{"id":"https://openalex.org/W2097019399","doi":"https://doi.org/10.1155/2010/793981","title":"A Novel Algorithm for Defending Path-Based Denial of Service Attacks in Sensor Networks","display_name":"A Novel Algorithm for Defending Path-Based Denial of Service Attacks in Sensor Networks","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W2097019399","doi":"https://doi.org/10.1155/2010/793981","mag":"2097019399"},"language":"en","primary_location":{"id":"doi:10.1155/2010/793981","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2010/793981","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1155/2010/793981","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://journals.sagepub.com/doi/pdf/10.1155/2010/793981","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001110769","display_name":"Ramzi Saifan","orcid":"https://orcid.org/0000-0002-3167-787X"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]},{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO","US"],"is_corresponding":false,"raw_author_name":"Ramzi Saifan","raw_affiliation_strings":["Department of Computer Engineering, Iowa State University, IA 50011, USA","Department of Computer Engineering, Jordan University of Science and Technology, Irbid 22110, Jordan","1 Department of Computer Engineering, Iowa State University, IA 50011, USA","2 Department of Computer Engineering, Jordan University of Science and Technology, Irbid 22110, Jordan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Iowa State University, IA 50011, USA","institution_ids":["https://openalex.org/I173911158"]},{"raw_affiliation_string":"Department of Computer Engineering, Jordan University of Science and Technology, Irbid 22110, Jordan","institution_ids":["https://openalex.org/I156983542"]},{"raw_affiliation_string":"1 Department of Computer Engineering, Iowa State University, IA 50011, USA","institution_ids":["https://openalex.org/I173911158"]},{"raw_affiliation_string":"2 Department of Computer Engineering, Jordan University of Science and Technology, Irbid 22110, Jordan","institution_ids":["https://openalex.org/I156983542"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061388913","display_name":"Omar Al\u2010Jarrah","orcid":null},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]},{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["JO","US"],"is_corresponding":true,"raw_author_name":"Omar Al-Jarrah","raw_affiliation_strings":["Department of Computer Engineering, Iowa State University, IA 50011, USA","Department of Computer Engineering, Jordan University of Science and Technology, Irbid 22110, Jordan","2 Department of Computer Engineering, Jordan University of Science and Technology, Irbid 22110, Jordan","1 Department of Computer Engineering, Iowa State University, IA 50011, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Iowa State University, IA 50011, USA","institution_ids":["https://openalex.org/I173911158"]},{"raw_affiliation_string":"Department of Computer Engineering, Jordan University of Science and Technology, Irbid 22110, Jordan","institution_ids":["https://openalex.org/I156983542"]},{"raw_affiliation_string":"2 Department of Computer Engineering, Jordan University of Science and Technology, Irbid 22110, Jordan","institution_ids":["https://openalex.org/I156983542"]},{"raw_affiliation_string":"1 Department of Computer Engineering, Iowa State University, IA 50011, USA","institution_ids":["https://openalex.org/I173911158"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5061388913"],"corresponding_institution_ids":["https://openalex.org/I156983542","https://openalex.org/I173911158"],"apc_list":{"value":2200,"currency":"USD","value_usd":2200},"apc_paid":{"value":2200,"currency":"USD","value_usd":2200},"fwci":0.7454,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.74945294,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"6","issue":"1","first_page":"793981","last_page":"793981"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8844133615493774},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8215794563293457},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.8022738695144653},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.765182375907898},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5948707461357117},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5783674716949463},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5638423562049866},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5499132871627808},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46271511912345886},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.44378992915153503},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3386523127555847}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8844133615493774},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