{"id":"https://openalex.org/W2066476371","doi":"https://doi.org/10.1177/0037549712467827","title":"A Pay-and-Stay model for tackling intruders in hybrid wireless mesh networks","display_name":"A Pay-and-Stay model for tackling intruders in hybrid wireless mesh networks","publication_year":2012,"publication_date":"2012-12-21","ids":{"openalex":"https://openalex.org/W2066476371","doi":"https://doi.org/10.1177/0037549712467827","mag":"2066476371"},"language":"en","primary_location":{"id":"doi:10.1177/0037549712467827","is_oa":false,"landing_page_url":"https://doi.org/10.1177/0037549712467827","pdf_url":null,"source":{"id":"https://openalex.org/S32573412","display_name":"SIMULATION","issn_l":"0037-5497","issn":["0037-5497","1741-3133"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320017","host_organization_name":"SAGE Publishing","host_organization_lineage":["https://openalex.org/P4310320017"],"host_organization_lineage_names":["SAGE Publishing"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SIMULATION","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082471864","display_name":"Al\u2010Sakib Khan Pathan","orcid":"https://orcid.org/0000-0001-6572-3451"},"institutions":[{"id":"https://openalex.org/I4164984","display_name":"International Islamic University Malaysia","ror":"https://ror.org/03s9hs139","country_code":"MY","type":"education","lineage":["https://openalex.org/I4164984"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Al-Sakib Khan Pathan","raw_affiliation_strings":["Department of Computer Science, International Islamic University Malaysia (IIUM), Malaysia","Department of Computer Science, International Islamic University, Malaysia (IIUM), Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, International Islamic University Malaysia (IIUM), Malaysia","institution_ids":["https://openalex.org/I4164984"]},{"raw_affiliation_string":"Department of Computer Science, International Islamic University, Malaysia (IIUM), Malaysia","institution_ids":["https://openalex.org/I4164984"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074382029","display_name":"Wafaa Mustafa Abduallah","orcid":"https://orcid.org/0009-0007-5496-8745"},"institutions":[{"id":"https://openalex.org/I4164984","display_name":"International Islamic University Malaysia","ror":"https://ror.org/03s9hs139","country_code":"MY","type":"education","lineage":["https://openalex.org/I4164984"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Wafaa Mustafa Abduallah","raw_affiliation_strings":["Department of Computer Science, International Islamic University Malaysia (IIUM), Malaysia","Department of Computer Science, International Islamic University, Malaysia (IIUM), Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, International Islamic University Malaysia (IIUM), Malaysia","institution_ids":["https://openalex.org/I4164984"]},{"raw_affiliation_string":"Department of Computer Science, International Islamic University, Malaysia (IIUM), Malaysia","institution_ids":["https://openalex.org/I4164984"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047115889","display_name":"Salma Khanam","orcid":"https://orcid.org/0000-0003-4012-086X"},"institutions":[{"id":"https://openalex.org/I4164984","display_name":"International Islamic University Malaysia","ror":"https://ror.org/03s9hs139","country_code":"MY","type":"education","lineage":["https://openalex.org/I4164984"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Shapla Khanam","raw_affiliation_strings":["Department of Computer Science, International Islamic University Malaysia (IIUM), Malaysia","Department of Computer Science, International Islamic University, Malaysia (IIUM), Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, International Islamic University Malaysia (IIUM), Malaysia","institution_ids":["https://openalex.org/I4164984"]},{"raw_affiliation_string":"Department of Computer Science, International Islamic University, Malaysia (IIUM), Malaysia","institution_ids":["https://openalex.org/I4164984"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010288116","display_name":"Habibullah Yusuf Saleem","orcid":null},"institutions":[{"id":"https://openalex.org/I4164984","display_name":"International Islamic University Malaysia","ror":"https://ror.org/03s9hs139","country_code":"MY","type":"education","lineage":["https://openalex.org/I4164984"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Habibullah Yusuf Saleem","raw_affiliation_strings":["Department of Computer