{"id":"https://openalex.org/W3093913018","doi":"https://doi.org/10.4018/ijitpm.2020100104","title":"Identifying Intruders in MANET","display_name":"Identifying Intruders in MANET","publication_year":2020,"publication_date":"2020-10-01","ids":{"openalex":"https://openalex.org/W3093913018","doi":"https://doi.org/10.4018/ijitpm.2020100104","mag":"3093913018"},"language":"en","primary_location":{"id":"doi:10.4018/ijitpm.2020100104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijitpm.2020100104","pdf_url":null,"source":{"id":"https://openalex.org/S94059882","display_name":"International Journal of Information Technology Project Management","issn_l":"1938-0232","issn":["1938-0232","1938-0240"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Technology Project Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084181171","display_name":"Deepak Kumar Verma","orcid":"https://orcid.org/0000-0001-7177-7632"},"institutions":[{"id":"https://openalex.org/I94234084","display_name":"Indian Institute of Technology Kanpur","ror":"https://ror.org/05pjsgx75","country_code":"IN","type":"education","lineage":["https://openalex.org/I94234084"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Deepak Kumar Verma","raw_affiliation_strings":["University Institute of Engineering and Technology, Kanpur, India"],"affiliations":[{"raw_affiliation_string":"University Institute of Engineering and Technology, Kanpur, India","institution_ids":["https://openalex.org/I94234084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042057124","display_name":"Ashwani Kush","orcid":null},"institutions":[{"id":"https://openalex.org/I178000100","display_name":"Kurukshetra University","ror":"https://ror.org/019bzvf55","country_code":"IN","type":"education","lineage":["https://openalex.org/I178000100"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashwani Kush","raw_affiliation_strings":["University College, Kurukshetra, India"],"affiliations":[{"raw_affiliation_string":"University College, Kurukshetra, India","institution_ids":["https://openalex.org/I178000100"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109357395","display_name":"Renu Jain","orcid":null},"institutions":[{"id":"https://openalex.org/I94234084","display_name":"Indian Institute of Technology Kanpur","ror":"https://ror.org/05pjsgx75","country_code":"IN","type":"education","lineage":["https://openalex.org/I94234084"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Renu Jain","raw_affiliation_strings":["University Institute of Engineering and Technology, Kanpur, India"],"affiliations":[{"raw_affiliation_string":"University Institute of Engineering and Technology, Kanpur, India","institution_ids":["https://openalex.org/I94234084"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5084181171"],"corresponding_institution_ids":["https://openalex.org/I94234084"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16081439,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"11","issue":"4","first_page":"42","last_page":"55"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7825469970703125},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.718346357345581},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7009769678115845},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.682503879070282},{"id":"https://openalex.org/keywords/ad-hoc-on-demand-distance-vector-routing","display_name":"Ad hoc On-Demand Distance Vector Routing","score":0.6252173185348511},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5705397725105286},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4905833303928375},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4665500819683075},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.4513234496116638},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4426487386226654},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4138234257698059},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.3739466071128845},{"id":"https://openalex.org/keywords/optimized-link-state-routing-protocol","display_name":"Optimized Link State Routing Protocol","score":0.3411034941673279},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.298134446144104},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12066885828971863}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7825469970703125},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.718346357345581},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7009769678115845},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.682503879070282},{"id":"https://openalex.org/C104503742","wikidata":"https://www.wikidata.org/wiki/Q345335","display_name":"Ad hoc On-Demand Distance Vector Routing","level":5,"score":0.6252173185348511},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5705397725105286},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4905833303928375},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4665500819683075},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.4513234496116638},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4426487386226654},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4138234257698059},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.3739466071128845},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.3411034941673279},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.298134446144104},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12066885828971863}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijitpm.2020100104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijitpm.2020100104","pdf_url":null,"source":{"id":"https://openalex.org/S94059882","display_name":"International Journal of Information Technology Project Management","issn_l":"1938-0232","issn":["1938-0232","1938-0240"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Technology Project Management","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jitpm0:v:11:y:2020:i:4:p:42-55","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJITPM.2020100104","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1136216319","https://openalex.org/W1993596530","https://openalex.org/W2009095173","https://openalex.org/W2011094081","https://openalex.org/W2032087901","https://openalex.org/W2345410565","https://openalex.org/W2591986835","https://openalex.org/W2600058599","https://openalex.org/W3104331955"],"related_works":["https://openalex.org/W6219061","https://openalex.org/W845151","https://openalex.org/W5957501","https://openalex.org/W5255802","https://openalex.org/W1482588","https://openalex.org/W8984404","https://openalex.org/W4206810","https://openalex.org/W3749128","https://openalex.org/W13035644","https://openalex.org/W4992315"],"abstract_inverted_index":{"Mobile":[0],"ad":[1],"hoc":[2],"networks":[3],"are":[4],"characterized":[5],"by":[6,42],"wireless":[7],"medium":[8],"used":[9,67],"for":[10,21,48,79],"communication,":[11],"frequent":[12],"change":[13],"of":[14,18,24,39,76,92,104],"topology,":[15],"and":[16],"non-availability":[17],"centralized":[19],"control":[20],"authentication.":[22],"Out":[23],"all":[25],"the":[26,33,43,60,72,81,85,90,93,105],"attributes,":[27],"communication":[28],"through":[29,95],"open":[30],"air":[31],"poses":[32],"biggest":[34],"threat":[35],"to":[36,50,58,70],"security.":[37],"Absence":[38],"security":[40],"implementations":[41],"routing":[44],"protocols":[45],"gives":[46],"opening":[47],"intrusion":[49],"malicious":[51,82],"nodes":[52,83],"which":[53],"then":[54],"operate":[55],"various":[56],"attacks":[57],"hinder":[59],"normal":[61],"communication.":[62],"Solution":[63],"suggested":[64],"modifies":[65],"vastly":[66],"AODV":[68],"protocol":[69],"exploit":[71],"unused":[73],"reserved":[74],"bits":[75],"RREP":[77],"message":[78],"identifying":[80],"in":[84],"MANET.":[86],"Proposed":[87],"algorithm":[88],"finds":[89],"neighbors":[91,100],"destination":[94],"RREQ":[96],"messages,":[97],"identifies":[98],"vindictive":[99],"providing":[101],"contrived":[102],"DSNs":[103],"destination.":[106]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2020-10-29T00:00:00"}
