{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:38:34Z","timestamp":1778603914880,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T00:00:00Z","timestamp":1628467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,9]]},"DOI":"10.1145\/3484824.3484915","type":"proceedings-article","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T23:09:15Z","timestamp":1642115355000},"page":"57-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["An Intrusion Prevention System embedded AODV to protect Mobile Adhoc Network against Sybil Attack"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Tesfay","sequence":"first","affiliation":[{"name":"Department of Computer Science, Hawassa university, Ethiopia"}]},{"given":"Basant","family":"Tiwari","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Hawassa university, Ethiopia"}]},{"given":"Ma'ereg Jemberu","family":"Teka","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Hawassa university, Ethiopia"}]},{"given":"Vivek","family":"Tiwari","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engg. IIIT, Naya Raipur, India"}]}],"member":"320","published-online":{"date-parts":[[2022,1,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the ACM Symposium on Women in Research 2016 (pp. 26--31","author":"Nema A.","unstructured":"Nema , A. , Tiwari , B. and Tiwari , V ., 2016, March. Improving accuracy for intrusion detection through layered approach using support vector machine with feature reduction . In Proceedings of the ACM Symposium on Women in Research 2016 (pp. 26--31 . Nema, A., Tiwari, B. and Tiwari, V., 2016, March. Improving accuracy for intrusion detection through layered approach using support vector machine with feature reduction. In Proceedings of the ACM Symposium on Women in Research 2016 (pp. 26--31."},{"key":"e_1_3_2_1_2_1","first-page":"2454","volume-title":"ISSN","author":"Saha P.","unstructured":"Saha , P. and Nath , A ., 2016. An Overview on Mobile Ad-Hoc Networks. International Journal of Multidisciplinary Research and Modern Education (IJMRME) , ISSN , pp. 2454 -- 6119 . Saha, P. and Nath, A., 2016. An Overview on Mobile Ad-Hoc Networks. International Journal of Multidisciplinary Research and Modern Education (IJMRME), ISSN, pp.2454--6119."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"e_1_3_2_1_4_1","volume-title":"Workshop on hot topics in networks (HotNets-IV) (pp. 1--6.","author":"Parno B.","unstructured":"Parno , B. and Perrig , A ., 2005, November. Challenges in securing vehicular networks . In Workshop on hot topics in networks (HotNets-IV) (pp. 1--6. Parno, B. and Perrig, A., 2005, November. Challenges in securing vehicular networks. In Workshop on hot topics in networks (HotNets-IV) (pp. 1--6."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Hoeper K. and Gong G. 2007. Bootstrapping security in mobile ad hoc networks using identity-based schemes. In Security in Distributed and Networking Systems (pp. 313--337.  Hoeper K. and Gong G. 2007. Bootstrapping security in mobile ad hoc networks using identity-based schemes. In Security in Distributed and Networking Systems (pp. 313--337.","DOI":"10.1142\/9789812770103_0013"},{"key":"e_1_3_2_1_6_1","volume-title":"2010 Fourth international conference on emerging security information, systems and technologies (pp. 17--24","author":"Hashmi S.","unstructured":"Hashmi , S. and Brooke , J ., 2010, July. Towards sybil resistant authentication in mobile ad hoc networks . In 2010 Fourth international conference on emerging security information, systems and technologies (pp. 17--24 . IEEE. Hashmi, S. and Brooke, J., 2010, July. Towards sybil resistant authentication in mobile ad hoc networks. In 2010 Fourth international conference on emerging security information, systems and technologies (pp. 17--24. IEEE."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2044904"},{"issue":"1","key":"e_1_3_2_1_8_1","first-page":"22","article-title":". Sybil Nodes Detection Based on Received Signal Strength Variations within VANET","volume":"9","author":"Bouassida M.S.","year":"2009","unstructured":"Bouassida , M.S. , Guette , G. , Shawky , M. and Ducourthial , B. , 2009 . Sybil Nodes Detection Based on Received Signal Strength Variations within VANET . Int. J. Netw. Secur. , 9 ( 1 ), pp. 22 -- 33 . Bouassida, M.S., Guette, G., Shawky, M. and Ducourthial, B., 2009. Sybil Nodes Detection Based on Received Signal Strength Variations within VANET. Int. J. Netw. Secur., 9(1), pp.22--33.","journal-title":"Int. J. Netw. Secur."