["Department of ECE, Castle Point on Hudson, Stevens Institute of Technology, Hoboken, NJ, USA","Dept. of ECE, Stevens Institute of Technology Castle Point on Hudson, Hoboken, NJ 07030#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of ECE, Castle Point on Hudson, Stevens Institute of Technology, Hoboken, NJ, USA","institution_ids":["https://openalex.org/I108468826"]},{"raw_affiliation_string":"Dept. of ECE, Stevens Institute of Technology Castle Point on Hudson, Hoboken, NJ 07030#TAB#","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100394750","display_name":"Yingying Chen","orcid":"https://orcid.org/0000-0002-3994-766X"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yingying Chen","raw_affiliation_strings":["Department of ECE, Castle Point on Hudson, Stevens Institute of Technology, Hoboken, NJ, USA","Dept. of ECE, Stevens Institute of Technology Castle Point on Hudson, Hoboken, NJ 07030#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of ECE, Castle Point on Hudson, Stevens Institute of Technology, Hoboken, NJ, USA","institution_ids":["https://openalex.org/I108468826"]},{"raw_affiliation_string":"Dept. of ECE, Stevens Institute of Technology Castle Point on Hudson, Hoboken, NJ 07030#TAB#","institution_ids":["https://openalex.org/I108468826"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5032724669"],"corresponding_institution_ids":["https://openalex.org/I108468826"],"apc_list":null,"apc_paid":null,"fwci":4.2735,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.94222761,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7812193036079407},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7391386032104492},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7284224033355713},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.6865697503089905},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5794141292572021},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5456323623657227},{"id":"https://openalex.org/keywords/packet-drop-attack","display_name":"Packet drop attack","score":0.5014402866363525},{"id":"https://openalex.org/keywords/battlefield","display_name":"Battlefield","score":0.48768818378448486},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.4358438551425934},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.4203086495399475},{"id":"https://openalex.org/keywords/link-state-routing-protocol","display_name":"Link-state routing protocol","score":0.10318461060523987}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7812193036079407},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7391386032104492},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7284224033355713},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.6865697503089905},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5794141292572021},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5456323623657227},{"id":"https://openalex.org/C35546906","wikidata":"https://www.wikidata.org/wiki/Q2900718","display_name":"Packet drop attack","level":5,"score":0.5014402866363525},{"id":"https://openalex.org/C2779669469","wikidata":"https://www.wikidata.org/wiki/Q4895508","display_name":"Battlefield","level":2,"score":0.48768818378448486},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.4358438551425934},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.4203086495399475},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.10318461060523987},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C195244886","wikidata":"https://www.wikidata.org/wiki/Q41493","display_name":"Ancient history","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/wowmom.2010.5534944","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wowmom.2010.5534944","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.308.6775","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.308.6775","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cse.lehigh.edu/~chuah/publications/d-span.pdf","raw_type":"text"},{"id":"pmh:oai:alma.01RUT_INST:11685432700004646","is_oa":false,"landing_page_url":"https://scholarship.libraries.rutgers.edu/esploro/outputs/conferenceProceeding/Detecting-blackhole-attacks-in-Disruption-Tolerant-Networks/991031758438504646","pdf_url":null,"source":{"id":"https://openalex.org/S4210197018","display_name":"View","issn_l":"2688-268X","issn":["2688-268X","2688-3988"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Proceedings"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6299999952316284,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1923680614","https://openalex.org/W2007634297","https://openalex.org/W2010634640","https://openalex.org/W2069929443","https://openalex.org/W2090636507","https://openalex.org/W2099817583","https://openalex.org/W2107930846","https://openalex.org/W2109382821","https://openalex.org/W2109505558","https://openalex.org/W2127699957","https://openalex.org/W2142522527","https://openalex.org/W6674945332","https://openalex.org/W6676460472"],"related_works":["https://openalex.org/W1984179778","https://openalex.org/W2363573290","https://openalex.org/W2387459700","https://openalex.org/W4388150944","https://openalex.org/W653900512","https://openalex.org/W1559280668","https://openalex.org/W2362261179","https://openalex.org/W3123347851","https://openalex.org/W1489373009","https://openalex.org/W3159926017"],"abstract_inverted_index":{"The":[0,48],"Disruption":[1],"Tolerant":[2],"Networks":[3],"(DTNs)":[4],"are":[5,23,33],"especially":[6],"useful":[7],"in":[8,15,28,45,61],"providing":[9],"mission":[10],"critical":[11],"services":[12],"such":[13,58],"as":[14],"emergency":[16],"networks":[17],"or":[18],"battlefield":[19],"scenarios.":[20],"However,":[21],"DTNs":[22],"vulnerable":[24],"to":[25,70],"insider":[26,59,88,120],"attacks,":[27],"which":[29],"the":[30,36,46,72],"legitimate":[31],"nodes":[32,38,85],"compromised":[34],"and":[35,108,127],"adversary":[37],"launch":[39],"blackhole":[40],"attacks":[41,60,89,121],"by":[42,90],"dropping":[43],"packets":[44],"networks.":[47],"traditional":[49],"approaches":[50],"of":[51,75],"securing":[52],"routing":[53],"protocols":[54],"can":[55,86,118],"not":[56],"address":[57],"DTNs.":[62],"In":[63],"this":[64],"paper,":[65],"we":[66],"propose":[67],"a":[68],"method":[69,117],"secure":[71],"history":[73],"records":[74],"packet":[76,93],"delivery":[77,94],"information":[78],"at":[79],"each":[80],"contact":[81],"so":[82],"that":[83,115],"other":[84],"detect":[87,119],"analyzing":[91],"these":[92],"records.":[95],"We":[96],"evaluated":[97],"our":[98,116],"approach":[99],"through":[100],"extensive":[101],"simulations":[102],"using":[103],"both":[104],"Random":[105],"Way":[106],"Point":[107],"Zebranet":[109],"mobility":[110],"models.":[111],"Our":[112],"results":[113],"show":[114],"efficiently":[122],"with":[123],"high":[124],"detection":[125],"rate":[126],"low":[128],"false":[129],"positive":[130],"rate.":[131]},"counts_by_year":[{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":3},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":9}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
