{"id":"https://openalex.org/W1991027789","doi":"https://doi.org/10.1109/mobhoc.2006.278584","title":"PLUS: Parameterized and Localized trUst management Scheme for sensor networks security","display_name":"PLUS: Parameterized and Localized trUst management Scheme for sensor networks security","publication_year":2006,"publication_date":"2006-10-01","ids":{"openalex":"https://openalex.org/W1991027789","doi":"https://doi.org/10.1109/mobhoc.2006.278584","mag":"1991027789"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mobhoc.2006.278584","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067189569","display_name":"Zhiying Yao","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Zhiying Yao","raw_affiliation_strings":["Electronics Telecommunications, Research Institute, Korea. Email: yaozy@etri.re.kr"],"affiliations":[{"raw_affiliation_string":"Electronics Telecommunications, Research Institute, Korea. Email: yaozy@etri.re.kr","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100412744","display_name":"Daeyoung Kim","orcid":"https://orcid.org/0000-0003-4901-3075"},"institutions":[],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Daeyoung Kim","raw_affiliation_strings":["Information and Communication University, Korea. Email: kimd@icu.ac.kr"],"affiliations":[{"raw_affiliation_string":"Information and Communication University, Korea. Email: kimd@icu.ac.kr","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022036011","display_name":"Yoonmee Doh","orcid":"https://orcid.org/0009-0004-1679-0331"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Yoonmee Doh","raw_affiliation_strings":["Electronics Telecommunications, Research Institute, Korea. Email: ydoh@etri.ac.kr"],"affiliations":[{"raw_affiliation_string":"Electronics Telecommunications, Research Institute, Korea. Email: ydoh@etri.ac.kr","institution_ids":["https://openalex.org/I142401562"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.457,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":111,"citation_normalized_percentile":{"value":0.969553,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"437","last_page":"446"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9976,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.4552393}],"concepts":[{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.8110107},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.75465393},{"id":"https://openalex.org/C165464430","wikidata":"https://www.wikidata.org/wiki/Q1570441","display_name":"Parameterized complexity","level":2,"score":0.73428124},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.60953754},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.600494},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.5610398},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.5184788},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.51191914},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5011506},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.47106665},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.4552393},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4443392},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.4347172},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.42292935},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.4115434},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41132078},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2803275},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.2723372},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11027619},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.09787646},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07907596},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.06608975},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mobhoc.2006.278584","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.86,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":11,"referenced_works":["https://openalex.org/W1991018500","https://openalex.org/W2021198281","https://openalex.org/W2033751220","https://openalex.org/W2036358294","https://openalex.org/W2107905431","https://openalex.org/W2116726174","https://openalex.org/W2125173879","https://openalex.org/W2292252037","https://openalex.org/W2360158252","https://openalex.org/W2540179957","https://openalex.org/W39251602"],"related_works":["https://openalex.org/W4255576661","https://openalex.org/W2563912921","https://openalex.org/W2490706771","https://openalex.org/W2480116122","https://openalex.org/W2407611282","https://openalex.org/W2051058708","https://openalex.org/W1983207144","https://openalex.org/W154868527","https://openalex.org/W1516574938","https://openalex.org/W1494268238"],"abstract_inverted_index":{"The":[0],"wireless":[1],"and":[2,31,64,105],"resource-constraint":[3],"nature":[4],"of":[5,20,51,70,73],"a":[6,29,71],"sensor":[7,37,42,91],"network":[8],"makes":[9],"it":[10],"an":[11],"ideal":[12],"medium":[13],"for":[14,36,90],"attackers":[15],"to":[16,55],"do":[17],"any":[18],"kinds":[19],"vicious":[21],"things.":[22],"In":[23],"this":[24],"paper,":[25],"we":[26],"describe":[27],"PLUS,":[28],"parameterized":[30],"localized":[32],"trust":[33],"management":[34],"scheme":[35,80],"networks":[38],"security,":[39],"where":[40],"each":[41],"node":[43],"maintains":[44],"highly":[45],"abstracted":[46],"parameters,":[47],"rates":[48],"the":[49,61,66,78,95],"trustworthiness":[50],"its":[52,103],"interested":[53],"neighbors":[54],"adopt":[56],"appropriate":[57],"cryptographic":[58],"methods,":[59],"identify":[60],"malicious":[62],"nodes,":[63],"share":[65],"opinion":[67],"locally.":[68],"Results":[69],"serious":[72],"simulation":[74],"experiments":[75],"show":[76],"that":[77],"proposed":[79,98],"can":[81],"maximize":[82],"security":[83],"as":[84,86],"well":[85],"minimize":[87],"energy":[88],"consumption":[89],"networks.":[92],"And":[93],"also,":[94],"secure":[96],"routing":[97],"based":[99],"on":[100],"PLUS":[101],"shows":[102],"benefit":[104],"feasibility":[106]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1991027789","counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":11},{"year":2017,"cited_by_count":13},{"year":2016,"cited_by_count":10},{"year":2015,"cited_by_count":13},{"year":2014,"cited_by_count":7},{"year":2013,"cited_by_count":7},{"year":2012,"cited_by_count":9}],"updated_date":"2025-01-17T06:25:13.937729","created_date":"2016-06-24"}