{"id":"https://openalex.org/W3210140007","doi":"https://doi.org/10.1109/icccnt51525.2021.9580125","title":"Demonstration of Selective Forwarding Attack and Detection Mechanism in UnetStack3","display_name":"Demonstration of Selective Forwarding Attack and Detection Mechanism in UnetStack3","publication_year":2021,"publication_date":"2021-07-06","ids":{"openalex":"https://openalex.org/W3210140007","doi":"https://doi.org/10.1109/icccnt51525.2021.9580125","mag":"3210140007"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9580125","pdf_url":null,"source":{"id":"https://openalex.org/S4363607876","display_name":"2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009427723","display_name":"B. R. Chandavarkar","orcid":"https://orcid.org/0000-0001-6944-875X"},"institutions":[{"id":"https://openalex.org/I11880225","display_name":"National Institute of Technology Karnataka","ror":"https://ror.org/01hz4v948","country_code":"IN","type":"funder","lineage":["https://openalex.org/I11880225"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"B. R. Chandavarkar","raw_affiliation_strings":["Wireless Information Networking Group (WiNG), National Institute of Technology Karnataka, Surathkal, Mangalore, India"],"affiliations":[{"raw_affiliation_string":"Wireless Information Networking Group (WiNG), National Institute of Technology Karnataka, Surathkal, Mangalore, India","institution_ids":["https://openalex.org/I11880225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034480566","display_name":"Nakul Suresh","orcid":null},"institutions":[{"id":"https://openalex.org/I11880225","display_name":"National Institute of Technology Karnataka","ror":"https://ror.org/01hz4v948","country_code":"IN","type":"funder","lineage":["https://openalex.org/I11880225"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nakul Suresh","raw_affiliation_strings":["National Institute of Technology Karnataka, Surathkal, Mangalore, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Karnataka, Surathkal, Mangalore, India","institution_ids":["https://openalex.org/I11880225"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":56},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11192","display_name":"Underwater Vehicles and Communication Systems","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11192","display_name":"Underwater Vehicles and Communication Systems","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9886,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9882,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7831432},{"id":"https://openalex.org/keywords/acknowledgement","display_name":"Acknowledgement","score":0.6997005},{"id":"https://openalex.org/keywords/sinkhole","display_name":"Sinkhole","score":0.5275131},{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.4289586}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7831432},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7125544},{"id":"https://openalex.org/C2777880217","wikidata":"https://www.wikidata.org/wiki/Q4674282","display_name":"Acknowledgement","level":2,"score":0.6997005},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6911839},{"id":"https://openalex.org/C49223487","wikidata":"https://www.wikidata.org/wiki/Q188734","display_name":"Sinkhole","level":3,"score":0.5275131},{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.4289586},{"id":"https://openalex.org/C98083399","wikidata":"https://www.wikidata.org/wiki/Q3246517","display_name":"Underwater","level":2,"score":0.41157526},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37933123},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.27690265},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C182348080","wikidata":"https://www.wikidata.org/wiki/Q16817","display_name":"Karst","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111368507","wikidata":"https://www.wikidata.org/wiki/Q43518","display_name":"Oceanography","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9580125","pdf_url":null,"source":{"id":"https://openalex.org/S4363607876","display_name":"2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Life below water","score":0.82,"id":"https://metadata.un.org/sdg/14"}],"grants":[{"funder":"https://openalex.org/F4320334771","funder_display_name":"Science and Engineering Research Board","award_id":"EEQ/2018/001036"}],"datasets":[],"versions":[],"referenced_works_count":10,"referenced_works":["https://openalex.org/W1501167349","https://openalex.org/W1982909553","https://openalex.org/W2014715688","https://openalex.org/W2048733507","https://openalex.org/W2137167524","https://openalex.org/W2145916893","https://openalex.org/W2161236823","https://openalex.org/W2308002575","https://openalex.org/W3093590942","https://openalex.org/W3111753122"],"related_works":["https://openalex.org/W4229766761","https://openalex.org/W3022213123","https://openalex.org/W2908627775","https://openalex.org/W2552485568","https://openalex.org/W2464972666","https://openalex.org/W2043656548","https://openalex.org/W2034363770","https://openalex.org/W2002122708","https://openalex.org/W1548328161","https://openalex.org/W125799629"],"abstract_inverted_index":{"Underwater":[0,17],"networks":[1,20],"provide":[2],"new":[3],"possibilities":[4],"that":[5],"can":[6,86],"greatly":[7],"improve":[8],"our":[9],"ability":[10],"to":[11,33,49,64,94],"observe":[12],"and":[13,27,59,106,130],"predict":[14],"the":[15,88,139],"ocean.":[16],"acoustic":[18],"sensor":[19],"(UASNs)":[21],"are":[22],"frequently":[23],"used":[24],"in":[25,126,153],"uncharted":[26],"unexplored":[28],"waters,":[29],"making":[30,91],"them":[31],"vulnerable":[32,93],"various":[34],"security":[35,113,120],"threats.":[36],"Applications":[37],"based":[38],"on":[39,77],"UASNs":[40,92],"such":[41,96,115],"as":[42,97,146,148],"coastal":[43],"defense,":[44],"pollution":[45],"monitoring,":[46],"assisted":[47],"navigation":[48],"name":[50],"a":[51,74,136,144,149],"few,":[52],"require":[53],"secure":[54],"communication.":[55],"Various":[56],"communication":[57],"protocols":[58,71],"algorithms":[60],"have":[61],"been":[62],"developed":[63],"enable":[65],"collaborative":[66],"monitoring":[67],"tasks.":[68],"However,":[69],"These":[70],"often":[72],"place":[73],"low":[75],"priority":[76],"security.":[78],"Impersonating":[79],"nodes":[80],"or":[81],"illegally":[82],"manipulating":[83],"routing":[84],"information":[85],"affect":[87],"entire":[89],"network,":[90],"attacks":[95],"selective":[98,140],"forwarding,":[99],"sinkhole":[100],"attack,":[101,103,142],"Sybil":[102],"acknowledgement":[104],"spoofing":[105],"HELLO":[107],"flood":[108],"attack.":[109],"The":[110],"lack":[111],"of":[112],"against":[114],"threats":[116],"is":[117,121],"startling,":[118],"since":[119],"indeed":[122],"an":[123],"important":[124],"requirement":[125],"many":[127],"emerging":[128],"civilian":[129],"military":[131],"applications.":[132],"This":[133],"paper":[134],"takes":[135],"look":[137],"at":[138],"forwarding":[141],"examines":[143],"model":[145],"well":[147],"detection":[150],"mechanism":[151],"created":[152],"UnetStack3.":[154]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3210140007","counts_by_year":[],"updated_date":"2025-04-03T03:37:02.967878","created_date":"2021-11-08"}