{"id":"https://openalex.org/W1997269689","doi":"https://doi.org/10.1109/iwcmc.2013.6583715","title":"Detecting attacks in QoS-OLSR protocol","display_name":"Detecting attacks in QoS-OLSR protocol","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W1997269689","doi":"https://doi.org/10.1109/iwcmc.2013.6583715","mag":"1997269689"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2013.6583715","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2013.6583715","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011569841","display_name":"Hiba Sanadiki","orcid":null},"institutions":[{"id":"https://openalex.org/I56306041","display_name":"Lebanese American University","ror":"https://ror.org/00hqkan37","country_code":"LB","type":"education","lineage":["https://openalex.org/I56306041"]}],"countries":["LB"],"is_corresponding":true,"raw_author_name":"Hiba Sanadiki","raw_affiliation_strings":["Department of Computer Science and Mathematics, Lebanese American University, Beirut, Lebanon","Dept. of Comput. Sci. & Math., Lebanese American Univ., Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Mathematics, Lebanese American University, Beirut, Lebanon","institution_ids":["https://openalex.org/I56306041"]},{"raw_affiliation_string":"Dept. of Comput. Sci. & Math., Lebanese American Univ., Beirut, Lebanon","institution_ids":["https://openalex.org/I56306041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049846737","display_name":"Hadi Otrok","orcid":"https://orcid.org/0000-0002-9574-5384"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Hadi Otrok","raw_affiliation_strings":["Department of ECE, Khalifa University of Science, Technology and Research, Abu Dhabi, UAE","Department of ECE, Khalifa University of Science, Technology & Research, Abu Dhabi, United Arab Emirates#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of ECE, Khalifa University of Science, Technology and Research, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I176601375"]},{"raw_affiliation_string":"Department of ECE, Khalifa University of Science, Technology & Research, Abu Dhabi, United Arab Emirates#TAB#","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005269467","display_name":"Azzam Mourad","orcid":"https://orcid.org/0000-0001-9434-5322"},"institutions":[{"id":"https://openalex.org/I56306041","display_name":"Lebanese American University","ror":"https://ror.org/00hqkan37","country_code":"LB","type":"education","lineage":["https://openalex.org/I56306041"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Azzam Mourad","raw_affiliation_strings":["Department of Computer Science and Mathematics, Lebanese American University, Beirut, Lebanon","Dept. of Comput. Sci. & Math., Lebanese American Univ., Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Mathematics, Lebanese American University, Beirut, Lebanon","institution_ids":["https://openalex.org/I56306041"]},{"raw_affiliation_string":"Dept. of Comput. Sci. & Math., Lebanese American Univ., Beirut, Lebanon","institution_ids":["https://openalex.org/I56306041"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009285242","display_name":"Jean\u2010Marc Robert","orcid":"https://orcid.org/0000-0002-9495-8038"},"institutions":[{"id":"https://openalex.org/I9736820","display_name":"\u00c9cole de Technologie Sup\u00e9rieure","ror":"https://ror.org/0020snb74","country_code":"CA","type":"education","lineage":["https://openalex.org/I49663120","https://openalex.org/I9736820"]},{"id":"https://openalex.org/I29607241","display_name":"\u00c9cole Normale Sup\u00e9rieure - PSL","ror":"https://ror.org/05a0dhs15","country_code":"FR","type":"funder","lineage":["https://openalex.org/I2746051580","https://openalex.org/I29607241"]}],"countries":["CA","FR"],"is_corresponding":false,"raw_author_name":"Jean-Marc Robert","raw_affiliation_strings":["D\u00e9partement de g\u00e9nie logiciel et des TI, \u00c9cole de technologie sup\u00e9rieure, Montreal, QUE, Canada","Dept. de Genie Logiciel et des TI, Ecole de Technol. Super., Montreal, QC, Canada"],"affiliations":[{"raw_affiliation_string":"D\u00e9partement de g\u00e9nie logiciel et des TI, \u00c9cole de technologie sup\u00e9rieure, Montreal, QUE, Canada","institution_ids":["https://openalex.org/I9736820"]},{"raw_affiliation_string":"Dept. de Genie Logiciel et des TI, Ecole de