{"id":"https://openalex.org/W2046876000","doi":"https://doi.org/10.1109/afrcon.2011.6072117","title":"A prototype for achieving digital forensic readiness on wireless sensor networks","display_name":"A prototype for achieving digital forensic readiness on wireless sensor networks","publication_year":2011,"publication_date":"2011-09-01","ids":{"openalex":"https://openalex.org/W2046876000","doi":"https://doi.org/10.1109/afrcon.2011.6072117","mag":"2046876000"},"language":"en","primary_location":{"id":"doi:10.1109/afrcon.2011.6072117","is_oa":false,"landing_page_url":"https://doi.org/10.1109/afrcon.2011.6072117","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Africon '11","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090619861","display_name":"Francois Mouton","orcid":"https://orcid.org/0000-0001-8804-7601"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Francois Mouton","raw_affiliation_strings":["Department of Computer Science, Information and Computer Security Architecture, Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Information and Computer Security Architecture, Pretoria, South Africa","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037461417","display_name":"Hein S. Venter","orcid":"https://orcid.org/0000-0002-3607-8630"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"H.S Venter","raw_affiliation_strings":["Department of Computer Science, Information and Computer Security Architecture, Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Information and Computer Security Architecture, Pretoria, South Africa","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5090619861"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.7504,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.85173519,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"2","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.8118670582771301},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7243360280990601},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.6980078816413879},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6056630611419678},{"id":"https://openalex.org/keywords/wireless-wan","display_name":"Wireless WAN","score":0.6049982309341431},{"id":"https://openalex.org/keywords/wi-fi-array","display_name":"Wi-Fi array","score":0.5645240545272827},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5485587120056152},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.5404802560806274},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5146001577377319},{"id":"https://openalex.org/keywords/mobile-wireless-sensor-network","display_name":"Mobile wireless sensor network","score":0.5031461119651794},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.4443269371986389},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.43883922696113586},{"id":"https://openalex.org/keywords/wireless-site-survey","display_name":"Wireless site survey","score":0.4143833816051483},{"id":"https://openalex.org/keywords/application-layer","display_name":"Application layer","score":0.41219043731689453},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24844515323638916},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.212945818901062},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.0667259693145752},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.051181256771087646}],"concepts":[{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.8118670582771301},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7243360280990601},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.6980078816413879},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6056630611419678},{"id":"https://openalex.org/C87379069","wikidata":"https://www.wikidata.org/wiki/Q938054","display_name":"Wireless WAN","level":5,"score":0.6049982309341431},{"id":"https://openalex.org/C152153834","wikidata":"https://www.wikidata.org/wiki/Q1339878","display_name":"Wi-Fi array","level":4,"score":0.5645240545272827},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5485587120056152},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.5404802560806274},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5146001577377319},{"id":"https://openalex.org/C7091991","wikidata":"https://www.wikidata.org/wiki/Q17149548","display_name":"Mobile wireless sensor network","level":5,"score":0.5031461119651794},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.4443269371986389},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.43883922696113586},{"id":"https://openalex.org/C13021490","wikidata":"https://www.wikidata.org/wiki/Q8026901","display_name":"Wireless site survey","level":5,"score":0.4143833816051483},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.41219043731689453},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24844515323638916},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.212945818901062},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0667259693145752},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.051181256771087646}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/afrcon.2011.6072117","is_oa":false,"landing_page_url":"https://doi.org/10.1109/afrcon.2011.6072117","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Africon '11","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W185406290","https://openalex.org/W1848594422","https://openalex.org/W2002076319","https://openalex.org/W2031423416","https://openalex.org/W2039728842","https://openalex.org/W2091936226","https://openalex.org/W2104404152","https://openalex.org/W2107876485","https://openalex.org/W2118487515","https://openalex.org/W2127949150","https://openalex.org/W2135505702","https://openalex.org/W2149259182","https://openalex.org/W2162650992","https://openalex.org/W2169297812","https://openalex.org/W2402634562","https://openalex.org/W6607448945","https://openalex.org/W6712955565"],"related_works":["https://openalex.org/W2360590285","https://openalex.org/W2536954514","https://openalex.org/W3016073996","https://openalex.org/W2368427178","https://openalex.org/W2188573958","https://openalex.org/W2155747459","https://openalex.org/W1975343729","https://openalex.org/W2326498461","https://openalex.org/W2270696491","https://openalex.org/W2384974270"],"abstract_inverted_index":{"The":[0],"field":[1],"of":[2,19,54,94,122,164],"wireless":[3,77,86,112,133,148,171],"sensor":[4,78,87,113,134,149,172],"networking":[5],"is":[6,138],"still":[7,15],"a":[8,35,67,95,101,120,132,162],"new":[9],"and":[10,52,62],"upcoming":[11],"one":[12,64],"and,":[13],"unfortunately,":[14],"lacking":[16],"in":[17,34,124,131,152],"terms":[18],"digital":[20,68,102,128,165],"forensics.":[21],"All":[22],"communications":[23],"between":[24],"different":[25],"nodes":[26],"(also":[27],"known":[28],"as":[29],"motes)":[30],"are":[31],"sent":[32],"out":[33],"broadcast":[36],"fashion.":[37],"These":[38],"broadcasts":[39],"make":[40],"it":[41],"quite":[42],"difficult":[43],"to":[44,72,83,98,109,119,126,154,168],"capture":[45],"data":[46,56],"packets":[47],"forensically":[48],"whilst":[49],"retaining":[50],"integrity":[51],"authenticity":[53],"the":[55,84,116,157,169],"packets.":[57],"This":[58,89,137],"paper":[59,90],"examines":[60],"whether":[61],"how":[63],"can":[65,106],"add":[66,161],"forensic":[69,103,129,166],"readiness":[70,104,130,167],"layer":[71,105,163],"an":[73,110],"existing":[74,85,111,170],"IEEE":[75],"802.15.4":[76],"network":[79,135,150],"without":[80],"any":[81],"modification":[82],"network.":[88,173],"also":[91],"provides":[92],"demonstrations":[93,143],"working":[96],"prototype":[97,117,158],"show":[99,155],"that":[100,156],"be":[107],"added":[108],"network,":[114],"if":[115],"adheres":[118],"list":[121],"requirements":[123],"order":[125,153],"achieve":[127],"environment.":[136],"done":[139],"by":[140],"performing":[141],"several":[142],"which":[144],"resemble":[145],"real":[146],"world":[147],"scenarios":[151],"does":[159],"indeed":[160]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":3},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