8215794563293457},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.8022738695144653},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.765182375907898},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5948707461357117},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5783674716949463},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5638423562049866},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5499132871627808},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46271511912345886},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.44378992915153503},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3386523127555847},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2010/793981","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2010/793981","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1155/2010/793981","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:sae:intdis:v:6:y:2010:i:1:p:793981","is_oa":false,"landing_page_url":"https://journals.sagepub.com/doi/10.1155/2010/793981","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:90017540a8a640e7ae8e81241203b18c","is_oa":true,"landing_page_url":"https://doaj.org/article/90017540a8a640e7ae8e81241203b18c","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Journal of Distributed Sensor Networks, Vol 6 (2010)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2010/793981","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2010/793981","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1155/2010/793981","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2097019399.pdf","grobid_xml":"https://content.openalex.org/works/W2097019399.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W198390616","https://openalex.org/W2009124494","https://openalex.org/W2019396864","https://openalex.org/W2033751220","https://openalex.org/W2075718440","https://openalex.org/W2101963262","https://openalex.org/W2114495437","https://openalex.org/W2116269350","https://openalex.org/W2117984332","https://openalex.org/W2118592651","https://openalex.org/W2121527069","https://openalex.org/W2123080720","https://openalex.org/W2131924466","https://openalex.org/W2131994112","https://openalex.org/W2140372921","https://openalex.org/W2143536181","https://openalex.org/W2143753548","https://openalex.org/W2146021366","https://openalex.org/W2152809170","https://openalex.org/W2153361534","https://openalex.org/W3140484331","https://openalex.org/W4214931895","https://openalex.org/W4249937476","https://openalex.org/W4285719527","https://openalex.org/W4302802902"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W2765763546","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W4239662759","https://openalex.org/W2471811227","https://openalex.org/W2039821316","https://openalex.org/W2388081684"],"abstract_inverted_index":{"Existing":[0],"end-to-end":[1],"security":[2,134],"mechanisms":[3],"are":[4,31,45],"vulnerable":[5],"to":[6,33,88,120,124,136,142],"path-based":[7],"denial":[8],"of":[9,18,165],"service":[10],"attacks":[11],"(PDoS).":[12],"If":[13],"checking":[14],"integrity":[15],"and":[16,85,180],"authenticity":[17],"a":[19,118,131],"message":[20],"is":[21,117,154,183],"done":[22],"only":[23],"at":[24],"the":[25,28,48,63,66,76,98,108,157,174],"final":[26],"destination,":[27],"intermediate":[29,53,80,122,140],"nodes":[30,54,64,72,78,81,111,123,141],"going":[32],"forward":[34],"bogus":[35,56,127,146],"packets":[36,102],"injected":[37,104,155],"by":[38,55,105],"an":[39,106],"adversary":[40,49],"many":[41],"hops":[42],"before":[43],"they":[44,86],"detected.":[46],"Therefore,":[47,115],"can":[50,161],"easily":[51],"overwhelm":[52],"or":[57,147],"replayed":[58,148],"packets.":[59,128],"This":[60],"attack":[61],"exhausts":[62],"along":[65],"path.":[67],"In":[68],"addition,":[69],"other":[70],"downstream":[71],"that":[73,95,170,181],"depend":[74],"on":[75],"exhausted":[77],"as":[79,150,152],"will":[82,112],"be":[83,113],"isolated,":[84],"have":[87],"find":[89],"alternative":[90],"paths.":[91],"Regarding":[92],"broadcast":[93],"traffic":[94],"originated":[96],"from":[97],"base":[99],"station,":[100],"if":[101],"were":[103],"adversary,":[107],"whole":[109],"network's":[110],"exhausted.":[114],"there":[116],"need":[119],"enable":[121,137],"filter":[125,143],"out":[126,144],"We":[129],"adopted":[130],"link":[132],"layer":[133],"scheme":[135,160],"en":[138],"route":[139],"any":[145],"packet":[149],"soon":[151],"it":[153,182],"into":[156],"network.":[158],"Our":[159],"handle":[162],"different":[163],"types":[164],"traffic.":[166],"Simulation":[167],"results":[168],"show":[169],"our":[171],"algorithm":[172,179],"outperforms":[173],"one-way":[175],"hash":[176],"chain":[177],"(OHC)":[178],"more":[184],"scalable.":[185]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
