{"id":"https://openalex.org/W3101528265","doi":"https://doi.org/10.4018/ijsppc.2020100101","title":"Evaluating the Impact of DDoS Attacks in Vehicular Ad-Hoc Networks","display_name":"Evaluating the Impact of DDoS Attacks in Vehicular Ad-Hoc Networks","publication_year":2020,"publication_date":"2020-10-01","ids":{"openalex":"https://openalex.org/W3101528265","doi":"https://doi.org/10.4018/ijsppc.2020100101","mag":"3101528265"},"language":"en","primary_location":{"id":"doi:10.4018/ijsppc.2020100101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijsppc.2020100101","pdf_url":null,"source":{"id":"https://openalex.org/S4210204675","display_name":"International Journal of Security and Privacy in Pervasive Computing","issn_l":"2643-7937","issn":["2643-7937","2643-7945"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Security and Privacy in Pervasive Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063126725","display_name":"Kaushik Adhikary","orcid":"https://orcid.org/0000-0001-6514-0395"},"institutions":[{"id":"https://openalex.org/I94616015","display_name":"Punjab Technical University","ror":"https://ror.org/025kz2973","country_code":"IN","type":"education","lineage":["https://openalex.org/I94616015"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Kaushik Adhikary","raw_affiliation_strings":["I. K. Gujral Punjab Technical University, Kapurthala, India"],"affiliations":[{"raw_affiliation_string":"I. K. Gujral Punjab Technical University, Kapurthala, India","institution_ids":["https://openalex.org/I94616015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045879762","display_name":"Shashi Bhushan","orcid":"https://orcid.org/0000-0002-4083-7257"},"institutions":[{"id":"https://openalex.org/I860003557","display_name":"Punjab Engineering College","ror":"https://ror.org/00bsj2955","country_code":"IN","type":"education","lineage":["https://openalex.org/I860003557"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shashi Bhushan","raw_affiliation_strings":["Chandigarh Engineering College, India"],"affiliations":[{"raw_affiliation_string":"Chandigarh Engineering College, India","institution_ids":["https://openalex.org/I860003557"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100672118","display_name":"Sunil Kumar","orcid":"https://orcid.org/0000-0003-1344-4375"},"institutions":[{"id":"https://openalex.org/I2799452066","display_name":"Maharaja Engineering College","ror":"https://ror.org/034pbde03","country_code":"IN","type":"education","lineage":["https://openalex.org/I2799452066","https://openalex.org/I33585257"]},{"id":"https://openalex.org/I4400600956","display_name":"Maharaja Agrasen University","ror":"https://ror.org/01mjr8a07","country_code":null,"type":"education","lineage":["https://openalex.org/I4400600956"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sunil Kumar","raw_affiliation_strings":["Maharaja Agrasen University, India"],"affiliations":[{"raw_affiliation_string":"Maharaja Agrasen University, India","institution_ids":["https://openalex.org/I2799452066","https://openalex.org/I4400600956"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067298637","display_name":"Kamlesh Dutta","orcid":"https://orcid.org/0000-0003-3197-2235"},"institutions":[{"id":"https://openalex.org/I36909309","display_name":"National Institute of Technology Hamirpur","ror":"https://ror.org/01nc8zs04","country_code":"IN","type":"education","lineage":["https://openalex.org/I36909309","https://openalex.org/I4210152752"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kamlesh Dutta","raw_affiliation_strings":["National Institute of Technology, Hamirpur, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Hamirpur, India","institution_ids":["https://openalex.org/I36909309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5063126725"],"corresponding_institution_ids":["https://openalex.org/I94616015"],"apc_list":null,"apc_paid":null,"fwci":0.2055,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.52320556,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"12","issue":"4","first_page":"1","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11099","display_name":"Autonomous Vehicle Technology and