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2971463"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06836-7"},{"key":"e_1_3_2_1_11_1","volume-title":"International journal of scientific & technology research","author":"Akasapu A. K.","year":"2020","unstructured":"Akasapu , A. K. , Thangavel , G. , & Pulugurtha , K. S. R. , 2020. An Approach to Identify the Sybil Attacks in Vehicular Ad-Hoc Networks Using Path Signature . International journal of scientific & technology research , volume 9 , issue 03, march 2020 Akasapu, A. K., Thangavel, G., &Pulugurtha, K. S. R., 2020. An Approach to Identify the Sybil Attacks in Vehicular Ad-Hoc Networks Using Path Signature. International journal of scientific & technology research, volume 9, issue 03, march 2020"},{"key":"e_1_3_2_1_12_1","volume-title":"International Conference on Remote Engineering and Virtual Instrumentation (pp. 429--441","author":"Sastry A.S.","unstructured":"Sastry , A.S. , Chitlapalli , S.S. and Akhila , S ., 2019, February. Work-in-Progress: A Novel Approach to Detection and Avoid Sybil Attack in MANET . In International Conference on Remote Engineering and Virtual Instrumentation (pp. 429--441 . Springer, Cham. Sastry, A.S., Chitlapalli, S.S. and Akhila, S., 2019, February. Work-in-Progress: A Novel Approach to Detection and Avoid Sybil Attack in MANET. In International Conference on Remote Engineering and Virtual Instrumentation (pp. 429--441. Springer, Cham."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836898"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2843769"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Dejene D. Tiwari B. and Tiwari V. 2020. TD2SecIoT: Temporal Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT. International Journal of Interactive Multimedia & Artificial Intelligence 6(4).  Dejene D. Tiwari B. and Tiwari V. 2020. TD2SecIoT: Temporal Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT. International Journal of Interactive Multimedia & Artificial Intelligence 6(4).","DOI":"10.9781\/ijimai.2020.10.002"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Khalil M. and Azer M.A. 2018 April. Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks. In 2018 Wireless Days (WD) (pp. 184--186. IEEE.  Khalil M. and Azer M.A. 2018 April. Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks. In 2018 Wireless Days (WD) (pp. 184--186. IEEE.","DOI":"10.1109\/WD.2018.8361717"},{"key":"e_1_3_2_1_17_1","volume-title":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC) (pp. 557--562","author":"Kumari R.","unstructured":"Kumari , R. and Dutta , M ., 2018, December. Efficient Approaches to Mitigate the Effect of Sybil Attack in MANET for High Network Lifetime: A review . In 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC) (pp. 557--562 . IEEE. Kumari, R. and Dutta, M., 2018, December. Efficient Approaches to Mitigate the Effect of Sybil Attack in MANET for High Network Lifetime: A review. In 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC) (pp. 557--562. IEEE."},{"issue":"4","key":"e_1_3_2_1_18_1","first-page":"12","article-title":"Mitigation of Sybil attack in MANET using GA with Fuzzy Logic","volume":"3","author":"Chauhan D.S.","year":"2018","unstructured":"Chauhan , D.S. and Bakshi , S. , 2018 . Mitigation of Sybil attack in MANET using GA with Fuzzy Logic . Management , 3 ( 4 )., pp. 12 -- 19 . 2018. Chauhan, D.S. and Bakshi, S., 2018. Mitigation of Sybil attack in MANET using GA with Fuzzy Logic. Management, 3(4)., pp. 12--19. 2018.","journal-title":"Management"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the ACM Symposium on Women in Research 2016 (pp. 158--164","author":"Yadav S.","unstructured":"Yadav , S. , Tiwari , V. and Tiwari , B ., 2016, March. Privacy preserving data mining with abridge time using vertical partition decision tree . In Proceedings of the ACM Symposium on Women in Research 2016 (pp. 158--164 . Yadav, S., Tiwari, V. and Tiwari, B., 2016, March. Privacy preserving data mining with abridge time using vertical partition decision tree. In Proceedings of the ACM Symposium on Women in Research 2016 (pp. 158--164."}],"event":{"name":"DSMLAI '21': International Conference on Data Science, Machine Learning and Artificial Intelligence","location":"Windhoek Namibia","acronym":"DSMLAI '21'"},"container-title":["Proceedings of the International Conference on Data Science, Machine Learning and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3484824.3484915","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3484824.3484915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:15Z","timestamp":1750191435000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3484824.3484915"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,9]]},"references-count":19,"alternative-id":["10.1145\/3484824.3484915","10.1145\/3484824"],"URL":"https:\/\/doi.org\/10.1145\/3484824.3484915","relation":{},"subject":[],"published":{"date-parts":[[2021,8,9]]},"assertion":[{"value":"2022-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}