{"id":"https://openalex.org/W2990545827","doi":"https://doi.org/10.1177/1550147719889901","title":"An intrusion detection system for the prevention of an active sinkhole routing attack in Internet of things","display_name":"An intrusion detection system for the prevention of an active sinkhole routing attack in Internet of things","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W2990545827","doi":"https://doi.org/10.1177/1550147719889901","mag":"2990545827"},"language":"en","primary_location":{"id":"doi:10.1177/1550147719889901","is_oa":true,"landing_page_url":"https://doi.org/10.1177/1550147719889901","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1177/1550147719889901","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journals.sagepub.com/doi/pdf/10.1177/1550147719889901","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Sabeen Tahir","orcid":"https://orcid.org/0000-0003-0781-0295"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Sabeen Tahir","raw_affiliation_strings":["Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0003-0781-0295","affiliations":[{"raw_affiliation_string":"Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013709516","display_name":"Sheikh Tahir Bakhsh","orcid":"https://orcid.org/0000-0001-8467-0375"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Sheikh Tahir Bakhsh","raw_affiliation_strings":["Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0001-8467-0375","affiliations":[{"raw_affiliation_string":"Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071565432","display_name":"Rayan A. Alsemmeari","orcid":"https://orcid.org/0000-0001-5845-7183"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Rayan A Alsemmeari","raw_affiliation_strings":["Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I185163786"],"apc_list":{"value":2200,"currency":"USD","value_usd":2200},"apc_paid":{"value":2200,"currency":"USD","value_usd":2200},"fwci":1.3007,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.83007191,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"15","issue":"11","first_page":"155014771988990","last_page":"155014771988990"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8578730225563049},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6891440153121948},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6877366900444031},{"id":"https://openalex.org/keywords/sinkhole","display_name":"Sinkhole","score":0.660817563533783},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5408303141593933},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.4755273163318634},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.44680655002593994},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4254753887653351},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.4144963026046753},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.09148165583610535}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8578730225563049},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6891440153121948},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6877366900444031},{"id":"https://openalex.org/C49223487","wikidata":"https://www.wikidata.org/wiki/Q188734","display_name":"Sinkhole","level":3,"score":0.660817563533783},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5408303141593933},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.4755273163318634},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.44680655002593994},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4254753887653351},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.4144963026046753},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.09148165583610535},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C182348080","wikidata":"https://www.wikidata.org/wiki/Q16817","display_name":"Karst","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1177/1550147719889901","is_oa":true,"landing_page_url":"https://doi.org/10.1177/1550147719889901","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1177/1550147719889901","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:sae:intdis:v:15:y:2019:i:11:p:1550147719889901","is_oa":false,"landing_page_url":"https://journals.sagepub.com/doi/10.1177/1550147719889901","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:462049c77c904cb9950d37c2e26394aa","is_oa":true,"landing_page_url":"https://doaj.org/article/462049c77c904cb9950d37c2e26394aa","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Journal of Distributed Sensor Networks, Vol 15 