{"id":"https://openalex.org/W2222424037","doi":"https://doi.org/10.1155/2016/1620343","title":"Replica Node Detection Using Enhanced Single Hop Detection with Clonal Selection Algorithm in Mobile Wireless Sensor Networks","display_name":"Replica Node Detection Using Enhanced Single Hop Detection with Clonal Selection Algorithm in Mobile Wireless Sensor Networks","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2222424037","doi":"https://doi.org/10.1155/2016/1620343","mag":"2222424037"},"language":"en","primary_location":{"id":"doi:10.1155/2016/1620343","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2016/1620343","pdf_url":"https://downloads.hindawi.com/journals/jcnc/2016/1620343.pdf","source":{"id":"https://openalex.org/S2764435486","display_name":"Journal of Computer Networks and Communications","issn_l":"2090-7141","issn":["2090-7141","2090-715X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Networks and Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://downloads.hindawi.com/journals/jcnc/2016/1620343.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048774628","display_name":"L. S. Sindhuja","orcid":null},"institutions":[{"id":"https://openalex.org/I161045824","display_name":"Avinashilingam University","ror":"https://ror.org/05dxzqa20","country_code":"IN","type":"education","lineage":["https://openalex.org/I161045824"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"L. S. Sindhuja","raw_affiliation_strings":["Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women University, Bharathi Park Road, Mettupalayam Road, Coimbatore, Tamil Nadu 641043, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women University, Bharathi Park Road, Mettupalayam Road, Coimbatore, Tamil Nadu 641043, India","institution_ids":["https://openalex.org/I161045824"]}]},{"author_position":"last","author":{"id":null,"display_name":"G. Padmavathi","orcid":null},"institutions":[{"id":"https://openalex.org/I161045824","display_name":"Avinashilingam University","ror":"https://ror.org/05dxzqa20","country_code":"IN","type":"education","lineage":["https://openalex.org/I161045824"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"G. Padmavathi","raw_affiliation_strings":["Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women University, Bharathi Park Road, Mettupalayam Road, Coimbatore, Tamil Nadu 641043, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women University, Bharathi Park Road, Mettupalayam Road, Coimbatore, Tamil Nadu 641043, India","institution_ids":["https://openalex.org/I161045824"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5048774628"],"corresponding_institution_ids":["https://openalex.org/I161045824"],"apc_list":{"value":1400,"currency":"USD","value_usd":1400},"apc_paid":{"value":1400,"currency":"USD","value_usd":1400},"fwci":2.3626,"has_fulltext":true,"cited_by_count":11,"citation_normalized_percentile":{"value":0.89395845,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2016","issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8529090881347656},{"id":"https://openalex.org/keywords/replica","display_name":"Replica","score":0.811001718044281},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6881152391433716},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6048375368118286},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5671913623809814},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5465138554573059},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.5170527100563049},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4861264228820801},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.39499834179878235},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.35770994424819946},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.06885212659835815}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8529090881347656},{"id":"https://openalex.org/C2775937380","wikidata":"https://www.wikidata.org/wiki/Q1232589","display_name":"Replica","level":2,"score":0.811001718044281},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6881152391433716},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6048375368118286},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5671913623809814},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5465138554573059},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.5170527100563049},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4861264228820801},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.39499834179878235},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.35770994424819946},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.06885212659835815},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2016/1620343","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2016/1620343","pdf_url":"https://downloads.hindawi.com/journals/jcnc/2016/1620343.pdf","source":{"id":"https://openalex.org/S2764435486","display_name":"Journal