{"id":"https://openalex.org/W1486595245","doi":"https://doi.org/10.1002/sec.152","title":"DISA: Detection and isolation of sneaky attackers in locally monitored multi\u2010hop wireless networks","display_name":"DISA: Detection and isolation of sneaky attackers in locally monitored multi\u2010hop wireless networks","publication_year":2009,"publication_date":"2009-10-13","ids":{"openalex":"https://openalex.org/W1486595245","doi":"https://doi.org/10.1002/sec.152","mag":"1486595245"},"language":"en","primary_location":{"id":"doi:10.1002/sec.152","is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.152","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008374141","display_name":"Issa Khalil","orcid":"https://orcid.org/0000-0002-7660-9512"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Issa Khalil","raw_affiliation_strings":["College of Information Technology, United Arab Emirates University, UAE"],"affiliations":[{"raw_affiliation_string":"College of Information Technology, United Arab Emirates University, UAE","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047310442","display_name":"Saurabh Bagchi","orcid":"https://orcid.org/0000-0002-4239-5632"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Saurabh Bagchi","raw_affiliation_strings":["Dependable Computing System Lab (DCSL), School of Electrical & Computer Engineering, Purdue University, U.S.A"],"affiliations":[{"raw_affiliation_string":"Dependable Computing System Lab (DCSL), School of Electrical & Computer Engineering, Purdue University, U.S.A","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005868223","display_name":"Najah AbuAli","orcid":"https://orcid.org/0000-0002-9777-9609"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Najah AbuAli","raw_affiliation_strings":["College of Information Technology, United Arab Emirates University, UAE"],"affiliations":[{"raw_affiliation_string":"College of Information Technology, United Arab Emirates University, UAE","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008521587","display_name":"Mohammad Hayajneh","orcid":"https://orcid.org/0000-0002-6159-7512"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"M. Hayajneh","raw_affiliation_strings":["College of Information Technology, United Arab Emirates University, UAE"],"affiliations":[{"raw_affiliation_string":"College of Information Technology, United Arab Emirates University, UAE","institution_ids":["https://openalex.org/I201726411"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5008374141"],"corresponding_institution_ids":["https://openalex.org/I201726411"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":null,"fwci":0.3428,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.59532138,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"6","issue":"12","first_page":"1524","last_page":"1538"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8464157581329346},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8112869262695312},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7069551944732666},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5927596092224121},{"id":"https://openalex.org/keywords/packet-drop-attack","display_name":"Packet drop attack","score":0.5097593665122986},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.5016231536865234},{"id":"https://openalex.org/keywords/hop","display_name":"Hop (telecommunications)","score":0.4719604253768921},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4572443962097168},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4551721215248108},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.41720470786094666},{"id":"https://openalex.org/keywords/gossip","display_name":"Gossip","score":0.41038423776626587},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.14264076948165894},{"id":"https://openalex.org/keywords/link-state-routing-protocol","display_name":"Link-state routing protocol","score":0.11415678262710571},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.062304675579071045}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8464157581329346},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8112869262695312},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7069551944732666},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5927596092224121},{"id":"https://openalex.org/C35546906","wikidata":"https://www.wikidata.org/wiki/Q2900718","display_name":"Packet drop attack","level":5,"score":0.5097593665122986},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5016231536865234},{"id":"https://openalex.org/C25906391","wikidata":"https://www.wikidata.org/wiki/Q1432381","display_name":"Hop (telecommunications)","level":2,"score":0.4719604253768921},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4572443962097168},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4551721215248108},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.41720470786094666},{"id":"https://openalex.org/C62989814","wikidata":"https://www.wikidata.org/wiki/Q854648","display_name":"Gossip","level":2,"score":0.41038423776626587},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14264076948165894},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.11415678262710571},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.062304675579071045},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/sec.152","is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.152","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320332495","display_name":"U.S. Bureau of Land Management","ror":"https://ror.org/03v0pmy70"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1513792956","https://openalex.org/W1530392688","https://openalex.org/W1534062543","https://openalex.org/W1536334195","https://openalex.org/W1583345160","https://openalex.org/W2000548713","https://openalex.org/W2002054891","https://openalex.org/W2023272701","https://openalex.org/W2045779141","https://openalex.org/W2063627485","https://openalex.org/W2070301163","https://openalex.org/W2090636507","https://openalex.org/W2099574482","https://openalex.org/W2100433404","https://openalex.org/W2105543555","https://openalex.org/W2121468430","https://openalex.org/W2122053504","https://openalex.org/W2124651399","https://openalex.org/W2127699957","https://openalex.org/W2140471126","https://openalex.org/W2141180368","https://openalex.org/W2151993488","https://openalex.org/W2158421323","https://openalex.org/W2160203360","https://openalex.org/W2164947865","https://openalex.org/W2171340077"],"related_works":["https://openalex.org/W4386850441","https://openalex.org/W2479311294","https://openalex.org/W2094020986","https://openalex.org/W12419204","https://openalex.org/W2340554994","https://openalex.org/W2550378800","https://openalex.org/W2484127681","https://openalex.org/W4377097986","https://openalex.org/W133227787","https://openalex.org/W2947882039"],"abstract_inverted_index":{"Abstract":[0],"Local":[1],"monitoring":[2,38,160],"has":[3],"been":[4],"demonstrated":[5],"as":[6,31,39],"a":[7,47,95,118],"powerful":[8],"technique":[9],"for":[10],"mitigating":[11],"security":[12],"attacks":[13,50,170],"in":[14,41],"multi\u2010hop":[15],"ad":[16],"hoc":[17],"networks.":[18],"In":[19],"local":[20,37,124,159],"monitoring,":[21,125],"nodes":[22],"overhear":[23],"partial":[24],"neighborhood":[25],"communication":[26],"to":[27,46,84,126,148,163],"detect":[28],"misbehavior":[29],"such":[30],"packet":[32,57,61,65,108],"drop":[33],"or":[34],"delay.":[35],"However,":[36,77],"presented":[40,169],"the":[42,64,68,78,82,90,134,140,168],"literature":[43],"is":[44,113],"vulnerable":[45],"class":[48],"of":[49,105,111,167],"that":[51,87,157],"we":[52],"introduce":[53,102],"here":[54],"called":[55,120],"stealthy":[56,107],"dropping":[58,62],".":[59],"Stealthy":[60],"disrupts":[63],"from":[66],"reaching":[67],"destination":[69],"by":[70],"malicious":[71,79],"behavior":[72],"at":[73],"an":[74],"intermediate":[75],"node.":[76],"node":[80,97],"gives":[81],"impression":[83],"its":[85],"neighbors":[86,135],"it":[88],"performed":[89],"legitimate":[91,96],"forwarding":[92],"action.":[93],"Moreover,":[94],"comes":[98],"under":[99],"suspicion.":[100],"We":[101,116,151],"four":[103],"ways":[104],"achieving":[106],"dropping,":[109],"none":[110],"which":[112],"currently":[114],"detectable.":[115],"provide":[117],"protocol":[119],"DISA,":[121],"based":[122],"on":[123],"remedy":[127],"each":[128,149],"attack.":[129],"DISA":[130,172],"incorporates":[131],"two":[132],"techniques\u2014having":[133],"maintain":[136],"additional":[137],"information":[138],"about":[139],"routing":[141],"path,":[142],"and":[143,155],"adding":[144],"some":[145],"checking":[146],"responsibility":[147],"neighbor.":[150],"show":[152],"through":[153],"analysis":[154],"simulation":[156],"basic":[158],"(BLM)":[161],"fails":[162],"efficiently":[164],"mitigate":[165],"any":[166],"while":[171],"successfully":[173],"mitigates":[174],"them.":[175],"Copyright":[176],"\u00a9":[177],"2009":[178],"John":[179],"Wiley":[180],"&amp;":[181],"Sons,":[182],"Ltd.":[183]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