Technol. Super., Montreal, QC, Canada","institution_ids":["https://openalex.org/I29607241"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5011569841"],"corresponding_institution_ids":["https://openalex.org/I56306041"],"apc_list":null,"apc_paid":null,"fwci":2.1747,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.88330885,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1126","last_page":"1131"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7668801546096802},{"id":"https://openalex.org/keywords/optimized-link-state-routing-protocol","display_name":"Optimized Link State Routing Protocol","score":0.7104923725128174},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.7049976587295532},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.659558892250061},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.5209832787513733},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4750285744667053},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.4719984531402588},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.3027237355709076},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.0814816951751709}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7668801546096802},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.7104923725128174},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.7049976587295532},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.659558892250061},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.5209832787513733},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4750285744667053},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.4719984531402588},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.3027237355709076},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0814816951751709},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc.2013.6583715","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2013.6583715","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.47999998927116394,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1998955077","https://openalex.org/W2013880091","https://openalex.org/W2055371760","https://openalex.org/W2096062136","https://openalex.org/W2099669962","https://openalex.org/W2141144605","https://openalex.org/W2143977900","https://openalex.org/W2149389939","https://openalex.org/W2152547455","https://openalex.org/W2152849348","https://openalex.org/W2182078487","https://openalex.org/W2293636496","https://openalex.org/W4232277650","https://openalex.org/W6681198034","https://openalex.org/W6682301619"],"related_works":["https://openalex.org/W2998478967","https://openalex.org/W2188559950","https://openalex.org/W2989910292","https://openalex.org/W3128793638","https://openalex.org/W2607818178","https://openalex.org/W2123299109","https://openalex.org/W2021230337","https://openalex.org/W3153057489","https://openalex.org/W2107809065","https://openalex.org/W1997350652"],"abstract_inverted_index":{"In":[0,49],"this":[1,50],"paper,":[2],"we":[3,52,84],"detect":[4,74],"two":[5,54],"attacks":[6,55,76],"targeting":[7],"the":[8,36,41,44,61,75,88,100,108,115,118,124,129,134],"QoS-OLSR":[9,15,62],"protocol":[10,19],"MANET.":[11],"The":[12,30],"Cluster-based":[13],"model":[14,96,127],"is":[16,38],"a":[17,82],"multimedia":[18],"designed":[20],"on":[21],"top":[22],"of":[23,32,35,43,117],"Optimized":[24],"Link":[25],"State":[26],"Routing":[27],"(OLSR)":[28],"protocol.":[29],"quality":[31],"service":[33],"(QoS)":[34],"nodes":[37],"considered":[39],"during":[40],"selection":[42],"multi-point":[45],"relays":[46],"(MPRs)":[47],"nodes.":[48,80],"work,":[51],"identify":[53],"that":[56,114],"can":[57],"be":[58],"launched":[59],"against":[60],"protocol:":[63],"Identity":[64],"spoofing":[65],"attack,":[66],"and":[67,97,132],"wormhole":[68],"attack.":[69],"Watchdogs":[70],"are":[71],"used":[72],"to":[73,86,107],"performed":[77],"by":[78,91],"malicious":[79],"As":[81],"solution,":[83],"propose":[85],"improve":[87],"watchdogs'":[89],"detection":[90,130],"(1)":[92],"using":[93,104],"cooperative":[94,125],"watchdog":[95,109,126],"(2)":[98],"adding":[99],"posterior":[101],"belief":[102],"function":[103,121],"Bayes'":[105,119],"rule":[106,120],"model.":[110],"Simulation":[111],"results":[112],"show":[113],"use":[116],"along":[122],"with":[123],"improves":[128],"rate":[131],"reduces":[133],"false":[135],"positives.":[136]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
