{"id":"https://openalex.org/W2129896783","doi":"https://doi.org/10.1109/securware.2008.68","title":"Authentication Mechanisms for Mobile Ad-Hoc Networks and Resistance to Sybil Attack","display_name":"Authentication Mechanisms for Mobile Ad-Hoc Networks and Resistance to Sybil Attack","publication_year":2008,"publication_date":"2008-08-01","ids":{"openalex":"https://openalex.org/W2129896783","doi":"https://doi.org/10.1109/securware.2008.68","mag":"2129896783"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/securware.2008.68","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108601299","display_name":"Sarosh Hashmi","orcid":null},"institutions":[{"id":"https://openalex.org/I28407311","display_name":"University of Manchester","ror":"https://ror.org/027m9bs27","country_code":"GB","type":"education","lineage":["https://openalex.org/I28407311"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sarosh Hashmi","raw_affiliation_strings":["School of Computer Science, University of Manchester, Manchester,"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Manchester, Manchester,","institution_ids":["https://openalex.org/I28407311"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103564624","display_name":"John Brooke","orcid":null},"institutions":[{"id":"https://openalex.org/I28407311","display_name":"University of Manchester","ror":"https://ror.org/027m9bs27","country_code":"GB","type":"education","lineage":["https://openalex.org/I28407311"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"John Brooke","raw_affiliation_strings":["School of Computer Science, University of Manchester, Manchester,"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Manchester, Manchester,","institution_ids":["https://openalex.org/I28407311"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.083,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":30,"citation_normalized_percentile":{"value":0.80926,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":92},"biblio":{"volume":null,"issue":null,"first_page":"120","last_page":"126"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.77422464}],"concepts":[{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.7851855},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.77570236},{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.77422464},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6744229},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.67386436},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.63436127},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.59151566},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5538993},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.49330297},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.4534689},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.4384527},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.34936473},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.3260522},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.13610166},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09523749},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.08624181},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07386339},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/securware.2008.68","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.63}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":17,"referenced_works":["https://openalex.org/W148092637","https://openalex.org/W1487008537","https://openalex.org/W1501707359","https://openalex.org/W1520914943","https://openalex.org/W1971041109","https://openalex.org/W2095693520","https://openalex.org/W2117496982","https://openalex.org/W2132130537","https://openalex.org/W2133988373","https://openalex.org/W2136374597","https://openalex.org/W2137650316","https://openalex.org/W2151528634","https://openalex.org/W2153305401","https://openalex.org/W2158923961","https://openalex.org/W2159160864","https://openalex.org/W2161496718","https://openalex.org/W2170262057"],"related_works":["https://openalex.org/W4380886145","https://openalex.org/W4318822872","https://openalex.org/W4313315774","https://openalex.org/W3046260513","https://openalex.org/W3035283282","https://openalex.org/W2768875466","https://openalex.org/W2573790339","https://openalex.org/W2062688728","https://openalex.org/W2034329307","https://openalex.org/W2027636740"],"abstract_inverted_index":{"In":[0],"Sybil":[1,78],"attack,":[2,79],"an":[3],"attacker":[4],"acquires":[5],"multiple":[6],"identities":[7],"and":[8,43,52,87],"uses":[9],"them":[10],"simultaneously":[11],"or":[12],"one":[13,15],"by":[14,84,109],"to":[16,29,64,92,106],"attack":[17],"various":[18],"operation":[19],"of":[20,32,55,60,68,89,95,113],"the":[21,30,66,77,80,110],"network.":[22],"Such":[23],"attacks":[24],"pose":[25],"a":[26],"serious":[27],"threat":[28],"security":[31],"self-organized":[33],"networks":[34,38],"like":[35],"mobile":[36],"ad-hoc":[37],"(MANETs)":[39],"that":[40,104],"require":[41],"unique":[42],"unchangeable":[44],"identity":[45],"per":[46],"node":[47],"for":[48,72,116],"detecting":[49],"routing":[50],"misbehavior":[51],"reliable":[53],"computation":[54],"node's":[56],"reputation.":[57],"The":[58],"purpose":[59],"this":[61],"paper":[62],"is":[63],"analyze":[65],"effectiveness":[67],"current":[69],"authentication":[70,114],"mechanism":[71],"MANETs":[73],"in":[74],"coping":[75],"with":[76],"infrastructure":[81],"requirement":[82],"posed":[83],"these":[85,90],"mechanisms":[86,91,115],"applicability":[88],"different":[93],"kinds":[94],"ad":[96],"hoc":[97],"networks.":[98],"We":[99],"identify":[100],"open":[101],"research":[102],"issues":[103],"need":[105],"be":[107],"addressed":[108],"next":[111],"generation":[112],"MANETs.":[117]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2129896783","counts_by_year":[{"year":2018,"cited_by_count":3},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":3}],"updated_date":"2024-12-11T09:32:36.595667","created_date":"2016-06-24"}