of Computer Networks and Communications","issn_l":"2090-7141","issn":["2090-7141","2090-715X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Networks and Communications","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c615ce6273f4420f9d91c5efc8447dcd","is_oa":true,"landing_page_url":"https://doaj.org/article/c615ce6273f4420f9d91c5efc8447dcd","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Computer Networks and Communications, Vol 2016 (2016)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2016/1620343","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2016/1620343","pdf_url":"https://downloads.hindawi.com/journals/jcnc/2016/1620343.pdf","source":{"id":"https://openalex.org/S2764435486","display_name":"Journal of Computer Networks and Communications","issn_l":"2090-7141","issn":["2090-7141","2090-715X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Networks and Communications","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2222424037.pdf","grobid_xml":"https://content.openalex.org/works/W2222424037.grobid-xml"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W1940397557","https://openalex.org/W1964970915","https://openalex.org/W2003178327","https://openalex.org/W2009571312","https://openalex.org/W2030681072","https://openalex.org/W2049914146","https://openalex.org/W2071163526","https://openalex.org/W2093272700","https://openalex.org/W2098009004","https://openalex.org/W2100577533","https://openalex.org/W2104340336","https://openalex.org/W2110193552","https://openalex.org/W2129034264","https://openalex.org/W2129849999","https://openalex.org/W2130356176","https://openalex.org/W2137774589","https://openalex.org/W2137940221","https://openalex.org/W2148135143","https://openalex.org/W2164934768","https://openalex.org/W3103952586"],"related_works":["https://openalex.org/W3013979739","https://openalex.org/W2655578171","https://openalex.org/W2577913821","https://openalex.org/W2122589784","https://openalex.org/W2760372971","https://openalex.org/W2078379271","https://openalex.org/W2043460294","https://openalex.org/W4210712718","https://openalex.org/W1905398909","https://openalex.org/W2590022098"],"abstract_inverted_index":{"Security":[0],"of":[1,53,64,147,171,202],"Mobile":[2,78],"Wireless":[3,79],"Sensor":[4,80],"Networks":[5],"is":[6,29,73,104,109,175,194],"a":[7,112],"vital":[8],"challenge":[9,76],"as":[10,111],"the":[11,30,36,43,50,54,58,67,101,107,124,131,137,141,148,155,161,172,200,203],"sensor":[12],"nodes":[13,39],"are":[14,21,40],"deployed":[15],"in":[16,77,154,160,167],"unattended":[17],"environment":[18],"and":[19,57,100,164,190],"they":[20],"prone":[22],"to":[23,45,90,118,135,198],"various":[24],"attacks.":[25],"One":[26],"among":[27],"them":[28,47],"node":[31,71,84],"replication":[32],"attack.":[33],"In":[34],"this,":[35],"physically":[37],"insecure":[38],"acquired":[41],"by":[42,48,122,139],"adversary":[44,59],"clone":[46],"having":[49],"same":[51],"identity":[52],"captured":[55],"node,":[56],"deploys":[60],"an":[61,74],"unpredictable":[62],"number":[63],"replicas":[65],"throughout":[66],"network.":[68],"Hence":[69],"replica":[70,83,93,108],"detection":[72,85,102,156,178,181],"important":[75],"Networks.":[81],"Various":[82],"techniques":[86],"have":[87],"been":[88],"proposed":[89,149,173,204],"detect":[91,136],"these":[92,120],"nodes.":[94,144],"These":[95],"methods":[96],"incur":[97],"control":[98,162,188],"overheads":[99],"accuracy":[103],"low":[105],"when":[106],"selected":[110],"witness":[113,143],"node.":[114],"This":[115],"paper":[116],"proposes":[117],"solve":[119],"issues":[121],"enhancing":[123],"Single":[125],"Hop":[126],"Detection":[127],"(SHD)":[128],"method":[129,150],"using":[130,177,196],"Clonal":[132],"Selection":[133],"algorithm":[134],"clones":[138],"selecting":[140],"appropriate":[142],"The":[145,169,192],"advantages":[146],"include":[151],"(i)":[152],"increase":[153,166],"ratio,":[157,179,182,185],"(ii)":[158],"decrease":[159],"overhead,":[163],"(iii)":[165],"throughput.":[168,191],"performance":[170],"work":[174],"measured":[176],"false":[180],"packet":[183],"delivery":[184],"average":[186],"delay,":[187],"overheads,":[189],"implementation":[193],"done":[195],"ns-2":[197],"exhibit":[199],"actuality":[201],"work.":[205]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
