{"id":"https://openalex.org/W1999157577","doi":"https://doi.org/10.1109/aiccsa.2014.7073179","title":"ModConTR: A modular and configurable trust and reputation-based system for secure routing in ad-hoc networks","display_name":"ModConTR: A modular and configurable trust and reputation-based system for secure routing in ad-hoc networks","publication_year":2014,"publication_date":"2014-11-01","ids":{"openalex":"https://openalex.org/W1999157577","doi":"https://doi.org/10.1109/aiccsa.2014.7073179","mag":"1999157577"},"language":"en","primary_location":{"id":"doi:10.1109/aiccsa.2014.7073179","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2014.7073179","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089546492","display_name":"George Hatzivasilis","orcid":null},"institutions":[{"id":"https://openalex.org/I55741626","display_name":"Technical University of Crete","ror":"https://ror.org/03f8bz564","country_code":"GR","type":"education","lineage":["https://openalex.org/I55741626"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"George Hatzivasilis","raw_affiliation_strings":["Dept. of Electronic and Computer Engineering, Technical University of Crete Chania, Crete, Greece","Department of Electronic & Computer Engineering; Technical University of Crete; Chania Greece"],"affiliations":[{"raw_affiliation_string":"Dept. of Electronic and Computer Engineering, Technical University of Crete Chania, Crete, Greece","institution_ids":["https://openalex.org/I55741626"]},{"raw_affiliation_string":"Department of Electronic & Computer Engineering; Technical University of Crete; Chania Greece","institution_ids":["https://openalex.org/I55741626"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032739499","display_name":"Ioannis Papaefstathiou","orcid":"https://orcid.org/0000-0001-6386-5616"},"institutions":[{"id":"https://openalex.org/I55741626","display_name":"Technical University of Crete","ror":"https://ror.org/03f8bz564","country_code":"GR","type":"education","lineage":["https://openalex.org/I55741626"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Ioannis Papaefstathiou","raw_affiliation_strings":["Dept. of Electronic and Computer Engineering, Technical University of Crete Chania, Crete, Greece","Department of Electronic & Computer Engineering; Technical University of Crete; Chania Greece"],"affiliations":[{"raw_affiliation_string":"Dept. of Electronic and Computer Engineering, Technical University of Crete Chania, Crete, Greece","institution_ids":["https://openalex.org/I55741626"]},{"raw_affiliation_string":"Department of Electronic & Computer Engineering; Technical University of Crete; Chania Greece","institution_ids":["https://openalex.org/I55741626"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5106083747","display_name":"Charalampos Manifavas","orcid":null},"institutions":[{"id":"https://openalex.org/I28710699","display_name":"Hellenic Mediterranean University","ror":"https://ror.org/039ce0m20","country_code":"GR","type":"education","lineage":["https://openalex.org/I28710699"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Charalampos Manifavas","raw_affiliation_strings":["Dept. of Informatics Engineering Technological, Educational Institute of Crete Heraklion, Crete, Greece","Department of Informatics Engineering, Technological Educational Institute of Crete, Heraklion, Greece#TAB#"],"affiliations":[{"raw_affiliation_string":"Dept. of Informatics Engineering Technological, Educational Institute of Crete Heraklion, Crete, Greece","institution_ids":["https://openalex.org/I28710699"]},{"raw_affiliation_string":"Department of Informatics Engineering, Technological Educational Institute of Crete, Heraklion, Greece#TAB#","institution_ids":["https://openalex.org/I28710699"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5089546492"],"corresponding_institution_ids":["https://openalex.org/I55741626"],"apc_list":null,"apc_paid":null,"fwci":1.7241,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.85789393,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"56","last_page":"63"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8193331956863403},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7385480999946594},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.6774066686630249},{"id":"https://openalex.org/keywords/link-state-routing-protocol","display_name":"Link-state routing protocol","score":0.5320390462875366},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5173768401145935},{"id":"https://openalex.org/keywords/dynamic-source-routing","display_name":"Dynamic Source Routing","score":0.4754345417022705},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.4678289294242859},{"id":"https://openalex.org/keywords/wireless-routing-protocol","display_name":"Wireless Routing Protocol","score":0.4660419523715973},{"id":"https://openalex.org/keywords/static-routing","display_name":"Static