{"id":"https://openalex.org/W2243702911","doi":"https://doi.org/10.2498/cit.1000748","title":"Using network processor to establish security agent for AODV routing protocol","display_name":"Using network processor to establish security agent for AODV routing protocol","publication_year":2006,"publication_date":"2006-07-12","ids":{"openalex":"https://openalex.org/W2243702911","doi":"https://doi.org/10.2498/cit.1000748","mag":"2243702911"},"language":"en","primary_location":{"id":"doi:10.2498/cit.1000748","is_oa":true,"landing_page_url":"https://doi.org/10.2498/cit.1000748","pdf_url":"http://cit.fer.hr/index.php/CIT/article/download/1627/1331","source":{"id":"https://openalex.org/S98565333","display_name":"Journal of Computing and Information Technology","issn_l":"1330-1136","issn":["1330-1136","1846-3908"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310314807","host_organization_name":"Faculty of Electrical Engineering and Computing, University of Zagreb","host_organization_lineage":["https://openalex.org/P4310314807"],"host_organization_lineage_names":["Faculty of Electrical Engineering and Computing, University of Zagreb"],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computing and Information Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://cit.fer.hr/index.php/CIT/article/download/1627/1331","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100907814","display_name":"Chen Hong Song","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chen Hong Song","raw_affiliation_strings":["Department of Computer Science and Technology, Harbin Institute of Technology","Department of Computer Science, University of Science and Technology Beijing"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Harbin Institute of Technology","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"Department of Computer Science, University of Science and Technology Beijing","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113711486","display_name":"Zhongchuan Fu","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fu Zhongchuan","raw_affiliation_strings":["Department of Computer Science and Technology, Harbin Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Harbin Institute of Technology","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061041000","display_name":"Chengyao Wang","orcid":"https://orcid.org/0000-0002-0362-4498"},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wang Chengyao","raw_affiliation_strings":["Department of Computer Science, University of Science and Technology Beijing"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Science and Technology Beijing","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062481072","display_name":"Zhenzhou Ji","orcid":"https://orcid.org/0000-0001-6686-3819"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ji Zhenzhou","raw_affiliation_strings":["Department of Computer Science and Technology, Harbin Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Harbin Institute of Technology","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112063437","display_name":"Mingzeng Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hu Mingzeng","raw_affiliation_strings":["Department of Computer Science and Technology, Harbin Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Harbin Institute of Technology","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100907814"],"corresponding_institution_ids":["https://openalex.org/I204983213","https://openalex.org/I92403157"],"apc_list":{"value":450,"currency":"EUR","value_usd":485},"apc_paid":{"value":450,"currency":"EUR","value_usd":485},"fwci":0.0,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.25851375,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"15","issue":"1","first_page":"61","last_page":"61"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8884390592575073},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6547962427139282},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6319144368171692},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.4645262658596039},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.46344757080078125},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.44258004426956177},{"id":"https://openalex.org/keywords/ad-hoc-on-demand-distance-vector-routing","display_name":"Ad hoc On-Demand Distance Vector Routing","score":0.43908604979515076},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4376336336135864},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33196452260017395},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.2927848696708679},{"id":"https://openalex.org/keywords/optimized-link-state-routing-protocol","display_name":"Optimized Link State Routing Protocol","score":0.28981709480285645},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.19559061527252197}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8884390592575073},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6547962427139282},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6319144368171692},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.4645262658596039},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.46344757080078125},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.44258004426956177},{"id":"https://openalex.org/C104503742","wikidata":"https://www.wikidata.org/wiki/Q345335","display_name":"Ad