{"id":"https://openalex.org/W7124453783","doi":"https://doi.org/10.31449/inf.v49i37.12267","title":"ELRP: A Trust and IDS-Integrated Opportunistic Routing Protocol for MANETs with NS2-Based Evaluation","display_name":"ELRP: A Trust and IDS-Integrated Opportunistic Routing Protocol for MANETs with NS2-Based Evaluation","publication_year":2025,"publication_date":"2025-12-25","ids":{"openalex":"https://openalex.org/W7124453783","doi":"https://doi.org/10.31449/inf.v49i37.12267"},"language":null,"primary_location":{"id":"doi:10.31449/inf.v49i37.12267","is_oa":true,"landing_page_url":"https://doi.org/10.31449/inf.v49i37.12267","pdf_url":"https://www.informatica.si/index.php/informatica/article/download/12267/6392","source":{"id":"https://openalex.org/S4210173311","display_name":"Informatica","issn_l":"0350-5596","issn":["0350-5596","1854-3871"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310314525","host_organization_name":"Slovenian Society Informatika","host_organization_lineage":["https://openalex.org/P4310314525"],"host_organization_lineage_names":["Slovenian Society Informatika"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatica","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.informatica.si/index.php/informatica/article/download/12267/6392","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100718381","display_name":"Jidong Zhang","orcid":"https://orcid.org/0000-0003-4158-0972"},"institutions":[{"id":"https://openalex.org/I7726996","display_name":"Henan University of Economic and Law","ror":"https://ror.org/000jtc944","country_code":"CN","type":"education","lineage":["https://openalex.org/I7726996"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jidong Zhang","raw_affiliation_strings":["School of Information Engineering, Zhengzhou College of Finance and Economics, Zhengzhou 450053, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Zhengzhou College of Finance and Economics, Zhengzhou 450053, China","institution_ids":["https://openalex.org/I7726996"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5100718381"],"corresponding_institution_ids":["https://openalex.org/I7726996"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.72830178,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"49","issue":"37","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9610000252723694,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9610000252723694,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.009600000455975533,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.002199999988079071,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.6215999722480774},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.576200008392334},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5357000231742859},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5238999724388123},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.46549999713897705},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.45080000162124634},{"id":"https://openalex.org/keywords/forwarder","display_name":"Forwarder","score":0.43459999561309814},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.42590001225471497},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.41269999742507935}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8040000200271606},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7836999893188477},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.6215999722480774},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.576200008392334},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5357000231742859},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5238999724388123},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.46549999713897705},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.45080000162124634},{"id":"https://openalex.org/C2781363737","wikidata":"https://www.wikidata.org/wiki/Q616007","display_name":"Forwarder","level":2,"score":0.43459999561309814},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.42590001225471497},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.41269999742507935},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4097000062465668},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.39570000767707825},{"id":"https://openalex.org/C47318570","wikidata":"https://www.wikidata.org/wiki/Q8026863","display_name":"Wireless Routing Protocol","level":4,"score":0.38609999418258667},{"id":"https://openalex.org/C189884158","wikidata":"https://www.wikidata.org/wiki/Q8073926","display_name":"Zone Routing Protocol","level":5,"score":0.3549000024795532},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.35280001163482666},{"id":"https://openalex.org/C104503742","wikidata":"https://www.wikidata.org/wiki/Q345335","display_name":"Ad hoc On-Demand Distance Vector