{"id":"https://openalex.org/W2591628557","doi":"https://doi.org/10.1504/ijics.2017.10003609","title":"Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way","display_name":"Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2591628557","doi":"https://doi.org/10.1504/ijics.2017.10003609","mag":"2591628557"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijics.2017.10003609","pdf_url":null,"source":{"id":"https://openalex.org/S85012289","display_name":"International Journal of Information and Computer Security","issn_l":"1744-1765","issn":["1744-1765","1744-1773"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058405202","display_name":"Amit Gupta","orcid":"https://orcid.org/0000-0002-3109-4949"},"institutions":[{"id":"https://openalex.org/I77501641","display_name":"University of Kalyani","ror":"https://ror.org/03v783k16","country_code":"IN","type":"funder","lineage":["https://openalex.org/I77501641"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Amit Kr. Gupta","raw_affiliation_strings":["Kalyani Government Engineering College, Kalyani, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Kalyani Government Engineering College, Kalyani, West Bengal, India","institution_ids":["https://openalex.org/I77501641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070896564","display_name":"Jyotsna Kumar Mandal","orcid":"https://orcid.org/0000-0001-9447-647X"},"institutions":[{"id":"https://openalex.org/I77501641","display_name":"University of Kalyani","ror":"https://ror.org/03v783k16","country_code":"IN","type":"funder","lineage":["https://openalex.org/I77501641"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Jyotsna Kr. Mandal","raw_affiliation_strings":["University of Kalyani, Kalyani, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"University of Kalyani, Kalyani, West Bengal, India","institution_ids":["https://openalex.org/I77501641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048171104","display_name":"Indrajit Bhattacharya","orcid":"https://orcid.org/0000-0002-3881-2755"},"institutions":[{"id":"https://openalex.org/I77501641","display_name":"University of Kalyani","ror":"https://ror.org/03v783k16","country_code":"IN","type":"funder","lineage":["https://openalex.org/I77501641"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Indrajit Bhattacharya","raw_affiliation_strings":["Kalyani Government Engineering College, Kalyani, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Kalyani Government Engineering College, Kalyani, West Bengal, India","institution_ids":["https://openalex.org/I77501641"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.563,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.746027,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":77,"max":79},"biblio":{"volume":"9","issue":"1/2","first_page":"130","last_page":"130"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9916,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9898,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wormhole","display_name":"Wormhole","score":0.53139293},{"id":"https://openalex.org/keywords/delay-tolerant-networking","display_name":"Delay-tolerant networking","score":0.47655255},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.46047702},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure Communication","score":0.4171305}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7980849},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6941251},{"id":"https://openalex.org/C2780224610","wikidata":"https://www.wikidata.org/wiki/Q1530061","display_name":"Credibility","level":2,"score":0.6625662},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.65832675},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6582521},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6195214},{"id":"https://openalex.org/C29013271","wikidata":"https://www.wikidata.org/wiki/Q7544","display_name":"Wormhole","level":2,"score":0.53139293},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.48194456},{"id":"https://openalex.org/C53264328","wikidata":"https://www.wikidata.org/wiki/Q55320","display_name":"Delay-tolerant networking","level":5,"score":0.47655255},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.46619242},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.46047702},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44268167},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.4339339},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.42089015},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.4171305},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.23214233},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.10046846},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.07302567},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.06574762},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijics.2017.10003609","pdf_url":null,"source":{"id":"https://openalex.org/S85012289","display_name":"International Journal of Information and Computer Security","issn_l":"1744-1765","issn":["1744-1765","1744-1773"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.66,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":27,"referenced_works":["https://openalex.org/W1507441866","https://openalex.org/W1572481965","https://openalex.org/W1831773712","https://openalex.org/W1964689059","https://openalex.org/W1981446084","https://openalex.org/W1998747964","https://openalex.org/W2010634640","https://openalex.org/W2021497904","https://openalex.org/W2035186480","https://openalex.org/W2069929443","https://openalex.org/W2079274032","https://openalex.org/W2081411782","https://openalex.org/W2090636507","https://openalex.org/W2109382821","https://openalex.org/W2109505558","https://openalex.org/W2110623369","https://openalex.org/W2112316694","https://openalex.org/W2113667915","https://openalex.org/W2125957038","https://openalex.org/W2142522527","https://openalex.org/W2145255308","https://openalex.org/W2151993488","https://openalex.org/W2152924492","https://openalex.org/W2159776016","https://openalex.org/W2589327169","https://openalex.org/W3154896280","https://openalex.org/W768287162"],"related_works":["https://openalex.org/W4316829536","https://openalex.org/W4300704821","https://openalex.org/W4298717831","https://openalex.org/W4248001395","https://openalex.org/W2126067753","https://openalex.org/W210968471","https://openalex.org/W2012689257","https://openalex.org/W1976900091","https://openalex.org/W1645600878","https://openalex.org/W1559812758"],"abstract_inverted_index":{"In":[0,78],"this":[1],"work,":[2],"security":[3],"threats":[4],"posed":[5],"by":[6,96,112],"selfish,":[7],"blackhole":[8],"and":[9,51,100,118,140],"wormhole":[10],"attacks":[11],"in":[12,122],"a":[13,27,33,43,80],"delay":[14],"tolerant":[15],"network":[16],"(DTN)":[17],"are":[18],"addressed.":[19],"A":[20],"cooperative":[21],"approach":[22],"has":[23,109],"been":[24,58,110],"proposed":[25,127],"as":[26],"solution":[28],"where":[29],"malicious":[30,137],"behaviour":[31],"of":[32,103,136,144],"node":[34,39],"is":[35,72,88,129],"tested":[36],"whenever":[37],"another":[38],"tries":[40],"to":[41,45,54,66,90,131],"send":[42],"message":[44,92],"it.":[46],"Performance":[47],"parameters,":[48],"like":[49],"received":[50],"sent":[52],"messages":[53],"neighbouring":[55],"nodes":[56,138],"have":[57],"used":[59],"along":[60],"with":[61],"calculated":[62],"faith":[63],"values":[64,102],"(CFV)":[65],"derive":[67],"latest":[68],"CFVs.":[69],"The":[70,107,126],"process":[71,146],"repeated":[73],"for":[74],"each":[75,104],"communication":[76,145],"instance.":[77],"addition,":[79],"simple":[81],"yet":[82],"efficient":[83],"credibility-based":[84],"cryptographic":[85],"encryption":[86],"technique":[87],"applied":[89],"encrypt":[91],"contents":[93],"that":[94],"works":[95],"appending":[97],"the":[98,116,123,133,142],"signatures":[99],"CFV":[101],"encountered":[105],"nodes.":[106],"method":[108],"tested,":[111],"implementing":[113],"it":[114],"over":[115],"spray":[117],"wait":[119],"DTN":[120],"protocol,":[121],"ONE":[124],"simulator.":[125],"strategy":[128],"able":[130],"avoid":[132],"three":[134],"types":[135],"effectively":[139],"increases":[141],"trustworthiness":[143],"greatly.":[147]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2591628557","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-04-16T13:18:22.037801","created_date":"2017-03-16"}