{"id":"https://openalex.org/W2785070165","doi":"https://doi.org/10.1145/3163058.3163062","title":"Detection of Malicious Node in Wireless Ad Hoc Network by Using Acknowledgement Based Approach","display_name":"Detection of Malicious Node in Wireless Ad Hoc Network by Using Acknowledgement Based Approach","publication_year":2017,"publication_date":"2017-11-24","ids":{"openalex":"https://openalex.org/W2785070165","doi":"https://doi.org/10.1145/3163058.3163062","mag":"2785070165"},"language":"en","primary_location":{"id":"doi:10.1145/3163058.3163062","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3163058.3163062","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 7th International Conference on Communication and Network Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053745516","display_name":"Khurram Gulzar Rana","orcid":null},"institutions":[{"id":"https://openalex.org/I12469534","display_name":"Quaid-i-Azam University","ror":"https://ror.org/04s9hft57","country_code":"PK","type":"education","lineage":["https://openalex.org/I12469534"]},{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN","PK"],"is_corresponding":true,"raw_author_name":"Khurram Gulzar Rana","raw_affiliation_strings":["College of Computer Science and Technology, Beijing University of Technology, Beijing, China and Quaid-i-Azam University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Beijing University of Technology, Beijing, China and Quaid-i-Azam University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I12469534","https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Cai Yongquan","orcid":null},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cai Yongquan","raw_affiliation_strings":["College of Computer Science and Technology, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103150228","display_name":"Muhammad Azeem","orcid":"https://orcid.org/0000-0003-0373-6112"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Muhammad Azeem","raw_affiliation_strings":["College of Computer Science and Technology, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020009828","display_name":"Allah Ditta","orcid":"https://orcid.org/0000-0003-1519-5982"},"institutions":[{"id":"https://openalex.org/I5100685","display_name":"University of Education","ror":"https://ror.org/052z7nw84","country_code":"PK","type":"education","lineage":["https://openalex.org/I5100685"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Allah Ditta","raw_affiliation_strings":["University of Education, Township Campus, Lahore, Pakistan"],"affiliations":[{"raw_affiliation_string":"University of Education, Township Campus, Lahore, Pakistan","institution_ids":["https://openalex.org/I5100685"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102986000","display_name":"Haiyang Yu","orcid":"https://orcid.org/0000-0003-3761-9598"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiyang Yu","raw_affiliation_strings":["College of Computer Science and Technology, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5053745516"],"corresponding_institution_ids":["https://openalex.org/I12469534","https://openalex.org/I37796252"],"apc_list":null,"apc_paid":null,"fwci":0.2193,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.62290355,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"76","last_page":"80"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8750861883163452},{"id":"https://openalex.org/keywords/acknowledgement","display_name":"Acknowledgement","score":0.7856369018554688},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7789591550827026},{"id":"https://openalex.org/keywords/ad-hoc-on-demand-distance-vector-routing","display_name":"Ad hoc On-Demand Distance Vector Routing","score":0.7094559073448181},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.6560826301574707},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5357562303543091},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.4687398076057434},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.45695921778678894},{"id":"https://openalex.org/keywords/dynamic-source-routing","display_name":"Dynamic Source Routing","score":0.4408644139766693},{"id":"https://openalex.org/keywords/distance-vector-routing-protocol","display_name":"Distance-vector routing protocol","score":0.4373951554298401},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.409884512424469},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.3292916715145111},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2806398868560791},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.17176252603530884},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10931187868118286},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10457262396812439}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8750861883163452},{"id":"https://openalex.org/C2777880217","wikidata":"https://www.wikidata.org/wiki/Q4674282","display_name":"Acknowledgement","level":2,"score":0.7856369018554688},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7789591550827026},{"id":"https://openalex.org/C104503742","wikidata":"https://www.wikidata.org/wiki/Q345335","display_name":"Ad