{"id":"https://openalex.org/W2515254857","doi":"https://doi.org/10.17487/rfc8928","title":"Address-Protected Neighbor Discovery for Low-Power and Lossy Networks","display_name":"Address-Protected Neighbor Discovery for Low-Power and Lossy Networks","publication_year":2020,"publication_date":"2020-11-01","ids":{"openalex":"https://openalex.org/W2515254857","doi":"https://doi.org/10.17487/rfc8928","mag":"2515254857"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc8928","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"report","type_crossref":"report","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046174873","display_name":"B. Sarikaya","orcid":"https://orcid.org/0000-0002-5385-9949"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"B. Sarikaya","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110047220","display_name":"Manish Sethi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"M. Sethi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5004544000","display_name":"Ren\u00e9 Struik","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"R. Struik","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.894161,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":88,"max":89},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9961,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.7754124}],"concepts":[{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.7754124},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.46242136},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.45542118},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.36256117},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.14626223},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1380294},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc8928","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4287903946","https://openalex.org/W3042625184","https://openalex.org/W2999957348","https://openalex.org/W2964219139","https://openalex.org/W2899084033","https://openalex.org/W2803920876","https://openalex.org/W2748952813","https://openalex.org/W2387503788","https://openalex.org/W2059658550","https://openalex.org/W1995805316"],"abstract_inverted_index":{"This":[0],"document":[1],"updates":[2],"the":[3,27,64,94,100],"6LoWPAN":[4],"Neighbor":[5,21],"Discovery":[6,22],"(ND)":[7],"protocol\ndefined":[8],"in":[9,37],"RFC":[10,13],"6775":[11],"and":[12,24,34,51,69,88],"8505.":[14],"The":[15,61],"new":[16],"extension":[17,46],"is":[18,84,91],"called":[19],"Address\nProtected":[20],"(AP-ND)":[23],"it":[25,53],"protects":[26],"owner":[28,65,95],"of":[29,66,76,96],"an\naddress":[30],"against":[31],"address":[32,83],"theft":[33],"impersonation":[35],"attacks":[36],"a":[38,89],"low-power\nand":[39],"lossy":[40],"network":[41],"(LLN).":[42],"Nodes":[43],"supporting":[44],"this":[45],"compute":[47],"a\ncryptographic":[48],"identifier":[49],"(Crypto-ID)":[50],"use":[52],"with":[54,86],"one":[55],"or":[56],"more":[57],"of\ntheir":[58],"Registered":[59,79],"Addresses.":[60,80],"Crypto-ID":[62],"identifies":[63],"the\nRegistered":[67],"Address":[68,105],"can":[70,98],"be":[71],"used":[72],"to":[73],"provide":[74],"proof":[75],"ownership":[77],"of\nthe":[78],"Once":[81],"an":[82],"registered":[85],"the\nCrypto-ID":[87],"proof-of-ownership":[90],"provided,":[92],"only":[93],"that\naddress":[97],"modify":[99],"registration":[101],"information,":[102],"thereby":[103],"enforcing\nSource":[104],"Validation.":[106]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2515254857","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2025-01-16T16:31:09.995208","created_date":"2016-09-16"}