{"id":"https://openalex.org/W1964912629","doi":"https://doi.org/10.1145/2393216.2393334","title":"Comparative analysis of Black Hole attack over Cloud Network using AODV and DSDV","display_name":"Comparative analysis of Black Hole attack over Cloud Network using AODV and DSDV","publication_year":2012,"publication_date":"2012-10-26","ids":{"openalex":"https://openalex.org/W1964912629","doi":"https://doi.org/10.1145/2393216.2393334","mag":"1964912629"},"language":"en","primary_location":{"id":"doi:10.1145/2393216.2393334","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2393216.2393334","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070637356","display_name":"Kamaljit Kaur","orcid":"https://orcid.org/0000-0001-7650-3788"},"institutions":[{"id":"https://openalex.org/I165682329","display_name":"Guru Nanak Dev University","ror":"https://ror.org/05ghzpa93","country_code":"IN","type":"education","lineage":["https://openalex.org/I165682329"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Kamaljit Kaur","raw_affiliation_strings":["Guru Nanak Dev University, Amritsar, India"],"affiliations":[{"raw_affiliation_string":"Guru Nanak Dev University, Amritsar, India","institution_ids":["https://openalex.org/I165682329"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069394869","display_name":"Gaurav Raj","orcid":"https://orcid.org/0000-0002-9806-5923"},"institutions":[{"id":"https://openalex.org/I110360157","display_name":"Lovely Professional University","ror":"https://ror.org/00et6q107","country_code":"IN","type":"education","lineage":["https://openalex.org/I110360157"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Gaurav Raj","raw_affiliation_strings":["Lovely Professional University, Phagwara, India","[Lovely Professional University, Phagwara, India]"],"affiliations":[{"raw_affiliation_string":"Lovely Professional University, Phagwara, India","institution_ids":["https://openalex.org/I110360157"]},{"raw_affiliation_string":"[Lovely Professional University, Phagwara, India]","institution_ids":["https://openalex.org/I110360157"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5070637356"],"corresponding_institution_ids":["https://openalex.org/I165682329"],"apc_list":null,"apc_paid":null,"fwci":0.7092,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.70194986,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"5","issue":null,"first_page":"706","last_page":"710"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7619479894638062},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.749327540397644},{"id":"https://openalex.org/keywords/packet-drop-attack","display_name":"Packet drop attack","score":0.6986923217773438},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5939232707023621},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5744929313659668},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5410640835762024},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.5015401840209961},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.48761311173439026},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.4708901047706604},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4648294448852539},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.45564043521881104},{"id":"https://openalex.org/keywords/ad-hoc-on-demand-distance-vector-routing","display_name":"Ad hoc On-Demand Distance Vector Routing","score":0.4369279742240906},{"id":"https://openalex.org/keywords/optimized-link-state-routing-protocol","display_name":"Optimized Link State Routing Protocol","score":0.41375288367271423},{"id":"https://openalex.org/keywords/link-state-routing-protocol","display_name":"Link-state routing protocol","score":0.24896135926246643},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.23832696676254272},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12272554636001587},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08998024463653564}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7619479894638062},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.749327540397644},{"id":"https://openalex.org/C35546906","wikidata":"https://www.wikidata.org/wiki/Q2900718","display_name":"Packet drop attack","level":5,"score":0.6986923217773438},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5939232707023621},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5744929313659668},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5410640835762024},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.5015401840209961},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.48761311173439026},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.4708901047706604},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4648294448852539},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.45564043521881104},{"id":"https://openalex.org/C104503742","wikidata":"https://www.wikidata.org/wiki/Q345335","display_name":"Ad hoc On-Demand Distance Vector Routing","level":5,"score":0.4369279742240906},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.41375288367271423},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.24896135926246643},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.23832696676254272},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12272554636001587},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08998024463653564},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2393216.2393334","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2393216.2393334","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.4300000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1516952532","https://openalex.org/W1535334933","https://openalex.org/W1581974098","https://openalex.org/W2011397212","https://openalex.org/W2082808718","https://openalex.org/W2098611419","https://openalex.org/W2104027054","https://openalex.org/W2332497558","https://openalex.org/W2478368853","https://openalex.org/W2786140847","https://openalex.org/W4301157910"],"related_works":["https://openalex.org/W3035283282","https://openalex.org/W2768875466","https://openalex.org/W2060805688","https://openalex.org/W1591014886","https://openalex.org/W2551975114","https://openalex.org/W2265231577","https://openalex.org/W2025838880","https://openalex.org/W2123281165","https://openalex.org/W2377438927","https://openalex.org/W1966866667"],"abstract_inverted_index":{"Cloud":[0,23],"Network":[1,24],"is":[2,37,61,148,167,174,183],"very":[3,62],"broad":[4],"and":[5,17,29,53,91,97,114,145,169,180],"unreliable":[6],"due":[7],"to":[8,65,79,85,104,177],"its":[9,21],"property":[10],"of":[11,15,40,48,75,94,107,127,130,138,154,161,186],"elasticity":[12],"in":[13,20,51,56,89,101],"number":[14],"VM":[16],"physical":[18],"nodes":[19,78],"Virtual":[22],"(VCN).":[25],"Nodes":[26],"can":[27,115],"join":[28],"withdraw":[30],"the":[31,38,73,81,102,117,159,178,184,187],"network":[32],"at":[33],"any":[34],"time.":[35],"Elasticity":[36],"advantage":[39],"cloud":[41],"computing":[42],"but":[43],"it":[44],"comes":[45],"with":[46],"lots":[47,93],"security":[49,88,95,106],"issues":[50],"routing":[52],"data":[54,108,118],"forwarding":[55],"between":[57],"packets.":[58],"VCN":[59,90,162],"working":[60],"much":[63,182],"similar":[64],"Mobile":[66],"Ad-Hoc":[67],"Networks":[68],"(MANETs)":[69],"which":[70,172],"rely":[71],"on":[72,158,189],"cooperation":[74],"all":[76,100],"participating":[77],"provide":[80],"fundamental":[82],"operations.":[83],"Due":[84],"non":[86],"centralized":[87],"MANET,":[92],"attacks":[96,129],"threats":[98],"are":[99],"way":[103],"exploit":[105,116],"routing.":[109],"Malicious":[110],"node":[111],"may":[112],"intervene":[113],"during":[119],"wireless":[120],"communication.":[121],"Different":[122],"protocols":[123],"have":[124],"different":[125],"impact":[126,153,185],"such":[128],"malicious":[131],"nodes.":[132],"In":[133],"this":[134],"paper":[135],"Comparative":[136],"analysis":[137],"Black":[139,155],"Hole":[140,156],"attack":[141,157,179,188],"for":[142],"both":[143,190],"Proactive":[144],"Reactive":[146],"protocol":[147,173],"taken":[149],"into":[150],"account.":[151],"The":[152],"performance":[160],"as":[163,165],"well":[164],"MANET":[166],"evaluated":[168],"finding":[170],"out":[171],"more":[175],"vulnerable":[176],"how":[181],"protocols.":[191]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