hoc On-Demand Distance Vector Routing","level":5,"score":0.7094559073448181},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.6560826301574707},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5357562303543091},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.4687398076057434},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.45695921778678894},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.4408644139766693},{"id":"https://openalex.org/C202385902","wikidata":"https://www.wikidata.org/wiki/Q1229441","display_name":"Distance-vector routing protocol","level":5,"score":0.4373951554298401},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.409884512424469},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.3292916715145111},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2806398868560791},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.17176252603530884},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10931187868118286},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10457262396812439},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3163058.3163062","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3163058.3163062","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 7th International Conference on Communication and Network Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W147050607","https://openalex.org/W1529234757","https://openalex.org/W1852135084","https://openalex.org/W1935625188","https://openalex.org/W1965489815","https://openalex.org/W2031849950","https://openalex.org/W2053233646","https://openalex.org/W2054740590","https://openalex.org/W2086741052","https://openalex.org/W2097324407","https://openalex.org/W2102258543","https://openalex.org/W2117513023","https://openalex.org/W2128381560","https://openalex.org/W2490470238","https://openalex.org/W2539745726","https://openalex.org/W2565913672","https://openalex.org/W4231753281","https://openalex.org/W4232640163"],"related_works":["https://openalex.org/W2362328212","https://openalex.org/W4205295022","https://openalex.org/W2613388499","https://openalex.org/W2902224392","https://openalex.org/W2377438927","https://openalex.org/W2277666233","https://openalex.org/W2252200027","https://openalex.org/W2269045947","https://openalex.org/W2998608754","https://openalex.org/W2061561170"],"abstract_inverted_index":{"Providing":[0],"secure":[1],"communication":[2],"in":[3,9,19],"different":[4],"environments":[5],"is":[6,46,52],"very":[7],"vital":[8],"an":[10],"adhoc":[11,21],"network.":[12],"One":[13],"of":[14,81,127,154],"the":[15,102,110,113,119,125,139],"important":[16],"security":[17,57],"threats":[18],"wireless":[20],"networks":[22],"are":[23,28],"routing":[24,49],"attacks.":[25],"These":[26],"attacks":[27],"used":[29],"to":[30,55,94,101,109],"disconnect":[31],"a":[32,47,59,64,91],"sensor":[33],"network":[34],"from":[35],"its":[36],"central":[37],"base":[38],"station.":[39],"Ad":[40],"hoc":[41],"on-demand":[42],"distance":[43],"vector":[44],"(AODV)":[45],"dynamic":[48],"protocol":[50],"that":[51,88,138],"not":[53],"designed":[54],"consider":[56],"as":[58],"goal.":[60],"In":[61],"this":[62],"research,":[63],"novel":[65],"solution":[66],"AODV":[67],"Malicious":[68],"node":[69,85,123,144],"Detection":[70],"and":[71,104,130,156],"Removal":[72],"(AODV-":[73],"MDR)":[74],"has":[75,90],"been":[76],"proposed.":[77],"During":[78],"route":[79],"discovery":[80],"AODV-MDR,":[82],"every":[83],"intermediate":[84,115],"who":[86],"claims":[87],"it":[89],"fresh":[92],"path":[93,129],"destination,":[95],"must":[96],"send":[97],"Gratuitous":[98],"Route":[99],"Reply":[100],"destination":[103,105],"sends":[106],"acknowledgement":[107],"back":[108],"source":[111,122],"through":[112],"same":[114],"node.":[116],"Based":[117],"on":[118],"received":[120],"acknowledgement,":[121],"confirms":[124],"authenticity":[126],"claimed":[128],"also":[131],"applies":[132],"hop":[133],"count":[134],"verification.":[135],"Results":[136],"revealed":[137],"proposed":[140],"scheme":[141],"detect":[142],"malicious":[143],"with":[145],"great":[146],"accuracy.":[147],"Moreover,":[148],"AODV-MDR":[149],"works":[150],"without":[151],"any":[152],"overhead":[153],"encryption":[155],"hashing.":[157]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
