{"id":"https://openalex.org/W3171358072","doi":"https://doi.org/10.1108/ijpcc-10-2020-0162","title":"Detection and prevention of black-hole and wormhole attacks in wireless sensor network using optimized LSTM","display_name":"Detection and prevention of black-hole and wormhole attacks in wireless sensor network using optimized LSTM","publication_year":2021,"publication_date":"2021-06-02","ids":{"openalex":"https://openalex.org/W3171358072","doi":"https://doi.org/10.1108/ijpcc-10-2020-0162","mag":"3171358072"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1108/ijpcc-10-2020-0162","pdf_url":null,"source":{"id":"https://openalex.org/S172682790","display_name":"International Journal of Pervasive Computing and Communications","issn_l":"1742-7371","issn":["1742-7371","1742-738X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110792938","display_name":"Mohandas V. Pawar","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mohandas V. Pawar","raw_affiliation_strings":["VIT University, Vellore, India"],"affiliations":[{"raw_affiliation_string":"VIT University, Vellore, India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015960177","display_name":"J. Anuradha","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Anuradha J.","raw_affiliation_strings":["VIT University, Vellore, India"],"affiliations":[{"raw_affiliation_string":"VIT University, Vellore, India","institution_ids":["https://openalex.org/I876193797"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.76,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.999938,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":90},"biblio":{"volume":"19","issue":"1","first_page":"124","last_page":"153"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9959,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wormhole","display_name":"Wormhole","score":0.7622305},{"id":"https://openalex.org/keywords/black-hole","display_name":"Black hole (networking)","score":0.41583934}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8441516},{"id":"https://openalex.org/C29013271","wikidata":"https://www.wikidata.org/wiki/Q7544","display_name":"Wormhole","level":2,"score":0.7622305},{"id":"https://openalex.org/C22590252","wikidata":"https://www.wikidata.org/wiki/Q1058754","display_name":"Shortest path problem","level":3,"score":0.6552884},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.611792},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5925844},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.53333884},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.51633394},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.45485783},{"id":"https://openalex.org/C50341732","wikidata":"https://www.wikidata.org/wiki/Q880302","display_name":"Black hole (networking)","level":5,"score":0.41583934},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40418014},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.1594426},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.09698689},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1108/ijpcc-10-2020-0162","pdf_url":null,"source":{"id":"https://openalex.org/S172682790","display_name":"International Journal of Pervasive Computing and Communications","issn_l":"1742-7371","issn":["1742-7371","1742-738X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.9,"id":"https://metadata.un.org/sdg/7"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":21,"referenced_works":["https://openalex.org/W2015164266","https://openalex.org/W2061279950","https://openalex.org/W2073087325","https://openalex.org/W2156023754","https://openalex.org/W2157921329","https://openalex.org/W2290883490","https://openalex.org/W2328012902","https://openalex.org/W2330262191","https://openalex.org/W2333010414","https://openalex.org/W2417927506","https://openalex.org/W2755619129","https://openalex.org/W2764212387","https://openalex.org/W2773775904","https://openalex.org/W2791019495","https://openalex.org/W2897