{"id":"https://openalex.org/W3080818669","doi":"https://doi.org/10.1142/s0218126621500985","title":"Fuzzy-Based Reliability Prediction Model for Secure Routing Protocol Using GA and TLBO for Implementation of Black Hole Attacks in WSN","display_name":"Fuzzy-Based Reliability Prediction Model for Secure Routing Protocol Using GA and TLBO for Implementation of Black Hole Attacks in WSN","publication_year":2020,"publication_date":"2020-08-22","ids":{"openalex":"https://openalex.org/W3080818669","doi":"https://doi.org/10.1142/s0218126621500985","mag":"3080818669"},"language":"en","primary_location":{"id":"doi:10.1142/s0218126621500985","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218126621500985","pdf_url":null,"source":{"id":"https://openalex.org/S167602672","display_name":"Journal of Circuits Systems and Computers","issn_l":"0218-1266","issn":["0218-1266","1793-6454"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Circuits, Systems and Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076156880","display_name":"Sajad Nosratian","orcid":null},"institutions":[{"id":"https://openalex.org/I2801771032","display_name":"Islamic Azad University, Arak","ror":"https://ror.org/02558wk32","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I2801771032"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Sajad Nosratian","raw_affiliation_strings":["Department of Electrical Engineering, Arak Branch, Islamic Azad University, Arak, Iran"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Arak Branch, Islamic Azad University, Arak, Iran","institution_ids":["https://openalex.org/I2801771032"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072558426","display_name":"Masoud Moradkhani","orcid":"https://orcid.org/0000-0001-7215-0807"},"institutions":[{"id":"https://openalex.org/I4210165053","display_name":"Islamic Azad University Ilam Branch","ror":"https://ror.org/05r6qy592","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I4210165053"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Masoud Moradkhani","raw_affiliation_strings":["Department of Electrical Engineering, Ilam Branch, Islamic Azad University, Ilam, Iran"],"raw_orcid":"https://orcid.org/0000-0001-7215-0807","affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Ilam Branch, Islamic Azad University, Ilam, Iran","institution_ids":["https://openalex.org/I4210165053"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037536328","display_name":"Mohammad Bagher Tavakoli","orcid":"https://orcid.org/0000-0001-7829-7885"},"institutions":[{"id":"https://openalex.org/I2801771032","display_name":"Islamic Azad University, Arak","ror":"https://ror.org/02558wk32","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I2801771032"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mohammad Bagher Tavakoli","raw_affiliation_strings":["Department of Electrical Engineering, Arak Branch, Islamic Azad University, Arak, Iran"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Arak Branch, Islamic Azad University, Arak, Iran","institution_ids":["https://openalex.org/I2801771032"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5076156880"],"corresponding_institution_ids":["https://openalex.org/I2801771032"],"apc_list":null,"apc_paid":null,"fwci":0.9718,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.78194156,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"30","issue":"06","first_page":"2150098","last_page":"2150098"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.7358413338661194},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7320590019226074},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6827098727226257},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6188546419143677},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5936115980148315},{"id":"https://openalex.org/keywords/shortest-path-problem","display_name":"Shortest path problem","score":0.48718422651290894},{"id":"https://openalex.org/keywords/packet-drop-attack","display_name":"Packet drop attack","score":0.4815973937511444},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.47251376509666443},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.42740464210510254},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.42152369022369385},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.41638779640197754},{"id":"https://openalex.org/keywords/link-state-routing-protocol","display_name":"Link-state routing protocol","score":0.2690576910972595},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13299700617790222},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12589171528816223},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.0931042730808258},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.0817263126373291}],"concepts":[{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.7358413338661194},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7320590019226074},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6827098727226257},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6188546419143677},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5936115980148315},{"id":"https://openalex.org/C22590252","wikidata":"https://www.wikidata.org/wiki/Q1058754","display_name":"Shortest