{"id":"https://openalex.org/W2918428671","doi":"https://doi.org/10.1109/access.2019.2902843","title":"Selective Authentication Based Geographic Opportunistic Routing in Wireless Sensor Networks for Internet of Things Against DoS Attacks","display_name":"Selective Authentication Based Geographic Opportunistic Routing in Wireless Sensor Networks for Internet of Things Against DoS Attacks","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2918428671","doi":"https://doi.org/10.1109/access.2019.2902843","mag":"2918428671"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2902843","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2902843","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08658074.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08658074.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070132452","display_name":"Chen Lyu","orcid":"https://orcid.org/0000-0002-4373-9898"},"institutions":[{"id":"https://openalex.org/I181679659","display_name":"Shanghai University of Finance and Economics","ror":"https://ror.org/00wtvfq62","country_code":"CN","type":"education","lineage":["https://openalex.org/I181679659"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chen Lyu","raw_affiliation_strings":["Department of Computer Science and Technology, Shanghai University of Finance and Economics, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Shanghai University of Finance and Economics, Shanghai, China","institution_ids":["https://openalex.org/I181679659"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100352985","display_name":"Xiaomei Zhang","orcid":"https://orcid.org/0000-0001-7139-0243"},"institutions":[{"id":"https://openalex.org/I141962983","display_name":"Shanghai University of Engineering Science","ror":"https://ror.org/0557b9y08","country_code":"CN","type":"education","lineage":["https://openalex.org/I141962983"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaomei Zhang","raw_affiliation_strings":["School of Electronic and Electrical Engineering, Shanghai University of Engineering Science, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Electrical Engineering, Shanghai University of Engineering Science, Shanghai, China","institution_ids":["https://openalex.org/I141962983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100415090","display_name":"Zhiqiang Liu","orcid":"https://orcid.org/0000-0002-0846-4825"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiqiang Liu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058644115","display_name":"Chi\u2010Hung Chi","orcid":"https://orcid.org/0000-0001-7271-1926"},"institutions":[{"id":"https://openalex.org/I4210101388","display_name":"Health Sciences and Nutrition","ror":"https://ror.org/0152bt112","country_code":"AU","type":"facility","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4210101388","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Chi-Hung Chi","raw_affiliation_strings":["Data61, Commonwealth Scientific and Industrial Research Organization, Hobart, TAS, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, Commonwealth Scientific and Industrial Research Organization, Hobart, TAS, Australia","institution_ids":["https://openalex.org/I4210101388","https://openalex.org/I42894916"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5070132452"],"corresponding_institution_ids":["https://openalex.org/I181679659"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":7.5925,"has_fulltext":true,"cited_by_count":65,"citation_normalized_percentile":{"value":0.97561591,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"7","issue":null,"first_page":"31068","last_page":"31082"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8562047481536865},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7531071901321411},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6035895943641663},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5083641409873962},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.49123185873031616},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.4729554355144501},{"id":"https://openalex.org/keywords/geographic-routing","display_name":"Geographic routing","score":0.4487876892089844},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4475180506706238},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.40738821029663086},{"id":"https://openalex.org/keywords/dynamic-source-routing","display_name":"Dynamic Source Routing","score":0.35056164860725403},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32541733980178833},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3010254502296448}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8562047481536865},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7531071901321411},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6035895943641663},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5083641409873962},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.49123185873031616},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.4729554355144501},{"id":"https://openalex.org/C50558702","wikidata":"https://www.wikidata.org/wiki/Q5535067","display_name":"Geographic routing","level":5,"score":0.4487876892089844},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4475180506706238},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.40738821029663086},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.35056164860725403},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32541733980178833},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3010254502296448},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2902843","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2902843","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08658074.