{"id":"https://openalex.org/W2169107025","doi":"https://doi.org/10.1109/.2006.1629460","title":"Overcoming the Challenge of Security in a Mobile Environment","display_name":"Overcoming the Challenge of Security in a Mobile Environment","publication_year":2006,"publication_date":"2006-05-25","ids":{"openalex":"https://openalex.org/W2169107025","doi":"https://doi.org/10.1109/.2006.1629460","mag":"2169107025"},"language":"en","primary_location":{"id":"doi:10.1109/.2006.1629460","is_oa":false,"landing_page_url":"https://doi.org/10.1109/.2006.1629460","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2006 IEEE International Performance Computing and Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025881090","display_name":"Ioannis Broustis","orcid":null},"institutions":[{"id":"https://openalex.org/I103635307","display_name":"University of California, Riverside","ror":"https://ror.org/03nawhv43","country_code":"US","type":"education","lineage":["https://openalex.org/I103635307"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"I. Broustis","raw_affiliation_strings":["Department of Computer Science and Engineering, University of California, Riverside, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of California, Riverside, CA, USA","institution_ids":["https://openalex.org/I103635307"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018876909","display_name":"Michalis Faloutsos","orcid":"https://orcid.org/0000-0002-3882-9987"},"institutions":[{"id":"https://openalex.org/I103635307","display_name":"University of California, Riverside","ror":"https://ror.org/03nawhv43","country_code":"US","type":"education","lineage":["https://openalex.org/I103635307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M. Faloutsos","raw_affiliation_strings":["Department of Computer Science and Engineering, University of California, Riverside, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of California, Riverside, CA, USA","institution_ids":["https://openalex.org/I103635307"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086268637","display_name":"Srikanth V. Krishnamurthy","orcid":"https://orcid.org/0000-0002-6533-4381"},"institutions":[{"id":"https://openalex.org/I103635307","display_name":"University of California, Riverside","ror":"https://ror.org/03nawhv43","country_code":"US","type":"education","lineage":["https://openalex.org/I103635307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. Krishnamurthy","raw_affiliation_strings":["Department of Computer Science and Engineering, University of California, Riverside, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of California, Riverside, CA, USA","institution_ids":["https://openalex.org/I103635307"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5025881090"],"corresponding_institution_ids":["https://openalex.org/I103635307"],"apc_list":null,"apc_paid":null,"fwci":0.63,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.75584305,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"2908","issue":null,"first_page":"617","last_page":"622"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7854220867156982},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6686451435089111},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.6627930402755737},{"id":"https://openalex.org/keywords/novelty","display_name":"Novelty","score":0.6003167033195496},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5751240849494934},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5707337260246277},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.4801323115825653},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.4631151258945465},{"id":"https://openalex.org/keywords/malice","display_name":"Malice","score":0.45696064829826355},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4520154893398285},{"id":"https://openalex.org/keywords/optimized-link-state-routing-protocol","display_name":"Optimized Link State Routing Protocol","score":0.42985472083091736},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.34489214420318604},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.287320613861084},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09863021969795227},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.0926409363746643},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.08507797122001648}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7854220867156982},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6686451435089111},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.6627930402755737},{"id":"https://openalex.org/C2778738651","wikidata":"https://www.wikidata.org/wiki/Q16546687","display_name":"Novelty","level":2,"score":0.6003167033195496},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5751240849494934},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5707337260246277},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.4801323115825653},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.4631151258945465},{"id":"https://openalex.org/C2778068216","wikidata":"https://www.wikidata.org/wiki/Q55019500","display_name":"Malice","level":2,"score":0.45696064829826355},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4520154893398285},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.42985472083091736},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.34489214420318604},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.287320613861084},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09863021969795227},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0926409363746643},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.08507797122001648},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C27206212","wikidata":"https://www.wikidata.org/wiki/Q34178","display_name":"Theology","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/.2006.1629460","is_oa":false,"landing_page_url":"https://doi.org/10.1109/.2006.1629460","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2006 IEEE International Performance Computing and Communications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.131.5381","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.5381","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.ucr.edu/~krish/broustis-ipccc06.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.134.4651","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.4651","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.ucr.edu/~broustis/research/sec.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.136.1528","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.1528","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.ucr.edu/~broustis/research/sec2.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W181356843","https://openalex.org/W1528899619","https://openalex.org/W1543653153","https://openalex.org/W1593489868","https://openalex.org/W1603662839","https://openalex.org/W1982488304","https://openalex.org/W2000548713","https://openalex.org/W2001298596","https://openalex.org/W2081633971","https://openalex.org/W2090636507","https://openalex.org/W2099574482","https://openalex.org/W2110279266","https://openalex.org/W2118624870","https://openalex.org/W2135057483","https://openalex.org/W2164947865","https://openalex.org/W2539662606","https://openalex.org/W3112127769","https://openalex.org/W4285719527","https://openalex.org/W6635448045","https://openalex.org/W6650655300","https://openalex.org/W6677857662","https://openalex.org/W6862240463"],"related_works":["https://openalex.org/W3035283282","https://openalex.org/W2768875466","https://openalex.org/W1591014886","https://openalex.org/W2551975114","https://openalex.org/W2025838880","https://openalex.org/W2123281165","https://openalex.org/W1511473871","https://openalex.org/W2003275014","https://openalex.org/W4210799434","https://openalex.org/W1581687089"],"abstract_inverted_index":{"The":[0,24],"secure":[1],"operation":[2],"of":[3,11,16,119,136,144,150,167],"ad":[4,60,121],"hoc":[5,61,122],"networks":[6,22,62],"faces":[7],"the":[8,17,28,51,102,117,127,151],"novel":[9],"challenge":[10],"location":[12,43,110,137],"verification":[13],"on":[14],"top":[15],"security":[18,118,145],"challenges":[19],"that":[20,30,58,131,158],"wireline":[21],"face.":[23],"novelty":[25],"lies":[26],"in":[27],"fact":[29],"a":[31,90,163],"node":[32],"can":[33,67,74,82,94,115,132],"correctly":[34],"validate":[35],"who":[36],"it":[37],"is,":[38],"but":[39],"lie":[40,75],"about":[41,76],"its":[42],"and":[44,79,85,98,111],"exploit":[45],"this":[46,99,105],"to":[47,50],"create":[48],"problems":[49],"network.":[52],"There":[53],"are":[54,154],"three":[55],"main":[56],"factors":[57],"make":[59],"more":[63],"vulnerable:":[64],"(a)":[65],"nodes":[66,70,73,81,93],"overhear":[68],"other":[69],"announcements,":[71],"(b)":[72],"their":[77,96],"location,":[78],"(c)":[80],"avoid":[83],"detection":[84],"isolation":[86],"by":[87],"moving.":[88],"As":[89],"result,":[91],"malicious":[92],"fake":[95],"position":[97],"way":[100],"obstruct":[101],"routing.":[103],"In":[104],"work,":[106],"we":[107,125,140,156],"explain":[108],"how":[109],"topology":[112],"related":[113],"malice":[114],"affect":[116],"wireless":[120],"networks.":[123],"First,":[124],"present":[126],"most":[128],"important":[129],"attacks":[130],"stem":[133],"from":[134],"misuse":[135],"information.":[138],"Second,":[139],"provide":[141],"an":[142],"overview":[143],"routing":[146],"approaches.":[147],"Although":[148],"several":[149],"current":[152],"techniques":[153],"promising,":[155],"conclude":[157],"there":[159],"does":[160],"not":[161],"exist":[162],"bulletproof":[164],"approach":[165],"as":[166],"yet":[168]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