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1177/1550147719889901","is_oa":true,"landing_page_url":"https://doi.org/10.1177/1550147719889901","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1177/1550147719889901","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.8999999761581421}],"awards":[{"id":"https://openalex.org/G7797758467","display_name":null,"funder_award_id":"D1437-53-612","funder_id":"https://openalex.org/F4320322322","funder_display_name":"King Abdulaziz University"}],"funders":[{"id":"https://openalex.org/F4320322322","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W433644524","https://openalex.org/W648871171","https://openalex.org/W2546016631","https://openalex.org/W2612113839","https://openalex.org/W2733765803","https://openalex.org/W2763567231","https://openalex.org/W2768546068","https://openalex.org/W2918845570","https://openalex.org/W4210441915","https://openalex.org/W4242705606","https://openalex.org/W4244453645"],"related_works":["https://openalex.org/W2552485568","https://openalex.org/W2043656548","https://openalex.org/W2002122708","https://openalex.org/W125799629","https://openalex.org/W3022213123","https://openalex.org/W4229766761","https://openalex.org/W2034363770","https://openalex.org/W2908627775","https://openalex.org/W2364523259","https://openalex.org/W1975978427"],"abstract_inverted_index":{"Internet":[0],"of":[1,13,23,138,155,170,205,241,289,298],"things":[2],"(IoT)":[3],"is":[4,45,61,97,147,165,215,220,251],"a":[5,46,50,62],"complex":[6],"and":[7,41,76,81,102,115,231,245,253,266,272,301],"massive":[8],"wireless":[9],"network,":[10,53],"where":[11,94],"millions":[12],"devices":[14,19,84,175,184,244],"are":[15,176,185],"connected":[16,177],"together.":[17],"These":[18],"gather":[20],"different":[21,26],"types":[22],"data":[24,72,118,224,290],"from":[25,85,225,279],"systems":[27],"that":[28,219,283],"transform":[29],"human":[30],"daily":[31],"lives":[32],"by":[33],"modernizing":[34],"home":[35],"appliances,":[36],"business,":[37],"medicine,":[38],"traveling,":[39],"research,":[40],"so":[42],"on.":[43],"Security":[44],"critical":[47],"challenge":[48],"for":[49,54,135,159,270],"stable":[51],"IoT":[52,89,108,146,174],"instance,":[55],"routing":[56,142,302],"attacks,":[57],"especially":[58],"sinkhole":[59,141,157,233,299],"attack":[60,64,143,268],"severe":[63],"which":[65],"has":[66],"the":[67,74,83,107,117,121,136,153,156,162,168,173,203,216,235,239,256,280,284,295],"capability":[68],"to":[69,178,199,222],"direct":[70],"network":[71,95,109,122,164],"toward":[73],"intruder,":[75],"it":[77,229],"can":[78],"also":[79],"disrupt":[80],"disconnect":[82],"their":[86,179,246],"network.":[87],"The":[88,149,182,192,212,249],"needs":[90],"multi-facet":[91],"security":[92],"solutions":[93],"communication":[96],"protected":[98],"with":[99,187,255],"integrity,":[100],"confidentiality,":[101],"authentication":[103],"verification":[104],"services.":[105],"Therefore,":[106,228],"should":[110,123],"be":[111,124],"secured":[112],"against":[113],"intrusions":[114],"disruptions;":[116],"exchanged":[119],"throughout":[120],"an":[125,131,139,188],"encrypted":[126],"form.":[127],"In":[128],"this":[129,160],"article,":[130],"intrusion":[132,189,193,197,258],"detection":[133,190,194,259,269,296],"system":[134,195],"prevention":[137],"active":[140,243],"(PASR)":[144],"in":[145,202,287],"presented.":[148],"proposed":[150],"PASR":[151,250,285],"solves":[152],"problem":[154],"attack;":[158],"purpose,":[161],"whole":[163],"divided":[166],"into":[167],"clusters":[169],"IoT.":[171],"All":[172],"respective":[180],"gateways.":[181],"gateway":[183],"equipped":[186],"system.":[191],"activates":[196],"analyzer":[198],"detect":[200],"anomalies":[201],"context":[204],"ad":[206,261],"hoc":[207,262],"on-demand":[208,263],"distance":[209,264],"vector":[210],"protocol.":[211],"base":[213,236],"station":[214,237],"main":[217],"device":[218],"responsible":[221],"receive":[223],"all":[226,242],"devices.":[227],"detects":[230],"prevents":[232],"attacks;":[234],"keeps":[238],"record":[240],"possible":[247],"links.":[248],"implemented":[252],"compared":[254],"existing":[257],"techniques":[260],"vector,":[265],"dual":[267],"black":[271],"gray":[273],"hole":[274],"attack.":[275],"It":[276],"was":[277],"observed":[278],"simulation":[281],"results":[282],"outperforms":[286],"terms":[288],"packet":[291],"delivery,":[292],"energy":[293],"consumption,":[294],"rate":[297],"attack,":[300],"overhead.":[303]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-10-10T00:00:00"}