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a5a71d060e404b10b03649b1bee2a60b","is_oa":true,"landing_page_url":"https://doaj.org/article/a5a71d060e404b10b03649b1bee2a60b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 31068-31082 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2902843","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2902843","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08658074.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1023919524","display_name":null,"funder_award_id":", Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G151919317","display_name":null,"funder_award_id":"61802252","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2702356746","display_name":null,"funder_award_id":"61702","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3129082882","display_name":null,"funder_award_id":"61672347","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5475301337","display_name":null,"funder_award_id":"18022","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G805693332","display_name":null,"funder_award_id":"61702319","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2918428671.pdf","grobid_xml":"https://content.openalex.org/works/W2918428671.grobid-xml"},"referenced_works_count":40,"referenced_works":["https://openalex.org/W150105584","https://openalex.org/W1815391874","https://openalex.org/W1967561194","https://openalex.org/W1998944191","https://openalex.org/W2020789230","https://openalex.org/W2038194220","https://openalex.org/W2045669182","https://openalex.org/W2080081718","https://openalex.org/W2082090908","https://openalex.org/W2088343455","https://openalex.org/W2092667369","https://openalex.org/W2099817583","https://openalex.org/W2101963262","https://openalex.org/W2102951451","https://openalex.org/W2105103777","https://openalex.org/W2111619626","https://openalex.org/W2113582392","https://openalex.org/W2122117190","https://openalex.org/W2132047492","https://openalex.org/W2132549513","https://openalex.org/W2141151352","https://openalex.org/W2142100695","https://openalex.org/W2143753548","https://openalex.org/W2146824532","https://openalex.org/W2148922257","https://openalex.org/W2151207840","https://openalex.org/W2151381156","https://openalex.org/W2163980921","https://openalex.org/W2166735191","https://openalex.org/W2176510361","https://openalex.org/W2335686213","https://openalex.org/W2512075923","https://openalex.org/W2520350648","https://openalex.org/W2609533221","https://openalex.org/W2765134690","https://openalex.org/W2896346082","https://openalex.org/W3145257572","https://openalex.org/W4234390533","https://openalex.org/W6606218254","https://openalex.org/W6674945332"],"related_works":["https://openalex.org/W2110333561","https://openalex.org/W2398904817","https://openalex.org/W2160189149","https://openalex.org/W2620451430","https://openalex.org/W2394677160","https://openalex.org/W2114784287","https://openalex.org/W2143656291","https://openalex.org/W1999482517","https://openalex.org/W2163375631","https://openalex.org/W2187498136"],"abstract_inverted_index":{"Wireless":[0],"Sensor":[1],"Networks":[2],"(WSNs)":[3],"have":[4],"been":[5],"widely":[6],"used":[7],"as":[8],"the":[9,13,21,79,99,103,128,158,171,210],"communication":[10],"system":[11],"in":[12,52,109],"Internet":[14],"of":[15,61,69,82,105,117,130,173,209],"Things":[16],"(IoT).":[17],"In":[18,84],"addition":[19],"to":[20,75,77,96,126,152,169,214],"services":[22],"provided":[23],"by":[24,142],"WSNs,":[25],"many":[26],"IoT-based":[27],"applications":[28],"require":[29],"reliable":[30,39,199],"data":[31,40,71,131,140,182,202],"delivery":[32],"over":[33],"unstable":[34],"wireless":[35,118],"links.":[36],"To":[37],"guarantee":[38],"delivery,":[41,203],"existing":[42],"works":[43],"exploit":[44],"geographic":[45,92],"opportunistic":[46,93,135,190],"routing":[47,94,136],"with":[48],"multiple":[49],"candidate":[50],"forwarders":[51],"WSNs.":[53,83,110],"However,":[54],"these":[55],"approaches":[56],"suffer":[57],"from":[58,189],"serious":[59],"Denial":[60],"Service":[62],"(DoS)":[63],"attacks,":[64,101],"where":[65],"a":[66,89,164],"large":[67],"number":[68],"invalid":[70],"are":[72],"deliberately":[73],"delivered":[74],"receivers":[76],"disrupt":[78],"normal":[80],"operations":[81],"this":[85],"paper,":[86],"we":[87,162],"propose":[88],"selective":[90,146],"authentication-based":[91],"(SelGOR)":[95],"defend":[97],"against":[98],"DoS":[100,154],"meeting":[102],"requirements":[104],"authenticity":[106],"and":[107,149,156,184,200],"reliability":[108],"By":[111],"analyzing":[112],"statistic":[113],"state":[114],"information":[115],"(SSI)":[116],"links,":[119],"SelGOR":[120,138,179,197],"leverages":[121],"an":[122,144],"SSI-based":[123],"trust":[124],"model":[125],"improve":[127],"efficiency":[129],"delivery.":[132],"Unlike":[133],"previous":[134],"protocols,":[137],"ensures":[139],"integrity":[141],"developing":[143],"entropy-based":[145],"authentication":[147],"algorithm,":[148],"is":[150],"able":[151],"isolate":[153],"attackers":[155],"reduce":[157],"computational":[159,211],"cost.":[160],"Specifically,":[161],"design":[163],"distributed":[165],"cooperative":[166],"verification":[167,187],"scheme":[168,176],"accelerate":[170],"isolation":[172],"attackers.":[174],"This":[175],"also":[177],"makes":[178],"avoid":[180],"duplicate":[181],"transmission":[183],"redundant":[185],"signature":[186],"resulting":[188],"routing.":[191],"The":[192],"extensive":[193],"simulations":[194],"show":[195],"that":[196],"provides":[198],"authentic":[201],"while":[204],"it":[205],"only":[206],"consumes":[207],"50%":[208],"cost":[212],"compared":[213],"other":[215],"related":[216],"solutions.":[217]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":18},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":2}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
