{"id":"https://openalex.org/W2791355339","doi":"https://doi.org/10.1504/ijwmc.2018.10011093","title":"Wireless ad hoc network: detection of malicious node by using neighbour-based authentication approach","display_name":"Wireless ad hoc network: detection of malicious node by using neighbour-based authentication approach","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2791355339","doi":"https://doi.org/10.1504/ijwmc.2018.10011093","mag":"2791355339"},"language":"en","primary_location":{"id":"doi:10.1504/ijwmc.2018.10011093","is_oa":true,"landing_page_url":"https://doi.org/10.1504/ijwmc.2018.10011093","pdf_url":"https://doi.org/10.1504/ijwmc.2018.10011093","source":{"id":"https://openalex.org/S168395412","display_name":"International Journal of Wireless and Mobile Computing","issn_l":"1741-1084","issn":["1741-1084","1741-1092"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Wireless and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.1504/ijwmc.2018.10011093","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Sijjad Ali Khuhro","orcid":null},"institutions":[{"id":"https://openalex.org/I12469534","display_name":"Quaid-i-Azam University","ror":"https://ror.org/04s9hft57","country_code":"PK","type":"education","lineage":["https://openalex.org/I12469534"]},{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN","PK"],"is_corresponding":true,"raw_author_name":"Sijjad Ali Khuhro","raw_affiliation_strings":["College of Computer Science and Technology, Beijing University of Technology, Beijing 100124, China; Institute of Information Technology, Quaid-i-Azam University Islamabad, Islamabad 44000, Pakistan"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Beijing University of Technology, Beijing 100124, China; Institute of Information Technology, Quaid-i-Azam University Islamabad, Islamabad 44000, Pakistan","institution_ids":["https://openalex.org/I37796252","https://openalex.org/I12469534"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102986000","display_name":"Haiyang Yu","orcid":"https://orcid.org/0000-0003-3761-9598"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiyang Yu","raw_affiliation_strings":["College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing, 100124, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing, 100124, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103150228","display_name":"Muhammad Azeem","orcid":"https://orcid.org/0000-0003-0373-6112"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Muhammad Azeem","raw_affiliation_strings":["College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing, 100124, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing, 100124, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020009828","display_name":"Allah Ditta","orcid":"https://orcid.org/0000-0003-1519-5982"},"institutions":[{"id":"https://openalex.org/I5100685","display_name":"University of Education","ror":"https://ror.org/052z7nw84","country_code":"PK","type":"education","lineage":["https://openalex.org/I5100685"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Allah Ditta","raw_affiliation_strings":["Division of Science & Technology, University of Education, College Road, Township, Lahore, Pakistan"],"affiliations":[{"raw_affiliation_string":"Division of Science & Technology, University of Education, College Road, Township, Lahore, Pakistan","institution_ids":["https://openalex.org/I5100685"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053745516","display_name":"Khurram Gulzar Rana","orcid":null},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Khurram Gulzar Rana","raw_affiliation_strings":["College of Computer Science; Beijing University of Technology; Beijing 100124 China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science; Beijing University of Technology; Beijing 100124 China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"last","author":{"id":null,"display_name":"Cai Yongquan","orcid":null},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cai Yongquan","raw_affiliation_strings":["School of Computer Science and Technology, University of Science and Technology, Hefei, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, University of Science and