{"id":"https://openalex.org/W2115060108","doi":"https://doi.org/10.1109/wts.2009.5068989","title":"Improving SAODV protocol with trust levels management, IDM and incentive cooperation in MANET","display_name":"Improving SAODV protocol with trust levels management, IDM and incentive cooperation in MANET","publication_year":2009,"publication_date":"2009-05-01","ids":{"openalex":"https://openalex.org/W2115060108","doi":"https://doi.org/10.1109/wts.2009.5068989","mag":"2115060108"},"language":"en","primary_location":{"id":"doi:10.1109/wts.2009.5068989","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wts.2009.5068989","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 Wireless Telecommunications Symposium","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075581736","display_name":"Floriano De Rango","orcid":"https://orcid.org/0000-0003-4901-6233"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"F. De Rango","raw_affiliation_strings":["DEIS Department, University of Calabria, Italy","DEIS Department, University of Calabria, Via P.Bucci, Arcavacata di Rende (CS), 87036 ITALY"],"affiliations":[{"raw_affiliation_string":"DEIS Department, University of Calabria, Italy","institution_ids":["https://openalex.org/I45204951"]},{"raw_affiliation_string":"DEIS Department, University of Calabria, Via P.Bucci, Arcavacata di Rende (CS), 87036 ITALY","institution_ids":["https://openalex.org/I45204951"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5075581736"],"corresponding_institution_ids":["https://openalex.org/I45204951"],"apc_list":null,"apc_paid":null,"fwci":2.0571,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.87890978,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.7319695949554443},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5951685905456543},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.5574719309806824},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5298866033554077},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.4638715982437134},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4154953360557556},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3711444139480591},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3008105754852295},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.09993761777877808},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.08090990781784058},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.0602743923664093}],"concepts":[{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.7319695949554443},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5951685905456543},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.5574719309806824},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5298866033554077},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.4638715982437134},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4154953360557556},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3711444139480591},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3008105754852295},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.09993761777877808},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.08090990781784058},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0602743923664093},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wts.2009.5068989","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wts.2009.5068989","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 Wireless Telecommunications Symposium","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.46000000834465027,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W794907248","https://openalex.org/W1598276955","https://openalex.org/W1982488304","https://openalex.org/W2067514565","https://openalex.org/W2072463110","https://openalex.org/W2081633971","https://openalex.org/W2096333427","https://openalex.org/W2096371059","https://openalex.org/W2113613181","https://openalex.org/W2122744359","https://openalex.org/W2131595204","https://openalex.org/W2133794215","https://openalex.org/W2135057483","https://openalex.org/W2149449135","https://openalex.org/W2158210197","https://openalex.org/W2164489551","https://openalex.org/W3112127769","https://openalex.org/W6622739403","https://openalex.org/W6668762167","https://openalex.org/W6674602191","https://openalex.org/W6681803762","https://openalex.org/W6862240463"],"related_works":["https://openalex.org/W2487711956","https://openalex.org/W614303547","https://openalex.org/W2074775281","https://openalex.org/W2386617555","https://openalex.org/W2357638661","https://openalex.org/W2008747918","https://openalex.org/W2160999185","https://openalex.org/W3099073492","https://openalex.org/W1997695168","https://openalex.org/W2130827614"],"abstract_inverted_index":{"Traditional":[0],"routing":[1,58],"protocols":[2],"deployed":[3],"to":[4,55,64,69,73,94,109,119,149],"provide":[5],"communication":[6],"among":[7],"mobile":[8],"nodes":[9,77,102,131],"in":[10,62,147,156],"wireless":[11],"ad":[12],"hoc":[13],"networks":[14],"(MANET)":[15],"assume":[16],"a":[17,33,56,87,91],"trust":[18],"and":[19,32,43,68,90,98,115,127,136,142,160],"collaborating":[20],"environment":[21,37],"inside":[22],"the":[23,41,80,96,121,124,129,151],"network.":[24,81],"However,":[25],"this":[26,47],"assumption":[27],"is":[28,140],"not":[29],"always":[30],"true":[31],"hostile":[34],"or":[35],"unprotected":[36],"can":[38],"seriously":[39],"affect":[40],"protocol":[42,59,138],"network":[44],"performance.":[45],"In":[46],"work":[48],"two":[49],"kinds":[50],"of":[51,101,107,123,153],"approaches":[52],"are":[53,103,132],"applied":[54],"well-known":[57],"called":[60],"SAODV":[61,108],"order":[63,148],"improve":[65],"its":[66],"performance":[67],"offer":[70,110],"more":[71],"resilience":[72],"attack":[74],"from":[75],"malicious":[76,99],"authenticated":[78],"by":[79],"A":[82],"preventive":[83],"approach":[84,93],"based":[85],"on":[86],"cryptographic":[88],"mechanism":[89,113,117],"reactive":[92],"detect":[95],"anomalous":[97],"behavior":[100],"considered.":[104],"An":[105],"extension":[106],"Intrusion":[111],"Detection":[112],"(IDM)":[114],"trust-based":[116],"(TBM)":[118],"promote":[120],"collaboration":[122],"cooperating":[125],"node":[126],"penalize":[128],"selfish":[130],"proposed.":[133],"The":[134],"extended":[135],"proposed":[137],"SAODV-SDO":[139],"presented":[141],"simulation":[143],"results":[144],"were":[145],"performed":[146],"show":[150],"effectiveness":[152],"our":[154],"proposal":[155],"comparison":[157],"with":[158],"AODV":[159],"SAODV.":[161]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