Routing","level":5,"score":0.352400004863739},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35010001063346863},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.3495999872684479},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.34540000557899475},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.31850001215934753},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.2953000068664551},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.27889999747276306},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.2718000113964081},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.27129998803138733},{"id":"https://openalex.org/C54108766","wikidata":"https://www.wikidata.org/wiki/Q391064","display_name":"Packet loss","level":3,"score":0.2662999927997589},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2651999890804291},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.2648000121116638},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.2526000142097473}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.31449/inf.v49i37.12267","is_oa":true,"landing_page_url":"https://doi.org/10.31449/inf.v49i37.12267","pdf_url":"https://www.informatica.si/index.php/informatica/article/download/12267/6392","source":{"id":"https://openalex.org/S4210173311","display_name":"Informatica","issn_l":"0350-5596","issn":["0350-5596","1854-3871"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310314525","host_organization_name":"Slovenian Society Informatika","host_organization_lineage":["https://openalex.org/P4310314525"],"host_organization_lineage_names":["Slovenian Society Informatika"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatica","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.31449/inf.v49i37.12267","is_oa":true,"landing_page_url":"https://doi.org/10.31449/inf.v49i37.12267","pdf_url":"https://www.informatica.si/index.php/informatica/article/download/12267/6392","source":{"id":"https://openalex.org/S4210173311","display_name":"Informatica","issn_l":"0350-5596","issn":["0350-5596","1854-3871"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310314525","host_organization_name":"Slovenian Society Informatika","host_organization_lineage":["https://openalex.org/P4310314525"],"host_organization_lineage_names":["Slovenian Society Informatika"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatica","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6259826421737671,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7124453783.pdf","grobid_xml":"https://content.openalex.org/works/W7124453783.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Mobile":[0],"Ad":[1],"Hoc":[2],"Networks":[3],"(MANETs)":[4],"are":[5,16,23],"widely":[6],"used":[7],"in":[8,45,60,150],"diverse":[9],"situations":[10],"where":[11],"secure":[12,41,70],"communication":[13,71],"and":[14,43,63,87,127,130,142,166],"reliability":[15,44,86],"necessary.":[17],"MANETs":[18],"without":[19],"a":[20],"centralized":[21],"infrastructure":[22],"prone":[24],"to":[25,39,53,78,93,111,125,173],"various":[26],"security":[27],"threats.":[28],"This":[29],"paper":[30],"presents":[31],"an":[32,95,119],"Enhanced":[33],"Lightweight":[34],"Trusted":[35],"Routing":[36],"Protocol":[37],"(ELRP)":[38],"ensure":[40],"connectivity":[42],"MANETs.":[46],"The":[47],"primary":[48],"goal":[49],"of":[50,57,75],"ELRP":[51,108,117,134,154],"is":[52,135],"prevent":[54],"the":[55,61,105,113],"inclusion":[56],"malicious":[58,177],"hosts":[59],"route":[62],"reliably":[64],"convey":[65],"data.":[66],"Trust":[67],"metrics":[68],"provide":[69],"by":[72,157,164,170],"leveraging":[73],"quality":[74],"service":[76],"parameters":[77],"optimize":[79],"trust":[80,101,106],"computation.":[81],"Opportunistic":[82],"routing":[83],"enhances":[84],"data":[85],"consistency.":[88],"It":[89],"allows":[90],"each":[91],"node":[92,97],"choose":[94],"intermediate":[96],"dynamically":[98],"based":[99],"on":[100,104],"levels.":[102],"Depending":[103],"factor,":[107],"enables":[109],"nodes":[110],"select":[112],"forwarder":[114],"at":[115],"runtime.":[116],"features":[118],"Intrusion":[120],"Detection":[121],"System":[122],"(IDS)":[123],"designed":[124],"recognize":[126],"mitigate":[128],"black":[129],"grey":[131],"hole":[132],"attacks.":[133],"scalable":[136],"as":[137],"it":[138],"uses":[139],"local":[140],"information":[141],"does":[143],"not":[144],"consume":[145],"computational":[146],"resources.":[147],"Simulations":[148],"conducted":[149],"NS2":[151],"demonstrate":[152],"that":[153],"improves":[155],"throughput":[156],"approximately":[158],"22%,":[159],"increases":[160],"packet":[161],"delivery":[162],"ratio":[163],"14.4%,":[165],"reduces":[167],"end-to-end":[168],"delay":[169],"37.1%":[171],"compared":[172],"standard":[174],"AODV":[175],"under":[176],"attack":[178],"scenarios.":[179]},"counts_by_year":[],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2026-01-17T00:00:00"}