Technology, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I12469534","https://openalex.org/I37796252"],"apc_list":null,"apc_paid":null,"fwci":0.5863,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.70449943,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"14","issue":"1","first_page":"16","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9787999987602234,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9339501261711121},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.6829763054847717},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6399138569831848},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.603745698928833},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4993879795074463},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.49011167883872986},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4734461009502411},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.43925657868385315},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34945619106292725},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.14498043060302734},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.06765934824943542}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9339501261711121},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.6829763054847717},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6399138569831848},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.603745698928833},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4993879795074463},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.49011167883872986},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4734461009502411},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.43925657868385315},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34945619106292725},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14498043060302734},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.06765934824943542},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijwmc.2018.10011093","is_oa":true,"landing_page_url":"https://doi.org/10.1504/ijwmc.2018.10011093","pdf_url":"https://doi.org/10.1504/ijwmc.2018.10011093","source":{"id":"https://openalex.org/S168395412","display_name":"International Journal of Wireless and Mobile Computing","issn_l":"1741-1084","issn":["1741-1084","1741-1092"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Wireless and Mobile Computing","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1504/ijwmc.2018.10011093","is_oa":true,"landing_page_url":"https://doi.org/10.1504/ijwmc.2018.10011093","pdf_url":"https://doi.org/10.1504/ijwmc.2018.10011093","source":{"id":"https://openalex.org/S168395412","display_name":"International Journal of Wireless and Mobile Computing","issn_l":"1741-1084","issn":["1741-1084","1741-1092"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Wireless and Mobile Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2791355339.pdf","grobid_xml":"https://content.openalex.org/works/W2791355339.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3035283282","https://openalex.org/W2768875466","https://openalex.org/W1591014886","https://openalex.org/W1581687089","https://openalex.org/W2551975114","https://openalex.org/W2025838880","https://openalex.org/W2003275014","https://openalex.org/W4210799434","https://openalex.org/W1511473871","https://openalex.org/W2734527596"],"abstract_inverted_index":{"Ad":[0,20,29],"hoc":[1,21],"networks":[2,22],"are":[3],"vulnerable":[4],"to":[5,9,81,95,104,114,133],"routing":[6,27,35],"attacks":[7,43],"owing":[8],"their":[10],"wireless":[11],"unsecure":[12],"communication,":[13],"dynamic":[14],"topology":[15],"and":[16,49,63,70,131,171],"resource":[17],"constrained":[18],"capabilities.":[19],"suffer":[23],"from":[24],"variety":[25],"of":[26,146,169],"attacks.":[28],"Hoc":[30],"On-Demand":[31],"Distance":[32],"Vector":[33],"(AODV)":[34],"protocol":[36],"exhibits":[37],"gutless":[38],"defence":[39],"against":[40],"black":[41,60,72],"hole":[42,61,73],"that":[44,87,89,150],"disrupt":[45],"its":[46,98],"normal":[47,144],"functionality":[48],"compromise":[50],"data":[51],"transmission.":[52],"In":[53],"current":[54],"research,":[55],"a":[56,92],"novel":[57],"solution":[58],"AODV":[59],"detection":[62],"removal":[64],"(AODV-BDR)":[65],"is":[66,161],"proposed.":[67],"AODV-BDR":[68,160],"detects":[69,153],"removes":[71],"attack":[74],"by":[75],"using":[76],"neighbour-based":[77],"authentication":[78],"technique.":[79],"According":[80],"suggested":[82],"solution,":[83],"every":[84],"intermediate":[85],"node":[86,155],"claims":[88],"it":[90,165],"upholds":[91],"fresh":[93],"route":[94,107],"destination":[96],"sends":[97,111],"Next":[99],"Hop":[100,128],"Node":[101,129],"(NHN)":[102],"address":[103],"source":[105,140],"in":[106],"reply":[108,123],"packet.":[109],"Source":[110],"validation":[112,118,122,138],"packet":[113],"NHN.":[115],"On":[116,136],"receiving":[117,137],"packet,":[119],"NHN":[120],"generates":[121],"having":[124],"information":[125],"about":[126],"Previous":[127],"(PHN)":[130],"send":[132],"the":[134],"source.":[135],"reply,":[139],"declares":[141],"malicious":[142,154],"or":[143],"behaviour":[145],"PHN.":[147],"Results":[148],"revealed":[149],"projected":[151],"scheme":[152],"with":[156],"great":[157],"accuracy.":[158],"Moreover,":[159],"very":[162],"useful":[163],"because":[164],"carries":[166],"no":[167],"overhead":[168],"encryption":[170],"hashing.":[172]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
