{"id":"https://openalex.org/W2549208572","doi":"https://doi.org/10.1504/ijsnet.2016.10001275","title":"Detection of Clone Node Attack in Mobile Wireless Sensor Network with Optimized cost Function","display_name":"Detection of Clone Node Attack in Mobile Wireless Sensor Network with Optimized cost Function","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2549208572","doi":"https://doi.org/10.1504/ijsnet.2016.10001275","mag":"2549208572"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijsnet.2016.10001275","pdf_url":null,"source":{"id":"https://openalex.org/S31905469","display_name":"International Journal of Sensor Networks","issn_l":"1748-1279","issn":["1748-1279","1748-1287"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078967701","display_name":"Vahid Taba Taba Vakily","orcid":null},"institutions":[{"id":"https://openalex.org/I67009956","display_name":"Iran University of Science and Technology","ror":"https://ror.org/01jw2p796","country_code":"IR","type":"funder","lineage":["https://openalex.org/I67009956"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Vahid Taba Taba Vakily","raw_affiliation_strings":["School of Electrical Engineering, Iran University of Science and Technology (IUST), Narmak, Tehran 16844, Iran"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering, Iran University of Science and Technology (IUST), Narmak, Tehran 16844, Iran","institution_ids":["https://openalex.org/I67009956"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101554875","display_name":"Mohammad Hasan Ansari","orcid":null},"institutions":[{"id":"https://openalex.org/I67009956","display_name":"Iran University of Science and Technology","ror":"https://ror.org/01jw2p796","country_code":"IR","type":"funder","lineage":["https://openalex.org/I67009956"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mohammad Hasan Ansari","raw_affiliation_strings":["School of Electrical Engineering, Iran University of Science and Technology (IUST), Narmak, Tehran 16844, Iran"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering, Iran University of Science and Technology (IUST), Narmak, Tehran 16844, Iran","institution_ids":["https://openalex.org/I67009956"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.481,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.70765,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":77,"max":79},"biblio":{"volume":"1","issue":"1","first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9954,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9844,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.527399}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8724858},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6540424},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.60446274},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.56032056},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5304018},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.527399},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4821867},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4587716},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35165954},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.103952736},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0875662},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijsnet.2016.10001275","pdf_url":null,"source":{"id":"https://openalex.org/S31905469","display_name":"International Journal of Sensor Networks","issn_l":"1748-1279","issn":["1748-1279","1748-1287"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3148968234","https://openalex.org/W2989915292","https://openalex.org/W2890570089","https://openalex.org/W2141581111","https://openalex.org/W2129477171","https://openalex.org/W2073793005","https://openalex.org/W2032479448","https://openalex.org/W2028086369","https://openalex.org/W1975451135","https://openalex.org/W145760256"],"abstract_inverted_index":{"Clone":[0],"attack":[1,27],"is":[2,28,31,96],"considered":[3],"as":[4,47,116],"the":[5,22,61,70,93,128],"most":[6],"important":[7],"security":[8,101],"challenge":[9],"of":[10,24,53,68,83,92,100],"wireless":[11,38],"sensor":[12,39],"networks.":[13,40],"In":[14],"this":[15],"paper,":[16],"an":[17],"innovative":[18],"distributed":[19],"approach":[20,63,95,134],"for":[21],"detection":[23,58,62,79,112],"clone":[25,77],"node":[26,78],"proposed,":[29],"that":[30,132],"robust":[32],"against":[33],"smart":[34],"attacker":[35],"in":[36,80,98],"mobile":[37],"Previously":[41],"proposed":[42,64,94,133,149],"approaches":[43],"suffer":[44],"disadvantages":[45],"such":[46],"memory":[48],"and":[49,56,74,102,111,121,139,143],"communication":[50,89,137],"overheads,":[51],"probability":[52,142],"false":[54,140],"alarm":[55,141],"high":[57],"time,":[59],"however,":[60],"here":[65],"takes":[66],"advantage":[67],"introducing":[69],"observer":[71],"position":[72],"concept":[73],"hence":[75],"achieves":[76],"one":[81],"cycle":[82],"protocol":[84],"execution":[85],"leading":[86],"to":[87,147],"less":[88,136],"overheads.":[90],"Performance":[91],"analysed":[97],"terms":[99],"cost.":[103],"To":[104],"improve":[105],"performance,":[106],"using":[107],"a":[108,117],"discrete":[109],"model":[110],"cost":[113],"function":[114],"stated":[115],"convex":[118],"optimisation":[119],"problem":[120],"parameters":[122],"optimised":[123],"values":[124],"are":[125],"calculated.":[126],"Finally,":[127],"simulation":[129],"results":[130],"show":[131],"has":[135],"overhead":[138],"better":[144],"performance":[145],"compared":[146],"previously":[148],"approaches.":[150]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2549208572","counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-04-23T07:36:09.883220","created_date":"2016-11-30"}