hoc On-Demand Distance Vector Routing","level":5,"score":0.43908604979515076},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4376336336135864},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33196452260017395},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.2927848696708679},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.28981709480285645},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.19559061527252197},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.2498/cit.1000748","is_oa":true,"landing_page_url":"https://doi.org/10.2498/cit.1000748","pdf_url":"http://cit.fer.hr/index.php/CIT/article/download/1627/1331","source":{"id":"https://openalex.org/S98565333","display_name":"Journal of Computing and Information Technology","issn_l":"1330-1136","issn":["1330-1136","1846-3908"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310314807","host_organization_name":"Faculty of Electrical Engineering and Computing, University of Zagreb","host_organization_lineage":["https://openalex.org/P4310314807"],"host_organization_lineage_names":["Faculty of Electrical Engineering and Computing, University of Zagreb"],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computing and Information Technology","raw_type":"journal-article"},{"id":"pmh:oai:hrcak.srce.hr:44638","is_oa":true,"landing_page_url":"http://hrcak.srce.hr/44638","pdf_url":null,"source":{"id":"https://openalex.org/S4306400677","display_name":"Hr\u010dak Portal of scientific journals of Croatia (University Computing Centre)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210104502","host_organization_name":"United Nations University","host_organization_lineage":["https://openalex.org/I4210104502"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of computing and information technology","raw_type":"text"}],"best_oa_location":{"id":"doi:10.2498/cit.1000748","is_oa":true,"landing_page_url":"https://doi.org/10.2498/cit.1000748","pdf_url":"http://cit.fer.hr/index.php/CIT/article/download/1627/1331","source":{"id":"https://openalex.org/S98565333","display_name":"Journal of Computing and Information Technology","issn_l":"1330-1136","issn":["1330-1136","1846-3908"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310314807","host_organization_name":"Faculty of Electrical Engineering and Computing, University of Zagreb","host_organization_lineage":["https://openalex.org/P4310314807"],"host_organization_lineage_names":["Faculty of Electrical Engineering and Computing, University of Zagreb"],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computing and Information Technology","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.47999998927116394,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G5249178904","display_name":null,"funder_award_id":"Grant No. 6","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2243702911.pdf","grobid_xml":"https://content.openalex.org/works/W2243702911.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W2036358294","https://openalex.org/W2069519268","https://openalex.org/W2102258543","https://openalex.org/W2112203433","https://openalex.org/W2125619860","https://openalex.org/W2128381560","https://openalex.org/W2131152570","https://openalex.org/W2158923961","https://openalex.org/W4236287335","https://openalex.org/W6600195515"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W3157271777","https://openalex.org/W2377372927","https://openalex.org/W1495178644"],"abstract_inverted_index":{"Network":[0],"Processor":[1],"(NP)":[2],"is":[3,23,54,70,82,130,144],"optimized":[4],"to":[5,16,29,72,113,118,132,147],"perform":[6],"special":[7],"network":[8,22,39],"functionalities.":[9],"It":[10],"has":[11],"highly":[12,145],"parallel":[13],"processing":[14],"architecture":[15],"achieve":[17],"high":[18],"performance.":[19],"Ad":[20,62],"hoc":[21,63],"an":[24],"exciting":[25],"research":[26],"aspect":[27],"due":[28],"the":[30,43,46,55,59,74,98,101,107,115,134],"characters":[31,44],"of":[32,61,100],"self-organization\u3001":[33],"dynamically":[34],"changing":[35],"topology":[36],"and":[37,109,121,149],"temporary":[38],"life.":[40],"However,":[41],"all":[42],"make":[45],"security":[47,60,68,135,142],"problem":[48],"more":[49],"serious.":[50],"Denial-of-Service":[51],"(DoS)":[52],"attack":[53,75],"main":[56],"puzzle":[57],"in":[58,76,88],"network.":[64],"A":[65],"novel":[66],"NP-based":[67,141],"scheme":[69,143],"proposed":[71],"combat":[73],"AODV":[77],"routing":[78],"protocol.":[79],"Security":[80],"agent":[81],"established":[83],"by":[84,97,124],"a":[85],"hardware":[86],"thread":[87],"NP.":[89],"Agent":[90,104],"can":[91,105],"update":[92],"itself":[93],"at":[94],"some":[95],"interval":[96],"trustworthiness":[99],"neighbor":[102],"nodes.":[103],"trace":[106],"RREQ":[108],"RREP":[110],"messages":[111],"stream":[112],"aggregate":[114],"key":[116],"information":[117],"link":[119],"list":[120],"analyze":[122],"them":[123],"intrusion":[125],"detection":[126],"algorithm.":[127],"NS2":[128],"simulator":[129],"expanded":[131],"validate":[133],"scheme.":[136],"Simulation":[137],"results":[138],"show":[139],"that":[140],"effective":[146],"detect":[148],"block":[150],"DoS":[151],"attack.":[152]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
