{"id":"https://openalex.org/W2075142613","doi":"https://doi.org/10.1109/wowmom.2010.5534952","title":"Detection of the Evil ring attack in wireless sensor networks using cross verification","display_name":"Detection of the Evil ring attack in wireless sensor networks using cross verification","publication_year":2010,"publication_date":"2010-06-01","ids":{"openalex":"https://openalex.org/W2075142613","doi":"https://doi.org/10.1109/wowmom.2010.5534952","mag":"2075142613"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/wowmom.2010.5534952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100651614","display_name":"Wei Shi","orcid":"https://orcid.org/0000-0002-3071-8350"},"institutions":[{"id":"https://openalex.org/I39470171","display_name":"University of Ontario Institute of Technology","ror":"https://ror.org/016zre027","country_code":"CA","type":"education","lineage":["https://openalex.org/I39470171"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Wei Shi","raw_affiliation_strings":["Faculty of Business and Information Technology, University of Ontario Institute Technology, Oshawa, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Business and Information Technology, University of Ontario Institute Technology, Oshawa, Canada","institution_ids":["https://openalex.org/I39470171"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087753863","display_name":"Michel Barbeau","orcid":"https://orcid.org/0000-0003-3531-4926"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Michel Barbeau","raw_affiliation_strings":["#N# \u2020 School of Computer Science, Carleton University, Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"#N# \u2020 School of Computer Science, Carleton University, Ottawa, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009496814","display_name":"Jean\u2010Pierre Corriveau","orcid":"https://orcid.org/0000-0002-6570-3108"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jean-Pierre Corriveau","raw_affiliation_strings":["#N# \u2020 School of Computer Science, Carleton University, Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"#N# \u2020 School of Computer Science, Carleton University, Ottawa, Canada","institution_ids":["https://openalex.org/I67031392"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.535,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":2,"citation_normalized_percentile":{"value":0.241433,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":71,"max":75},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9983,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/position","display_name":"Position (finance)","score":0.49329728},{"id":"https://openalex.org/keywords/geographic-routing","display_name":"Geographic routing","score":0.46958297},{"id":"https://openalex.org/keywords/packet-drop-attack","display_name":"Packet drop attack","score":0.4193997}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.73774755},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7162081},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6643466},{"id":"https://openalex.org/C60229501","wikidata":"https://www.wikidata.org/wiki/Q18822","display_name":"Global Positioning System","level":2,"score":0.5892813},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.54707205},{"id":"https://openalex.org/C2780378348","wikidata":"https://www.wikidata.org/wiki/Q25351438","display_name":"Ring (chemistry)","level":2,"score":0.52687746},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5262736},{"id":"https://openalex.org/C198082294","wikidata":"https://www.wikidata.org/wiki/Q3399648","display_name":"Position (finance)","level":2,"score":0.49329728},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4701669},{"id":"https://openalex.org/C50558702","wikidata":"https://www.wikidata.org/wiki/Q5535067","display_name":"Geographic routing","level":5,"score":0.46958297},{"id":"https://openalex.org/C178635117","wikidata":"https://www.wikidata.org/wiki/Q747499","display_name":"RADIUS","level":2,"score":0.441376},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.43991628},{"id":"https://openalex.org/C35546906","wikidata":"https://www.wikidata.org/wiki/Q2900718","display_name":"Packet drop attack","level":5,"score":0.4193997},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.3608446},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3261763},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.30946314},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.29744864},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2050766},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09570509},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08196586},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/wowmom.2010.5534952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.79,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":9,"referenced_works":["https://openalex.org/W1488160161","https://openalex.org/W1992874203","https://openalex.org/W2101963262","https://openalex.org/W2108613717","https://openalex.org/W2159796097","https://openalex.org/W2165274895","https://openalex.org/W2165303182","https://openalex.org/W2269131354","https://openalex.org/W2568946121"],"related_works":["https://openalex.org/W4233932308","https://openalex.org/W3162200841","https://openalex.org/W2947882039","https://openalex.org/W2805505483","https://openalex.org/W2586280620","https://openalex.org/W2384744344","https://openalex.org/W2334071950","https://openalex.org/W2004695235","https://openalex.org/W1799694159","https://openalex.org/W133227787"],"abstract_inverted_index":{"In":[0,62],"ad":[1],"hoc":[2],"networks":[3],"and":[4,24,111,122,136,148,215],"wireless":[5,205],"sensor":[6,160,206],"networks,":[7],"several":[8,45],"routing":[9],"algorithms":[10,46,78],"rely":[11],"on":[12,74,103],"the":[13,16,68,75,87,108,117,120,128,131,134,163,166,174,184,189,209],"knowledge":[14],"by":[15,177],"network":[17,207],"nodes":[18,85],"of":[19,26,79,90,112,130,165,186,211],"their":[20,91],"own":[21,36],"geographic":[22,55,76],"location":[23,77,110],"those":[25],"others.":[27],"For":[28],"cases":[29],"where":[30],"a":[31,48,99,104,113,158,195,204],"node":[32,49,161],"doesn't":[33],"have":[34],"its":[35,54,171],"positioning":[37],"device":[38],"(e.g.,":[39],"GPS),":[40],"Alfaro":[41,80],"et":[42,81],"al.":[43,82],"propose":[44,194],"that":[47,83,101],"can":[50],"run":[51],"to":[52,116],"determine":[53],"position":[56,58,89,100],"using":[57],"reports":[59,97],"from":[60,170],"neighbors.":[61,92,180],"this":[63,142],"paper,":[64],"we":[65],"first":[66],"present":[67,147],"evil":[69,151,190],"ring":[70,152,191],"attack,":[71],"an":[72,150],"attack":[73,125,153],"misleads":[84],"about":[86],"true":[88],"An":[93],"attacker":[94,137],"sends":[95],"false":[96],"with":[98,173],"sits":[102],"circle":[105],"centered":[106],"at":[107],"victim's":[109],"radius":[114],"equal":[115],"distance":[118,132],"between":[119,133],"victim":[121,135],"attacker.":[123],"The":[124],"succeeds":[126],"because":[127],"calculation":[129],"is":[138],"not":[139],"affected":[140],"despite":[141],"fake":[143],"position.":[144],"We":[145,193],"then":[146],"analyze":[149],"detection":[154],"algorithm":[155,182,198],"in":[156,203,208],"which":[157],"position-unaware":[159],"crosschecks":[162],"consistency":[164],"information":[167,175],"it":[168],"collects":[169],"neighbors":[172,187],"collected":[176],"other":[178],"trusted":[179],"This":[181],"detects":[183],"existence":[185],"running":[188],"attack.":[192],"general":[196],"distributed":[197],"for":[199],"a)":[200],"localizing":[201],"sensors":[202],"presence":[210],"some":[212],"malfunctioning":[213,219],"ones,":[214],"b)":[216],"detecting":[217],"such":[218],"sensors.":[220]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2075142613","counts_by_year":[{"year":2012,"cited_by_count":2}],"updated_date":"2024-12-07T21:50:12.772384","created_date":"2016-06-24"}