Science, International Islamic University Malaysia (IIUM), Malaysia","Department of Computer Science, International Islamic University, Malaysia (IIUM), Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, International Islamic University Malaysia (IIUM), Malaysia","institution_ids":["https://openalex.org/I4164984"]},{"raw_affiliation_string":"Department of Computer Science, International Islamic University, Malaysia (IIUM), Malaysia","institution_ids":["https://openalex.org/I4164984"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5082471864"],"corresponding_institution_ids":["https://openalex.org/I4164984"],"apc_list":null,"apc_paid":null,"fwci":0.7451,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.74439554,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"89","issue":"5","first_page":"616","last_page":"634"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-mesh-network","display_name":"Wireless mesh network","score":0.8353906869888306},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7507308721542358},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.6945620775222778},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.6139092445373535},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6088972687721252},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5442625880241394},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.5319324731826782},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5267844796180725},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5057504177093506},{"id":"https://openalex.org/keywords/mesh-networking","display_name":"Mesh networking","score":0.4347788393497467},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.40807682275772095},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3520891070365906},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2041776180267334}],"concepts":[{"id":"https://openalex.org/C31548570","wikidata":"https://www.wikidata.org/wiki/Q6453712","display_name":"Wireless mesh network","level":4,"score":0.8353906869888306},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7507308721542358},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.6945620775222778},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.6139092445373535},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6088972687721252},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5442625880241394},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5319324731826782},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5267844796180725},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5057504177093506},{"id":"https://openalex.org/C123691950","wikidata":"https://www.wikidata.org/wiki/Q25552104","display_name":"Mesh networking","level":3,"score":0.4347788393497467},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.40807682275772095},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3520891070365906},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2041776180267334},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1177/0037549712467827","is_oa":false,"landing_page_url":"https://doi.org/10.1177/0037549712467827","pdf_url":null,"source":{"id":"https://openalex.org/S32573412","display_name":"SIMULATION","issn_l":"0037-5497","issn":["0037-5497","1741-3133"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320017","host_organization_name":"SAGE Publishing","host_organization_lineage":["https://openalex.org/P4310320017"],"host_organization_lineage_names":["SAGE Publishing"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SIMULATION","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.887.9085","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.887.9085","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://staff.iium.edu.my/sakib/ndclab/papers/INTRU_HWMN_CAMERA.