{"id":"https://openalex.org/W2514743770","doi":"https://doi.org/10.1109/tmc.2016.2604820","title":"Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks","display_name":"Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks","publication_year":2016,"publication_date":"2016-08-31","ids":{"openalex":"https://openalex.org/W2514743770","doi":"https://doi.org/10.1109/tmc.2016.2604820","mag":"2514743770"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/tmc.2016.2604820","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"acceptedVersion","is_accepted":true,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.1109/tmc.2016.2604820","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100394917","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Chen","raw_affiliation_strings":["State Key Laboratory of Software Engineering, Computer School, Wuhan University, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Engineering, Computer School, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004999865","display_name":"Kun He","orcid":"https://orcid.org/0000-0003-3472-419X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun He","raw_affiliation_strings":["State Key Laboratory of Software Engineering, Computer School, Wuhan University, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Engineering, Computer School, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020164684","display_name":"Quan Yuan","orcid":"https://orcid.org/0000-0002-2552-333X"},"institutions":[{"id":"https://openalex.org/I114580094","display_name":"The University of Texas of the Permian Basin","ror":"https://ror.org/051smbs96","country_code":"US","type":"education","lineage":["https://openalex.org/I114580094"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Quan Yuan","raw_affiliation_strings":["Department of Math and Computer Science, University of Texas-Permian Basin, Odessa, TX"],"affiliations":[{"raw_affiliation_string":"Department of Math and Computer Science, University of Texas-Permian Basin, Odessa, TX","institution_ids":["https://openalex.org/I114580094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026230689","display_name":"Guoliang Xue","orcid":"https://orcid.org/0000-0002-5833-8894"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guoliang Xue","raw_affiliation_strings":["School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, AZ"],"affiliations":[{"raw_affiliation_string":"School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, AZ","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100529319","display_name":"Ruiying Du","orcid":"https://orcid.org/0000-0002-3634-3385"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiying Du","raw_affiliation_strings":["State Key Laboratory of Software Engineering, Computer School, Wuhan University, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Engineering, Computer School, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008086623","display_name":"Lina Wang","orcid":"https://orcid.org/0000-0003-4919-0645"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lina Wang","raw_affiliation_strings":["State Key Laboratory of Software Engineering, Computer School, Wuhan University, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Engineering, Computer School, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":6.735,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":49,"citation_normalized_percentile":{"value":0.999967,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"16","issue":"6","first_page":"1530","last_page":"1543"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identification","display_name":"Identification","score":0.6407498},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.41188365}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9008821},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6407498},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.5362529},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.52316624},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.51908207},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5049258},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4615251},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.42144603},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.41188365},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3723142},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22134069},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08184725},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.077236325},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/tmc.2016.2604820","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"acceptedVersion","is_accepted":true,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/tmc.2016.2604820","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"acceptedVersion","is_accepted":true,"is_published":false},"sustainable_development_goals":[{"score":0.44,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[{"funder":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation","award_id":"1457262"},{"funder":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation","award_id":"1421685"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61272451"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U1536204"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61572380"},{"funder":"https://openalex.org/F4320321408","funder_display_name":"Ministry