998934","https://openalex.org/W2903023342","https://openalex.org/W2912015692","https://openalex.org/W2916649213","https://openalex.org/W2971307413","https://openalex.org/W2995395622","https://openalex.org/W4250056563"],"related_works":["https://openalex.org/W4316829536","https://openalex.org/W4300704821","https://openalex.org/W4298717831","https://openalex.org/W4248001395","https://openalex.org/W2126067753","https://openalex.org/W210968471","https://openalex.org/W2012689257","https://openalex.org/W1976900091","https://openalex.org/W1645600878","https://openalex.org/W1559812758"],"abstract_inverted_index":{"Purpose":[0],"This":[1,134,184,207,292],"study":[2],"aims":[3,233],"to":[4,234,274,280,287],"present":[5],"a":[6,59,210],"novel":[7],"system":[8],"for":[9,65,118,137,221],"detection":[10,139,211],"and":[11,16,44,47,51,83,105,200,212,276,284,301,305,329,333],"prevention":[12,213,223],"of":[13,61,214,224,239,252,264,313],"black":[14,42,49,74,303,331],"hole":[15,43,50,75,304,332],"wormhole":[17,45,52,84,306,334],"attacks":[18,46,53,76,85,146,215,225,307,335],"in":[19,70,121,168,226],"wireless":[20],"sensor":[21],"network":[22,151],"(WSN)":[23],"based":[24,191,217],"on":[25,192,218],"deep":[26],"learning":[27],"model.":[28],"Here,":[29,158],"different":[30],"phases":[31],"are":[32,77,86,116,143,147],"included":[33],"such":[34],"as":[35,177,204],"assigning":[36],"the":[37,68,73,80,89,103,119,131,150,153,159,166,169,193,222,227,236,244,250,253,265,295,311,314,319],"nodes,":[38],"data":[39,97,114],"collection,":[40],"detecting":[41,300,328],"preventing":[48,302,330],"by":[54,79,88,165],"optimal":[55,154,160],"path":[56,155,162,186],"communication.":[57],"Initially,":[58],"set":[60],"nodes":[62,270],"is":[63,100,127,135,163,175,188,247,256,271,318],"assumed":[64],"carrying":[66],"out":[67,190],"communication":[69,187],"WSN.":[71,309,337],"Further,":[72],"detected":[78,87],"Bait":[81,104],"process,":[82],"round":[90],"trip":[91],"time":[92],"(RTT)":[93],"validation":[94,107],"process.":[95,140,157],"The":[96,112,261],"collection":[98],"procedure":[99],"done":[101],"with":[102,109,268,297,325],"RTT":[106],"process":[108],"attribute":[110],"information.":[111],"gathered":[113],"attributes":[115],"given":[117],"training":[120],"which":[122],"long":[123],"short-term":[124],"memory":[125],"(LSTM)":[126],"used":[128,136],"that":[129,174,249,322],"includes":[130],"attack":[132,138],"details.":[133],"Once":[141],"they":[142],"detected,":[144],"those":[145],"removed":[148],"from":[149,308,336],"using":[152,196],"selection":[156],"shortest":[161,185],"determined":[164],"improvement":[167],"whale":[170,180],"optimization":[171,181,238,283],"algorithm":[172,182,220],"(WOA)":[173],"called":[176],"fitness":[178],"rate-based":[179],"(FR-WOA).":[183],"carried":[189],"multi-objective":[194,240],"function":[195],"energy,":[197],"distance,":[198],"delay":[199],"packet":[201],"delivery":[202],"ratio":[203],"constraints.":[205],"Design/methodology/approach":[206],"paper":[208,232,293],"implements":[209],"model":[216],"FR-WOA":[219,267,296,324],"WSNs.":[228],"With":[229],"this,":[230],"this":[231,317],"accomplish":[235],"desired":[237],"functions.":[241],"Findings":[242],"From":[243],"analysis,":[245],"it":[246],"found":[248],"accuracy":[251],"optimized":[254,298,326],"LSTM":[255,299,327],"better":[257],"than":[258],"conventional":[259],"LSTM.":[260],"energy":[262],"consumption":[263],"proposed":[266],"35":[269],"7.14%":[272],"superior":[273,279,286],"WOA":[275],"FireFly,":[277],"5.7%":[278],"grey":[281],"wolf":[282],"10.3%":[285],"particle":[288],"swarm":[289],"optimization.":[290],"Originality/value":[291],"develops":[294],"To":[310],"best":[312],"authors\u2019":[315],"knowledge,":[316],"first":[320],"work":[321],"uses":[323]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3171358072","counts_by_year":[{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-01-03T09:15:35.969606","created_date":"2021-06-22"}