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322095","display_name":"Korea Institute of Construction Technology","ror":"https://ror.org/035enhp47"},{"id":"https://openalex.org/F4320324298","display_name":"International Islamic University Malaysia","ror":"https://ror.org/03s9hs139"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W47379855","https://openalex.org/W181277969","https://openalex.org/W380709968","https://openalex.org/W401401612","https://openalex.org/W569491024","https://openalex.org/W1497243825","https://openalex.org/W1571067440","https://openalex.org/W1574164692","https://openalex.org/W1576790694","https://openalex.org/W1599763338","https://openalex.org/W1940397557","https://openalex.org/W1965489815","https://openalex.org/W2000621448","https://openalex.org/W2018932238","https://openalex.org/W2026973187","https://openalex.org/W2034065435","https://openalex.org/W2039437606","https://openalex.org/W2040866353","https://openalex.org/W2046980951","https://openalex.org/W2102370957","https://openalex.org/W2125042266","https://openalex.org/W2131003422","https://openalex.org/W2135042946","https://openalex.org/W2135057483","https://openalex.org/W2138983002","https://openalex.org/W2140674577","https://openalex.org/W2145130898","https://openalex.org/W2148198165","https://openalex.org/W2158073008","https://openalex.org/W2159158762","https://openalex.org/W2603253565","https://openalex.org/W2622610444","https://openalex.org/W2678934292","https://openalex.org/W3121430140","https://openalex.org/W3148921039","https://openalex.org/W4236590519","https://openalex.org/W4285106992","https://openalex.org/W4285719527","https://openalex.org/W4321473197"],"related_works":["https://openalex.org/W4319302693","https://openalex.org/W2003342631","https://openalex.org/W2088516601","https://openalex.org/W2088748318","https://openalex.org/W3183712563","https://openalex.org/W2145803479","https://openalex.org/W1595354992","https://openalex.org/W3113618853","https://openalex.org/W2050134675","https://openalex.org/W2963761638"],"abstract_inverted_index":{"Intrusion":[0],"handling":[1,145,262,282],"in":[2,17,41,44,72,98,121,149,157,167,184,197,249,263,281],"wireless":[3,24,86,124],"mesh":[4,115,134],"networks":[5,25],"(WMNs)":[6],"is":[7,107,113,118,138,208],"a":[8,45,108,172,237,289],"relatively":[9],"less":[10],"addressed":[11],"topic.":[12],"The":[13,206],"difficulty":[14,71],"may":[15,54,68],"lie":[16],"the":[18,70,81,96,129,133,143,150,158,185,198,202,220,225,242,255,275,286],"fact":[19],"that":[20,36,112,209,274],"there":[21,106],"are":[22,34,51],"other":[23,123],"for":[26,77],"which":[27,127],"some":[28,42,155],"intrusion":[29,144,177,261],"detection":[30],"or":[31,132,147,160],"prevention":[32],"schemes":[33,50],"proposed":[35],"could":[37,218,277],"also":[38,253],"be":[39,69,193,278],"applied":[40],"way":[43],"WMN":[46],"setting.":[47],"As":[48],"those":[49],"contributing,":[52],"researchers":[53],"not":[55,119,211],"find":[56],"it":[57,92,137,190,236],"necessary":[58],"to":[59,94,141,182,192],"specifically":[60],"focus":[61],"on":[62],"this":[63,168,250],"field.":[64],"Another":[65],"critical":[66],"reason":[67],"developing":[73],"an":[74,180,231],"effective":[75,280],"scheme":[76],"WMNs.":[78],"In":[79],"fact,":[80],"structural":[82],"differences":[83],"among":[84],"various":[85,258],"ad":[87],"hoc":[88],"networking":[89],"technologies":[90],"make":[91],"imperative":[93],"devise":[95],"mechanisms":[97,146],"subtle":[99],"but":[100],"critically":[101],"different":[102,173],"ways.":[103],"For":[104],"WMNs,":[105],"proper":[109],"network":[110,125,186,199,287],"backbone":[111,116],"called":[114],"(which":[117],"present":[120,254],"many":[122],"counterparts),":[126],"supports":[128],"fringe":[130,161],"part":[131,152],"clients.":[135],"Hence,":[136],"often":[139],"possible":[140],"install":[142],"agents":[148],"stable":[151],"and":[153,234,244,284],"allowing":[154,179],"flexibility":[156],"client":[159],"parts.":[162],"Nonetheless,":[163],"instead":[164],"of":[165,175,195,246,257,260,266,292],"thinking":[166],"pattern,":[169],"we":[170,252,272],"take":[171],"approach":[174,230],"tackling":[176],"by":[178,200,210],"intruder":[181],"stay":[183],"as":[187,189],"long":[188],"proves":[191],"worthy":[194],"staying":[196],"supporting":[201],"network\u2019s":[203],"regular":[204],"activities.":[205],"idea":[207],"always":[212],"directly":[213],"purging":[214],"rogue":[215],"entities,":[216],"one":[217],"exploit":[219],"intruder\u2019s":[221],"resources,":[222],"thereby":[223],"benefiting":[224],"network.":[226],"We":[227],"call":[228],"our":[229,247,269],"intrusion-tackling":[232],"mechanism":[233],"term":[235],"Pay-and-Stay":[238],"model.":[239],"Alongside":[240],"presenting":[241],"details":[243],"analysis":[245],"model,":[248],"paper,":[251],"basics":[256],"forms":[259],"such":[264],"types":[265],"networks.":[267],"Using":[268],"evaluation":[270],"results,":[271],"found":[273],"model":[276],"very":[279],"intruders":[283],"defending":[285],"against":[288],"broad":[290],"range":[291],"security":[293],"attacks.":[294]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