of Education","award_id":null},{"funder":"https://openalex.org/F4320327563","funder_display_name":"Major State Basic Research Development Program of China","award_id":"2014CB340600"}],"datasets":[],"versions":[],"referenced_works_count":29,"referenced_works":["https://openalex.org/W1519972057","https://openalex.org/W1531977883","https://openalex.org/W1569543440","https://openalex.org/W174193449","https://openalex.org/W1965058431","https://openalex.org/W1974839821","https://openalex.org/W2008866261","https://openalex.org/W2016358833","https://openalex.org/W2019360894","https://openalex.org/W2022645011","https://openalex.org/W2053225008","https://openalex.org/W2058242263","https://openalex.org/W2076327726","https://openalex.org/W2089474635","https://openalex.org/W2098147685","https://openalex.org/W2128628587","https://openalex.org/W2137771025","https://openalex.org/W2147950455","https://openalex.org/W2148489537","https://openalex.org/W2153886246","https://openalex.org/W2225196063","https://openalex.org/W2242266730","https://openalex.org/W2343041492","https://openalex.org/W2378756712","https://openalex.org/W2430183720","https://openalex.org/W2469579026","https://openalex.org/W2487238101","https://openalex.org/W26498519","https://openalex.org/W2914841653"],"related_works":["https://openalex.org/W3030774134","https://openalex.org/W2390942931","https://openalex.org/W2168674042","https://openalex.org/W2149234266","https://openalex.org/W2125461068","https://openalex.org/W2104499293","https://openalex.org/W2033963098","https://openalex.org/W1981680180","https://openalex.org/W1932157736","https://openalex.org/W1671124163"],"abstract_inverted_index":{"Secure":[0],"access":[1],"is":[2,14,53,124],"one":[3],"of":[4,34,43,63,82,137,171,182],"the":[5,27,32,41,64,80,121,135,146,155,167],"fundamental":[6],"problems":[7],"in":[8,36,105,141,180],"wireless":[9,37,74,106],"mobile":[10,38,75,107],"networks.":[11],"Digital":[12],"signature":[13,44],"a":[15,54,99,161],"widely":[16],"used":[17],"technique":[18,52],"to":[19,30,57,88,111,144,193],"protect":[20],"messages'":[21],"authenticity":[22],"and":[23,91,133,169,188],"nodes'":[24],"identities.":[25],"From":[26],"practical":[28],"perspective,":[29],"ensure":[31],"quality":[33],"services":[35],"networks,":[39,108],"ideally":[40],"process":[42],"verification":[45,59,71,89],"should":[46],"introduce":[47],"minimum":[48],"delay.":[49],"Batch":[50,100],"cryptography":[51],"powerful":[55],"tool":[56],"reduce":[58],"time.":[60],"However,":[61],"most":[62],"existing":[65,204],"works":[66],"focus":[67],"on":[68,174],"designing":[69],"batch":[70],"algorithms":[72],"for":[73,149],"networks":[76],"without":[77],"sufficiently":[78],"considering":[79],"impact":[81],"invalid":[83,113,151,199],"signatures,":[84],"which":[85,165],"can":[86,197],"lead":[87],"failures":[90],"performance":[92],"degradation.":[93],"In":[94],"this":[95],"paper,":[96],"we":[97,131,159],"propose":[98,160],"Identification":[101],"Game":[102],"Model":[103],"(BIGM)":[104],"enabling":[109],"nodes":[110],"find":[112],"signatures":[114,200],"with":[115],"reasonable":[116],"delay":[117,190],"no":[118],"matter":[119],"whether":[120],"game":[122],"scenario":[123],"complete":[125],"information":[126],"or":[127],"incomplete":[128],"information.":[129,176],"Specifically,":[130],"analyze":[132],"prove":[134],"existence":[136],"Nash":[138],"Equilibriums":[139],"(NEs)":[140],"both":[142],"scenarios,":[143],"select":[145],"dominant":[147],"algorithm":[148,157,185],"identifying":[150],"signatures.":[152],"To":[153],"optimize":[154],"identification":[156,189],"selection,":[158],"self-adaptive":[162],"auto-match":[163],"protocol":[164],"estimates":[166],"strategies":[168],"states":[170],"attackers":[172],"based":[173],"historical":[175],"Comprehensive":[177],"simulation":[178],"results":[179],"terms":[181],"NE":[183],"reasonability,":[184],"selection":[186],"accuracy,":[187],"are":[191],"provided":[192],"demonstrate":[194],"that":[195],"BIGM":[196],"identify":[198],"more":[201],"efficiently":[202],"than":[203],"algorithms.":[205]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2514743770","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":13},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":2}],"updated_date":"2024-12-29T01:15:25.301560","created_date":"2016-09-16"}