{"id":"https://openalex.org/W4323903173","doi":"https://doi.org/10.12720/jcm.18.3.172-179","title":"Evaluation of Traffic Models under Multiple Black hole Attack in Wireless Mesh Network","display_name":"Evaluation of Traffic Models under Multiple Black hole Attack in Wireless Mesh Network","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4323903173","doi":"https://doi.org/10.12720/jcm.18.3.172-179"},"language":"en","primary_location":{"id":"doi:10.12720/jcm.18.3.172-179","is_oa":true,"landing_page_url":"http://dx.doi.org/10.12720/jcm.18.3.172-179","pdf_url":null,"source":{"id":"https://openalex.org/S184821498","display_name":"Journal of Communications","issn_l":"1796-2021","issn":["1796-2021","2374-4367"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323867253","host_organization_name":"International Communication Association","host_organization_lineage":["https://openalex.org/P4323867253"],"host_organization_lineage_names":["International Communication Association"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://dx.doi.org/10.12720/jcm.18.3.172-179","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003609195","display_name":"Pushpender Sarao","orcid":"https://orcid.org/0000-0002-2256-9113"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Pushpender Sarao","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5003609195"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3849,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.58236446,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"172","last_page":"179"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7920737266540527},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7543972730636597},{"id":"https://openalex.org/keywords/packet-drop-attack","display_name":"Packet drop attack","score":0.6607887148857117},{"id":"https://openalex.org/keywords/wireless-mesh-network","display_name":"Wireless mesh network","score":0.6109955906867981},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5128419995307922},{"id":"https://openalex.org/keywords/dynamic-source-routing","display_name":"Dynamic Source Routing","score":0.5065881013870239},{"id":"https://openalex.org/keywords/ad-hoc-on-demand-distance-vector-routing","display_name":"Ad hoc On-Demand Distance Vector Routing","score":0.4986588954925537},{"id":"https://openalex.org/keywords/distance-vector-routing-protocol","display_name":"Distance-vector routing protocol","score":0.4655488431453705},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.4453947842121124},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4405059218406677},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4302518367767334},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4299182891845703},{"id":"https://openalex.org/keywords/link-state-routing-protocol","display_name":"Link-state routing protocol","score":0.30735641717910767},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.22569197416305542},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11156728863716125},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09298259019851685}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7920737266540527},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7543972730636597},{"id":"https://openalex.org/C35546906","wikidata":"https://www.wikidata.org/wiki/Q2900718","display_name":"Packet drop attack","level":5,"score":0.6607887148857117},{"id":"https://openalex.org/C31548570","wikidata":"https://www.wikidata.org/wiki/Q6453712","display_name":"Wireless mesh network","level":4,"score":0.6109955906867981},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5128419995307922},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.5065881013870239},{"id":"https://openalex.org/C104503742","wikidata":"https://www.wikidata.org/wiki/Q345335","display_name":"Ad hoc On-Demand Distance Vector Routing","level":5,"score":0.4986588954925537},{"id":"https://openalex.org/C202385902","wikidata":"https://www.wikidata.org/wiki/Q1229441","display_name":"Distance-vector routing protocol","level":5,"score":0.4655488431453705},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.4453947842121124},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4405059218406677},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4302518367767334},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4299182891845703},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.30735641717910767},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.22569197416305542},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11156728863716125},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09298259019851685},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.12720/jcm.18.3.172-179","is_oa":true,"landing_page_url":"http://dx.doi.org/10.12720/jcm.18.3.172-179","pdf_url":null,"source":{"id":"https://openalex.org/S184821498","display_name":"Journal of Communications","issn_l":"1796-2021","issn":["1796-2021","2374-4367"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323867253","host_organization_name":"International Communication Association","host_organization_lineage":["https://openalex.org/P4323867253"],"host_organization_lineage_names":["International Communication Association"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.12720/jcm.18.3.172-179","is_oa":true,"landing_page_url":"http://dx.doi.org/10.12720/jcm.18.3.172-179","pdf_url":null,"source":{"id":"https://openalex.org/S184821498","display_name":"Journal of Communications","issn_l":"1796-2021","issn":["1796-2021","2374-4367"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323867253","host_organization_name":"International Communication Association","host_organization_lineage":["https://openalex.org/P4323867253"],"host_organization_lineage_names":["International Communication Association"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2183673732","https://openalex.org/W1968662511","https://openalex.org/W2144430502","https://openalex.org/W2097553627","https://openalex.org/W2766414569","https://openalex.org/W2079034359","https://openalex.org/W2287234513","https://openalex.org/W2088089804","https://openalex.org/W2151965204","https://openalex.org/W1935625188"],"abstract_inverted_index":{"Wireless":[0],"networks":[1,4],"are":[2,171],"the":[3,12,22,26,57,80,91,100,127,136,183,189],"in":[5,126,206],"which":[6],"data":[7,86],"communication":[8],"is":[9,29,38,45,51,83,102,153],"done":[10],"through":[11],"wireless":[13,16,123],"channels":[14],"and":[15,40,43,75,94,112,141,165,195],"nodes.":[17],"In":[18,65,104,188],"such":[19],"type":[20],"of":[21,25,35,99,108,129,138,168,185,191,208],"networks,":[23],"cooperation":[24],"all":[27],"nodes":[28],"required.":[30],"Due":[31],"to":[32,160,181],"which,":[33],"chances":[34],"security":[36,44,53],"attacks":[37],"possible":[39],"network":[41,101,125,139,221],"performance":[42,98,174],"badly":[46],"affected.":[47],"Black":[48],"hole":[49,67,132,193],"attack":[50,54],"a":[52,72,96],"comes":[55],"under":[56,196],"active,":[58],"internal":[59],"as":[60,62,95,173],"well":[61],"external":[63],"attacks.":[64,133],"black":[66,131,192],"attack,":[68,194],"malicious":[69,88],"node":[70,89,142],"presents":[71,203],"suitable,":[73],"shortest":[74],"low":[76],"cost":[77],"path.":[78],"If":[79],"above":[81],"path":[82],"selected":[84],"for":[85,122],"transmission,":[87],"drops":[90],"received":[92,170],"packets":[93,169],"result":[97],"degraded.":[103],"this":[105],"paper,":[106],"impact":[107],"Random":[109],"Direction":[110],"(RD)":[111],"Reference":[113],"Point":[114],"Group":[115],"Mobility":[116],"(RPGM)":[117],"models":[118],"have":[119],"been":[120,179,217],"analyzed":[121],"mesh":[124],"presence":[128,190],"multiple":[130],"By":[134],"varying":[135],"number":[137,167],"connections":[140],"density,":[143],"(Ad":[144],"hoc":[145],"on":[146,220],"demand":[147],"distance":[148],"vector)":[149],"AODV":[150,200],"routing":[151,156,201,212],"protocol":[152,202],"evaluated.":[154],"Normalized":[155],"load,":[157],"average":[158,163,209],"end":[159,161],"delay,":[162],"throughput,":[164,210],"total":[166],"considered":[172],"metrics.":[175],"Bonn-motion":[176],"tool":[177],"has":[178,216],"used":[180],"create":[182],"scenario":[184],"mobility":[186,198],"models.":[187],"RPGM":[197],"model,":[199],"better":[204],"results":[205],"respect":[207],"normalized":[211],"load.":[213],"Simulation":[214],"work":[215],"carried":[218],"out":[219],"simulator":[222],"version":[223],"NS-2.35.":[224]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2023-03-12T00:00:00"}