routing","score":0.455983430147171},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.4437929689884186},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4371621310710907},{"id":"https://openalex.org/keywords/policy-based-routing","display_name":"Policy-based routing","score":0.42421793937683105},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3640071153640747},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.1812913715839386},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.06165573000907898}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8193331956863403},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7385480999946594},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.6774066686630249},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.5320390462875366},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5173768401145935},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.4754345417022705},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.4678289294242859},{"id":"https://openalex.org/C47318570","wikidata":"https://www.wikidata.org/wiki/Q8026863","display_name":"Wireless Routing Protocol","level":4,"score":0.4660419523715973},{"id":"https://openalex.org/C204948658","wikidata":"https://www.wikidata.org/wiki/Q1119410","display_name":"Static routing","level":4,"score":0.455983430147171},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.4437929689884186},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4371621310710907},{"id":"https://openalex.org/C196423136","wikidata":"https://www.wikidata.org/wiki/Q7209671","display_name":"Policy-based routing","level":5,"score":0.42421793937683105},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3640071153640747},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.1812913715839386},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.06165573000907898},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aiccsa.2014.7073179","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2014.7073179","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1540318406","https://openalex.org/W2034419870","https://openalex.org/W2075395906","https://openalex.org/W2085640867","https://openalex.org/W2090513801","https://openalex.org/W2122744359","https://openalex.org/W2127699957","https://openalex.org/W2138929230","https://openalex.org/W2142957722","https://openalex.org/W2157547711","https://openalex.org/W2160203360","https://openalex.org/W2225751409","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W1997091564","https://openalex.org/W2102655743","https://openalex.org/W2607223747","https://openalex.org/W2081964190","https://openalex.org/W2082566976","https://openalex.org/W2012247215","https://openalex.org/W3193458326","https://openalex.org/W2117123509","https://openalex.org/W2372626604","https://openalex.org/W2740434786"],"abstract_inverted_index":{"Distributed":[0],"wireless":[1],"networks":[2,14],"have":[3],"become":[4],"popular":[5],"due":[6],"to":[7,19,52,75,112,114],"the":[8,11,31,45,139,142,161,182,189],"evolution":[9],"of":[10,33,39,59,102,127,141,160,167],"Internet-of-Things.":[12],"These":[13],"utilize":[15],"ad-hoc":[16],"routing":[17,46,73,78,148,191],"protocols":[18,50,74],"interconnecting":[20],"all":[21],"nodes.":[22],"Each":[23],"peer":[24],"forwards":[25],"data":[26],"for":[27,95,145,158],"other":[28],"nodes":[29,55],"on":[30],"basis":[32],"network":[34],"connectivity":[35],"and":[36,61,66,89,92,118,132,155,171,185],"a":[37,87,153,164],"set":[38],"conventions":[40],"that":[41],"is":[42,100,179,186],"determined":[43],"by":[44],"protocol.":[47,192],"Still,":[48],"these":[49],"fail":[51],"protect":[53],"legitimate":[54],"against":[56],"several":[57],"types":[58],"selfish":[60],"malicious":[62],"activity.":[63],"Thus,":[64,150],"trust":[65,91,170],"reputation":[67,172],"schemes":[68,173],"are":[69],"integrated":[70,187],"with":[71,188],"pure":[72],"provide":[76],"secure":[77,96,147],"functionality.":[79],"In":[80],"this":[81],"paper":[82],"we":[83,151],"propose":[84],"ModConTR":[85,178],"-":[86],"modular":[88],"adaptable":[90],"reputation-based":[93],"system":[94,99],"routing.":[97],"The":[98],"composed":[101],"11":[103],"different":[104],"components":[105],"which":[106],"can":[107],"be":[108],"configured":[109],"at":[110],"runtime":[111],"adjust":[113],"each":[115,159],"application's":[116],"security":[117,154],"performance":[119,156],"requirements.":[120],"Presented":[121],"work":[122],"includes":[123],"three":[124],"possible":[125],"configurations":[126,137],"ModConTR,":[128],"considering":[129],"ultra-lightweight,":[130],"low-cost":[131],"lightweight":[133],"implementations.":[134],"Moreover,":[135],"predefined":[136],"permit":[138],"implementation":[140],"reasoning":[143],"process":[144],"well-known":[146],"protocols.":[149],"present":[152],"analysis":[157,166],"components,":[162],"including":[163],"comparative":[165],"10":[168],"complete":[169],"under":[174],"identical":[175],"attack":[176],"scenarios.":[177],"implemented":[180],"using":[181],"NS2":[183],"simulator":[184],"DSR":[190]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
