{"id":"https://openalex.org/W3208059157","doi":"https://doi.org/10.3233/faia210200","title":"Securing Mobile Adhoc Networks from Black-Hole Attacks","display_name":"Securing Mobile Adhoc Networks from Black-Hole Attacks","publication_year":2021,"publication_date":"2021-10-14","ids":{"openalex":"https://openalex.org/W3208059157","doi":"https://doi.org/10.3233/faia210200","mag":"3208059157"},"language":"en","primary_location":{"id":"doi:10.3233/faia210200","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia210200","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA210200","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA210200","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067354361","display_name":"Fahmina Taranum","orcid":"https://orcid.org/0000-0002-6810-088X"},"institutions":[{"id":"https://openalex.org/I8975392","display_name":"Osmania University","ror":"https://ror.org/030sjb889","country_code":"IN","type":"education","lineage":["https://openalex.org/I8975392"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Fahmina Taranum","raw_affiliation_strings":["Muffakham Jah College of Engineering and Technology, Osmania University, India"],"affiliations":[{"raw_affiliation_string":"Muffakham Jah College of Engineering and Technology, Osmania University, India","institution_ids":["https://openalex.org/I8975392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068120463","display_name":"Khaleel Ur Rahman Khan","orcid":"https://orcid.org/0000-0002-6206-0370"},"institutions":[{"id":"https://openalex.org/I10874241","display_name":"Jawaharlal Nehru Technological University, Hyderabad","ror":"https://ror.org/002tchr49","country_code":"IN","type":"education","lineage":["https://openalex.org/I10874241"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Khaleel Ur Rahman Khan","raw_affiliation_strings":["Ace Engineering College, Jawahar Lal Nehru Technological University, India"],"affiliations":[{"raw_affiliation_string":"Ace Engineering College, Jawahar Lal Nehru Technological University, India","institution_ids":["https://openalex.org/I10874241"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5067354361"],"corresponding_institution_ids":["https://openalex.org/I8975392"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24805129,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8109172582626343},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5453372597694397},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.514029860496521},{"id":"https://openalex.org/keywords/distance-vector-routing-protocol","display_name":"Distance-vector routing protocol","score":0.501197099685669},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.49542486667633057},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46349501609802246},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.46052154898643494},{"id":"https://openalex.org/keywords/ad-hoc-on-demand-distance-vector-routing","display_name":"Ad hoc On-Demand Distance Vector Routing","score":0.4525928795337677},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.4474070072174072},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4454275369644165},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.41008061170578003},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3432410955429077},{"id":"https://openalex.org/keywords/optimized-link-state-routing-protocol","display_name":"Optimized Link State Routing Protocol","score":0.23001492023468018},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.22827258706092834},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.17137879133224487},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.12695980072021484},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09472665190696716},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.09292158484458923}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8109172582626343},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5453372597694397},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.514029860496521},{"id":"https://openalex.org/C202385902","wikidata":"https://www.wikidata.org/wiki/Q1229441","display_name":"Distance-vector routing protocol","level":5,"score":0.501197099685669},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.49542486667633057},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46349501609802246},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.46052154898643494},{"id":"https://openalex.org/C104503742","wikidata":"https://www.wikidata.org/wiki/Q345335","display_name":"Ad hoc On-Demand Distance Vector