{"id":"https://openalex.org/W3135529317","doi":"https://doi.org/10.12720/jcm.16.3.104-110","title":"AOMDV-OAM: A Security Routing Protocol Using OAM on Mobile Ad Hoc Network","display_name":"AOMDV-OAM: A Security Routing Protocol Using OAM on Mobile Ad Hoc Network","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3135529317","doi":"https://doi.org/10.12720/jcm.16.3.104-110","mag":"3135529317"},"language":"en","primary_location":{"id":"doi:10.12720/jcm.16.3.104-110","is_oa":true,"landing_page_url":"https://doi.org/10.12720/jcm.16.3.104-110","pdf_url":null,"source":{"id":"https://openalex.org/S184821498","display_name":"Journal of Communications","issn_l":"1796-2021","issn":["1796-2021","2374-4367"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323867253","host_organization_name":"International Communication Association","host_organization_lineage":["https://openalex.org/P4323867253"],"host_organization_lineage_names":["International Communication Association"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.12720/jcm.16.3.104-110","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069376854","display_name":"L\u00ea \u0110\u1ee9c Huy","orcid":"https://orcid.org/0000-0002-3129-027X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Le Duc Huy","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089313486","display_name":"Luong Thai Ngoc","orcid":"https://orcid.org/0000-0002-5314-1291"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Luong Thai Ngoc","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Nguyen Van Tam","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nguyen Van Tam","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069376854"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1601,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.49024412,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"104","last_page":"110"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7956153154373169},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7687233090400696},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.6477431654930115},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5621018409729004},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.5612598657608032},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.4991874694824219},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.49843788146972656},{"id":"https://openalex.org/keywords/optimized-link-state-routing-protocol","display_name":"Optimized Link State Routing Protocol","score":0.48790213465690613},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45533105731010437},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.11808711290359497},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07383421063423157}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7956153154373169},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7687233090400696},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.6477431654930115},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5621018409729004},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.5612598657608032},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.4991874694824219},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.49843788146972656},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.48790213465690613},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45533105731010437},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.11808711290359497},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07383421063423157},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.12720/jcm.16.3.104-110","is_oa":true,"landing_page_url":"https://doi.org/10.12720/jcm.16.3.104-110","pdf_url":null,"source":{"id":"https://openalex.org/S184821498","display_name":"Journal of Communications","issn_l":"1796-2021","issn":["1796-2021","2374-4367"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323867253","host_organization_name":"International Communication Association","host_organization_lineage":["https://openalex.org/P4323867253"],"host_organization_lineage_names":["International Communication Association"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.12720/jcm.16.3.104-110","is_oa":true,"landing_page_url":"https://doi.org/10.12720/jcm.16.3.104-110","pdf_url":null,"source":{"id":"https://openalex.org/S184821498","display_name":"Journal of Communications","issn_l":"1796-2021","issn":["1796-2021","2374-4367"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323867253","host_organization_name":"International Communication Association","host_organization_lineage":["https://openalex.org/P4323867253"],"host_organization_lineage_names":["International Communication Association"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W132898942","https://openalex.org/W185358023","https://openalex.org/W267582603","https://openalex.org/W1977322796","https://openalex.org/W1990936602","https://openalex.org/W1991458468","https://openalex.org/W1995916386","https://openalex.org/W2014308332","https://openalex.org/W2078701696","https://openalex.org/W2099574482","https://openalex.org/W2120685459","https://openalex.org/W2121695271","https://openalex.org/W2133520751","https://openalex.org/W2155934087","https://openalex.org/W2333508014","https://openalex.org/W2467355082","https://openalex.org/W2608288528","https://openalex.org/W2621120580","https://openalex.org/W2752466522","https://openalex.org/W2801400953","https://openalex.org/W2909813299","https://openalex.org/W4239560699"],"related_works":["https://openalex.org/W3035283282","https://openalex.org/W2768875466","https://openalex.org/W1591014886","https://openalex.org/W2044687905","https://openalex.org/W2551975114","https://openalex.org/W1581687089","https://openalex.org/W2385083787","https://openalex.org/W2025838880","https://openalex.org/W2003275014","https://openalex.org/W4210799434"],"abstract_inverted_index":{"On-demand":[0],"routing":[1,97],"protocol":[2,126,148,163],"is":[3,47,62,121,164],"designed":[4],"to":[5,32,130],"work":[6],"efficiently":[7],"on":[8,92],"mobile":[9],"ad":[10],"hoc":[11],"networks":[12],"(MANET).":[13],"They":[14],"operate":[15],"with":[16,68,190],"the":[17,23,56,59,69,87,93,107,124,132,142,146,169,175,185],"belief":[18],"that":[19,161],"all":[20],"nodes":[21],"in":[22,149,167],"network":[24,74,77,152,199],"are":[25],"friendly,":[26],"thus":[27],"hackers":[28],"exploiting":[29],"security":[30,104,118,143],"vulnerabilities":[31],"carry":[33],"out":[34],"some":[35],"form":[36,44],"of":[37,45,72,89,95,135,145,172,177,193],"cyber":[38],"attacks,":[39,174],"especially":[40],"Flooding":[41],"attacks.":[42,137,157],"This":[43],"attack":[46,60],"easily":[48],"accomplished":[49],"by":[50,127],"overflowing":[51],"route":[52,70],"request":[53],"packets":[54],"into":[55],"network.":[57],"Once":[58],"frequency":[61,192],"large":[63],"enough,":[64],"it":[65],"shall":[66],"interfere":[67],"discovery":[71],"other":[73],"nodes,":[75],"damaging":[76],"performance.":[78],"In":[79],"this":[80],"article,":[81],"we":[82,101,140],"will":[83],"analyze":[84],"and":[85,115,195],"evaluate":[86],"impact":[88],"flood":[90,136,173],"attacks":[91],"performance":[94],"two":[96],"protocols":[98],"AOMDV.":[99],"Thereby,":[100],"describe":[102],"a":[103,191],"solutions":[105],"using":[106,128],"One":[108],"Time":[109],"Password":[110],"(OTP)":[111],"authentication":[112],"mechanism":[113],"(OAM)":[114],"implementing":[116],"AOMDV-OAM":[117,147,162],"protocol,":[119],"which":[120],"improved":[122],"from":[123],"AOMDV":[125],"OAM":[129],"reduce":[131],"harmful":[133,170],"effects":[134,171],"Using":[138],"NS2,":[139],"assess":[141],"effectiveness":[144],"random":[150],"waypoint":[151],"topologies":[153],"where":[154],"has":[155],"flooding":[156],"Simulation":[158],"results":[159],"show":[160],"very":[165],"effective":[166],"minimizing":[168],"rate":[176],"successful":[178],"packet":[179],"delivery":[180],"reached":[181],"over":[182],"99%":[183],"when":[184],"one":[186],"malicious":[187],"node":[188],"attacked":[189],"20pkt/s":[194],"50pkt/s":[196],"for":[197],"Grid":[198],"topology.":[200]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2021-03-15T00:00:00"}