path problem","level":3,"score":0.48718422651290894},{"id":"https://openalex.org/C35546906","wikidata":"https://www.wikidata.org/wiki/Q2900718","display_name":"Packet drop attack","level":5,"score":0.4815973937511444},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.47251376509666443},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.42740464210510254},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.42152369022369385},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.41638779640197754},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.2690576910972595},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13299700617790222},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12589171528816223},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0931042730808258},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.0817263126373291},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0218126621500985","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218126621500985","pdf_url":null,"source":{"id":"https://openalex.org/S167602672","display_name":"Journal of Circuits Systems and Computers","issn_l":"0218-1266","issn":["0218-1266","1793-6454"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Circuits, Systems and Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1887407897","https://openalex.org/W1979517778","https://openalex.org/W2060108852","https://openalex.org/W2111619626","https://openalex.org/W2140196014","https://openalex.org/W2155962605","https://openalex.org/W2158807150","https://openalex.org/W2411984193","https://openalex.org/W2505175450","https://openalex.org/W2528352590","https://openalex.org/W2585696635","https://openalex.org/W2612952973","https://openalex.org/W2786649125","https://openalex.org/W2792949922","https://openalex.org/W2955169987"],"related_works":["https://openalex.org/W2765293204","https://openalex.org/W1557263371","https://openalex.org/W3116615970","https://openalex.org/W2125459098","https://openalex.org/W2226934102","https://openalex.org/W2795339160","https://openalex.org/W2997892586","https://openalex.org/W2247989214","https://openalex.org/W4300620725","https://openalex.org/W2547906021"],"abstract_inverted_index":{"This":[0],"study":[1],"manifests":[2],"a":[3,23,41,58,62],"fuzzy-based":[4],"trust":[5,33],"prediction":[6],"model":[7],"for":[8,133,154,162,194,201],"detecting":[9,239],"malicious":[10,53,63,90,100],"nodes":[11,37,54],"in":[12,176,238],"wireless":[13],"sensor":[14,221],"networks":[15],"(WSN)":[16],"by":[17,95],"preventing":[18,241],"black":[19,59,242],"hole":[20,60,243],"attack.":[21],"Besides,":[22],"new":[24],"routing":[25],"protocol":[26],"based":[27,171,212],"on":[28,124,172,180,213],"the":[29,35,46,52,66,72,76,80,85,89,96,99,103,112,125,138,159,163,173,181,191,198,202,206,214,220,224,229,233],"shortest":[30,73],"path":[31,36,74,116,195],"and":[32,128,148,169,211,223,240],"to":[34,50,79,88,111,121],"is":[38,92,118,167,209],"presented":[39],"with":[40,197],"fuzzy":[42,177],"estimator,":[43],"which":[44],"uses":[45],"data":[47,105],"mining":[48],"methods":[49],"detect":[51],"(black":[55],"holes).":[56],"In":[57,227],"attack,":[61],"node":[64,78,91,101,166,222],"selects":[65],"RREP":[67],"(Route":[68],"Replay)":[69],"message":[70],"as":[71,144],"from":[75],"source":[77],"destination":[81,113],"node.":[82,114],"After":[83,136],"that,":[84],"packet":[86,106],"sent":[87],"not":[93],"received":[94],"network.":[97],"Eventually,":[98],"releases":[102],"entire":[104],"instead":[107],"of":[108,216],"sending":[109],"it":[110],"Optimal":[115],"selection":[117,196],"performed":[119],"according":[120],"different":[122,141],"algorithms":[123,142,235],"objective":[126,139,160],"function":[127,161],"its":[129],"results":[130,183,230],"are":[131,152,236],"observed":[132],"route":[134],"selection.":[135],"defining":[137],"function,":[140],"such":[143],"Genetic":[145],"Algorithm":[146],"(GA)":[147],"teaching\u2013learning-based":[149],"optimization":[150],"(TLBO)":[151],"utilized":[153],"routing.":[155],"For":[156],"each":[157],"algorithm,":[158],"most":[164],"secure":[165],"evaluated":[168],"simulated":[170],"parameters":[174],"defined":[175],"logic.":[178],"Based":[179],"simulation":[182],"under":[184],"MATLAB":[185],"software,":[186],"TLBO":[187],"algorithm":[188],"has":[189],"obtained":[190],"best":[192],"response":[193],"least":[199],"cost":[200],"target":[203],"performance.":[204],"Significantly,":[205],"proposed":[207,234],"method":[208],"simple":[210],"exchange":[215],"control":[217],"packets":[218],"between":[219],"base":[225],"station.":[226],"accession,":[228],"show":[231],"that":[232],"effective":[237],"attacks.":[244]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-10-10T00:00:00"}