Safety","score":0.9807999730110168,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9754999876022339,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.9369968175888062},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7904192805290222},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.733485221862793},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.7134522795677185},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.655469536781311},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.6165821552276611},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5924285054206848},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.5600529313087463},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5436798930168152},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.5050008893013},{"id":"https://openalex.org/keywords/jitter","display_name":"Jitter","score":0.45649874210357666},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.19316968321800232},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.12081736326217651},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11182275414466858}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9369968175888062},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7904192805290222},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.733485221862793},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.7134522795677185},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.655469536781311},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.6165821552276611},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5924285054206848},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.5600529313087463},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5436798930168152},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.5050008893013},{"id":"https://openalex.org/C134652429","wikidata":"https://www.wikidata.org/wiki/Q1052698","display_name":"Jitter","level":2,"score":0.45649874210357666},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.19316968321800232},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.12081736326217651},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11182275414466858},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4018/ijsppc.2020100101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijsppc.2020100101","pdf_url":null,"source":{"id":"https://openalex.org/S4210204675","display_name":"International Journal of Security and Privacy in Pervasive Computing","issn_l":"2643-7937","issn":["2643-7937","2643-7945"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Security and Privacy in Pervasive Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1217034487","https://openalex.org/W1551905394","https://openalex.org/W1925984292","https://openalex.org/W1933607324","https://openalex.org/W2007716404","https://openalex.org/W2061476334","https://openalex.org/W2074074366","https://openalex.org/W2108038654","https://openalex.org/W2137469879","https://openalex.org/W2142100695","https://openalex.org/W2148400130","https://openalex.org/W2180055784","https://openalex.org/W2327463967","https://openalex.org/W2327611059","https://openalex.org/W2418543572","https://openalex.org/W2498575077","https://openalex.org/W2535712227","https://openalex.org/W2560807706","https://openalex.org/W2575210142","https://openalex.org/W2575905174","https://openalex.org/W2800815122","https://openalex.org/W2804653966","https://openalex.org/W2918461235","https://openalex.org/W2971617045"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2754163055","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":{"The":[0,24,109,128],"presence":[1],"of":[2,8,20,27,67,107,135,155],"either":[3],"malicious":[4],"vehicles":[5,52],"or":[6],"inaccessibility":[7],"network":[9],"services":[10],"makes":[11],"vehicular":[12,77],"ad-hoc":[13],"networks":[14,141],"(VANETs)":[15],"easy":[16],"targets":[17],"for":[18],"denial":[19],"service":[21],"(DoS)":[22],"attacks.":[23,82],"sole":[25],"purpose":[26],"DoS":[28,45,62,137],"attacks":[29,94],"is":[30,47,58,143],"to":[31,90,100,150],"prevent":[32],"the":[33,38,44,55,76,80,92,105,133,152],"intended":[34],"users":[35],"from":[36],"accessing":[37],"available":[39],"resources":[40],"and":[41,126,146],"services.":[42],"When":[43],"attack":[46,139],"carried":[48],"out":[49],"by":[50,72],"multiple":[51],"distributed":[53,61,136],"throughout":[54],"network,":[56],"it":[57],"referred":[59],"as":[60,97,99],"(DDoS)":[63,138],"attack.":[64],"A":[65],"lot":[66],"works":[68],"have":[69,87],"been":[70,88],"done":[71],"researchers":[73],"in":[74,95],"securing":[75],"communication":[78],"against":[79],"DDoS":[81,93],"In":[83],"this":[84],"paper,":[85],"efforts":[86],"made":[89],"simulate":[91],"VANETs":[96],"well":[98],"study":[101],"their":[102],"impact":[103,134],"on":[104,140],"performance":[106,142],"networks.":[108,156],"experimental":[110,129],"results":[111,130],"are":[112,119],"presented":[113],"using":[114],"six":[115],"important":[116],"metrics,":[117],"which":[118],"collision,":[120],"jitter,":[121],"delay,":[122],"packet":[123],"drop,":[124],"ratio-in-out,":[125],"throughput.":[127],"show":[131],"that":[132],"very":[144],"critical":[145],"must":[147],"be":[148],"addressed":[149],"ensure":[151],"smooth":[153],"functioning":[154]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":4},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