Routing","level":5,"score":0.4525928795337677},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.4474070072174072},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4454275369644165},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.41008061170578003},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3432410955429077},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.23001492023468018},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.22827258706092834},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.17137879133224487},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.12695980072021484},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09472665190696716},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.09292158484458923},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia210200","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia210200","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA210200","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia210200","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia210200","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA210200","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6299999952316284,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3208059157.pdf","grobid_xml":"https://content.openalex.org/works/W3208059157.grobid-xml"},"referenced_works_count":8,"referenced_works":["https://openalex.org/W2338211929","https://openalex.org/W2617404243","https://openalex.org/W2800595019","https://openalex.org/W2890856948","https://openalex.org/W2953933603","https://openalex.org/W3108372810","https://openalex.org/W3117929004","https://openalex.org/W4237584378"],"related_works":["https://openalex.org/W4210907385","https://openalex.org/W2362328212","https://openalex.org/W4205295022","https://openalex.org/W2613388499","https://openalex.org/W2902224392","https://openalex.org/W2377438927","https://openalex.org/W2277666233","https://openalex.org/W2252200027","https://openalex.org/W2269045947","https://openalex.org/W2998608754"],"abstract_inverted_index":{"MANETs":[0,38],"are":[1,343],"in-secure":[2],"and":[3,24,42,50,88,116,267,306,327],"vulnerable":[4],"to":[5,16,36,57,60,78,169,210,228,234],"attacks,":[6],"as":[7],"it":[8],"lacks":[9],"a":[10,18,109,177,293],"central":[11],"trusted":[12],"authority.":[13],"Providing":[14],"security":[15],"such":[17,80],"network":[19,91,178,298],"becomes":[20],"an":[21,62,81,144,203,288],"essential":[22],"task":[23],"formulate":[25],"the":[26,29,47,74,96,99,106,126,133,157,186,197,226,229,236,246,249,273,278,284,297,309,319,336,340],"origin":[27],"of":[28,46,95,101,122,125,185,239,286,303,335],"proposed":[30,33,131,174],"work.":[31],"The":[32,93,173,254,280,311,333],"system":[34,175],"attempts":[35],"secure":[37],"using":[39,190],"route":[40,219],"validation":[41,121],"cryptographic":[43,102,206],"techniques.":[44],"One":[45],"most":[48],"crucial,":[49],"primary":[51],"concerns":[52],"in":[53,72,85,156,161],"today\u2019s":[54],"times":[55],"is":[56,77,98,164,180,208,275,322,338],"be":[58,242],"able":[59],"detect":[61],"attacker":[63],"at":[64],"its":[65,330],"initial":[66,86],"stages.":[67],"With":[68],"this":[69],"focus":[70],"point":[71],"mind,":[73],"approach":[75],"used":[76,165,256],"prevent":[79],"attacks":[82],"by":[83,132,244],"detecting":[84,292],"stage":[87],"preventing":[89],"from":[90,182,225],"degradation.":[92],"novelty":[94],"proposal":[97,337],"use":[100],"techniques":[103,130],"for":[104,111,120,257,277,291,324],"improving":[105],"security,":[107],"along":[108],"reverse-AODV":[110],"reducing":[112],"path":[113],"fail":[114],"correction,":[115],"machine":[117,139,148,162],"learning":[118,163],"concepts":[119],"results.":[123],"Many":[124],"existing":[127,158],"malware":[128],"detection":[129],"researchers":[134],"were":[135,188,194],"executed":[136],"either":[137],"on":[138,143,271,329],"independent":[140],"platform,":[141],"or":[142],"available":[145],"dataset":[146],"with":[147,166,196,216,300],"dependent":[149],"approaches.":[150],"This":[151],"drawback":[152],"has":[153],"been":[154,223],"addressed":[155],"proposal,":[159],"where":[160],"self-generated":[167],"data-set,":[168],"eliminate":[170],"contingent":[171],"problems.":[172],"includes":[176,283],"that":[179,193,221,339],"free":[181],"malware.":[183],"Justification":[184],"results":[187],"generated":[189,224],"classifier":[191],"tools":[192],"trained":[195],"obtained":[198],"dataset.":[199],"For":[200],"secured":[201,252],"communication,":[202],"Elliptical":[204],"curve":[205],"algorithm":[207],"applied":[209],"reverse":[211,217],"ad-hoc":[212],"on-demand":[213],"distance":[214],"vector":[215],"multiple":[218],"replies":[220],"have":[222],"destination":[227],"source":[230],"node.":[231],"An":[232],"investigation":[233],"ensure":[235],"correct":[237],"delivery":[238],"data":[240],"can":[241],"done":[243],"diverting":[245],"traffic":[247],"through":[248],"shortest":[250],"alternative":[251],"path.":[253],"metrics":[255],"statistical":[258],"analysis":[259],"include":[260],"average":[261],"transmission-delay,":[262],"overhead,":[263],"packet":[264],"forwarding":[265],"rate":[266],"packet-":[268],"delivery-rate,":[269],"based":[270],"which":[272],"conclusion":[274],"theorized":[276],"detection.":[279],"major":[281],"finding":[282],"process":[285],"selecting":[287],"appropriate":[289],"condition":[290],"malicious":[294],"node,":[295],"observing":[296],"behavior":[299],"varying":[301],"number":[302],"suspicious":[304,320,341],"nodes":[305,342],"then":[307,328],"validating":[308],"correctness.":[310],"implementation":[312],"gives":[313],"us":[314],"varied":[315],"results,":[316],"both":[317],"when":[318],"node":[321],"deferred":[323],"some":[325],"time,":[326],"complete":[331],"elimination.":[332],"limitation":[334],"uncoordinated.":[344]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
