{"id":"https://openalex.org/W2509708542","doi":"https://doi.org/10.1145/2905055.2905083","title":"A Survey of Attacks and Countermeasures for Denial of Services (DoS) in Wireless Ad hoc Networks","display_name":"A Survey of Attacks and Countermeasures for Denial of Services (DoS) in Wireless Ad hoc Networks","publication_year":2016,"publication_date":"2016-03-04","ids":{"openalex":"https://openalex.org/W2509708542","doi":"https://doi.org/10.1145/2905055.2905083","mag":"2509708542"},"language":"en","primary_location":{"id":"doi:10.1145/2905055.2905083","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905083","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100675984","display_name":"Praveen Gupta","orcid":"https://orcid.org/0009-0001-5781-2902"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Praveen Gupta","raw_affiliation_strings":["Priyatam Institute of Technology &amp; Management, Indore"],"affiliations":[{"raw_affiliation_string":"Priyatam Institute of Technology &amp; Management, Indore","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034310422","display_name":"Pratosh Bansal","orcid":"https://orcid.org/0000-0003-1696-3736"},"institutions":[{"id":"https://openalex.org/I138272832","display_name":"Devi Ahilya Vishwavidyalaya","ror":"https://ror.org/05c2p1f98","country_code":"IN","type":"education","lineage":["https://openalex.org/I138272832"]},{"id":"https://openalex.org/I4210129773","display_name":"Institute of Engineering","ror":"https://ror.org/03ny67e60","country_code":"NP","type":"education","lineage":["https://openalex.org/I155028946","https://openalex.org/I4210129773"]}],"countries":["IN","NP"],"is_corresponding":false,"raw_author_name":"Pratosh Bansal","raw_affiliation_strings":["Institute of Engineering &amp; Technology, DAVV, Indore"],"affiliations":[{"raw_affiliation_string":"Institute of Engineering &amp; Technology, DAVV, Indore","institution_ids":["https://openalex.org/I138272832","https://openalex.org/I4210129773"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100675984"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.7372,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.86342048,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7905920743942261},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7712359428405762},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7463999390602112},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.7439463138580322},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.6321843862533569},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5378981828689575},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.49288201332092285},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4839768409729004},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4818342924118042},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.467695951461792},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3605998754501343},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.20842692255973816},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.19763129949569702},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1750253438949585},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11337530612945557}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7905920743942261},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7712359428405762},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7463999390602112},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.7439463138580322},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.6321843862533569},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5378981828689575},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.49288201332092285},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4839768409729004},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4818342924118042},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.467695951461792},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3605998754501343},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.20842692255973816},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.19763129949569702},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1750253438949585},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11337530612945557},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2905055.2905083","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905083","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6200000047683716,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W613224761","https://openalex.org/W1515633611","https://openalex.org/W1590099998","https://openalex.org/W2036584242","https://openalex.org/W2043671319","https://openalex.org/W2044304742","https://openalex.org/W2058993660","https://openalex.org/W2077700077","https://openalex.org/W2078385828","https://openalex.org/W2078701696","https://openalex.org/W2093548529","https://openalex.org/W2097025901","https://openalex.org/W2113928343","https://openalex.org/W2114866901","https://openalex.org/W2125813026","https://openalex.org/W2130041528","https://openalex.org/W2145269204","https://openalex.org/W2149950925","https://openalex.org/W2312925553","https://openalex.org/W2315287847","https://openalex.org/W2337760432","https://openalex.org/W2338067179","https://openalex.org/W3084706010","https://openalex.org/W4231219113"],"related_works":["https://openalex.org/W2964948631","https://openalex.org/W2027636740","https://openalex.org/W3035283282","https://openalex.org/W2062688728","https://openalex.org/W2768875466","https://openalex.org/W1591014886","https://openalex.org/W2061231656","https://openalex.org/W2551975114","https://openalex.org/W1123412569","https://openalex.org/W2771454953"],"abstract_inverted_index":{"Wireless":[0],"networks":[1,21,24,44,69],"provide":[2],"an":[3],"easier":[4],"way":[5],"of":[6,66,84,104,123,132,135],"communication":[7,54],"to":[8,88,95,128,137],"its":[9,33],"users.":[10],"Network":[11,35],"without":[12],"infrastructure":[13,31],"are":[14,22,101,109,117],"more":[15,110],"flexible":[16],"in":[17],"deployment.":[18],"Ad":[19,42],"hoc":[20,43,68],"such":[23],"that":[25],"do":[26],"not":[27,118],"require":[28],"a":[29],"planned":[30],"during":[32],"establishment.":[34],"with":[36],"many":[37],"advantages":[38],"also":[39],"have":[40,45],"shortcomings.":[41],"resource":[46],"constraints":[47],"like":[48],"limited":[49],"bandwidth,":[50],"battery":[51],"power,":[52,58],"short":[53,61],"range,":[55],"less":[56],"computation":[57],"open":[59],"channel,":[60],"life":[62],"time.":[63],"These":[64,108],"characteristics":[65],"ad":[67],"make":[70,138],"them":[71,139],"vulnerable":[72],"for":[73,141],"attacks.":[74,107],"A":[75,121],"malicious":[76],"node,":[77],"either":[78],"from":[79,82],"outside":[80],"or":[81],"inside":[83],"network,":[85],"may":[86],"tries":[87,127],"disturb":[89],"the":[90,114,130,142],"network":[91,97,136],"operations":[92],"and":[93],"try":[94],"consume":[96],"resources.":[98],"Such":[99],"attacks":[100,112],"called":[102],"Denial":[103,122],"Services":[105],"(DoS)":[106,125],"dangerous":[111],"among":[113],"others.":[115],"They":[116],"easily":[119],"identifiable.":[120],"Service":[124],"attacker":[126],"vanish":[129],"resources":[131],"genuine":[133],"users":[134],"unavailable":[140],"network.":[143]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
