{"id":"https://openalex.org/W2959072031","doi":"https://doi.org/10.1109/icc.2019.8761504","title":"Trust-Based DoS Mitigation Technique for Medical Implants in Wireless Body Area Networks","display_name":"Trust-Based DoS Mitigation Technique for Medical Implants in Wireless Body Area Networks","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2959072031","doi":"https://doi.org/10.1109/icc.2019.8761504","mag":"2959072031"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2019.8761504","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761504","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083405389","display_name":"Muhammad Usman","orcid":null},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Muhammad Usman","raw_affiliation_strings":["Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University (HBKU), Education City, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University (HBKU), Education City, Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074245801","display_name":"Muhammad Rizwan Asghar","orcid":"https://orcid.org/0000-0002-9607-376X"},"institutions":[{"id":"https://openalex.org/I154130895","display_name":"University of Auckland","ror":"https://ror.org/03b94tp07","country_code":"NZ","type":"education","lineage":["https://openalex.org/I154130895"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Muhammad Rizwan Asghar","raw_affiliation_strings":["Department of Computer Science, The University of Auckland, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Auckland, Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027144149","display_name":"Imran Shafique Ansari","orcid":"https://orcid.org/0000-0001-8461-6547"},"institutions":[{"id":"https://openalex.org/I7882870","display_name":"University of Glasgow","ror":"https://ror.org/00vtgdb53","country_code":"GB","type":"education","lineage":["https://openalex.org/I7882870"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Imran Shafique Ansari","raw_affiliation_strings":["School of Engineering, University of Glasgow, UK"],"affiliations":[{"raw_affiliation_string":"School of Engineering, University of Glasgow, UK","institution_ids":["https://openalex.org/I7882870"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076657886","display_name":"Fabrizio Granelli","orcid":"https://orcid.org/0000-0002-2439-277X"},"institutions":[{"id":"https://openalex.org/I193223587","display_name":"University of Trento","ror":"https://ror.org/05trd4x28","country_code":"IT","type":"education","lineage":["https://openalex.org/I193223587"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Fabrizio Granelli","raw_affiliation_strings":["Universita degli Studi di Trento, Trento, Trentino-Alto Adige, IT"],"affiliations":[{"raw_affiliation_string":"Universita degli Studi di Trento, Trento, Trentino-Alto Adige, IT","institution_ids":["https://openalex.org/I193223587"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010196813","display_name":"Marwa Qaraqe","orcid":"https://orcid.org/0000-0003-0767-2478"},"institutions":[{"id":"https://openalex.org/I193223587","display_name":"University of Trento","ror":"https://ror.org/05trd4x28","country_code":"IT","type":"education","lineage":["https://openalex.org/I193223587"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Marwa Qaraqe","raw_affiliation_strings":["Department of Information Engineering and Computer Science, University of Trento, Trento, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering and Computer Science, University of Trento, Trento, Italy","institution_ids":["https://openalex.org/I193223587"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5083405389"],"corresponding_institution_ids":["https://openalex.org/I4210144839"],"apc_list":null,"apc_paid":null,"fwci":0.8968,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.72158824,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13052","display_name":"Molecular Communication and Nanonetworks","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/body-area-network","display_name":"Body area network","score":0.7260029315948486},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6787571310997009},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6569995880126953},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5463510155677795},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5335835218429565},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5198160409927368},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46204206347465515},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4478708505630493},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.3474544882774353},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.14800414443016052},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1299135684967041},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.08202984929084778},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.081451416015625}],"concepts":[{"id":"https://openalex.org/C88737568","wikidata":"https://www.wikidata.org/wiki/Q890056","display_name":"Body area network","level":3,"score":0.7260029315948486},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6787571310997009},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6569995880126953},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5463510155677795},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5335835218429565},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5198160409927368},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46204206347465515},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4478708505630493},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.3474544882774353},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14800414443016052},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1299135684967041},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.08202984929084778},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.081451416015625},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icc.2019.8761504","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761504","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},{"id":"pmh:oai:researchonline.gcu.ac.uk:openaire_cris_publications/e7dcb498-4ce9-4cdc-9a6f-550b413a2cf2","is_oa":false,"landing_page_url":"https://researchonline.gcu.ac.uk/en/publications/e7dcb498-4ce9-4cdc-9a6f-550b413a2cf2","pdf_url":null,"source":{"id":"https://openalex.org/S4306402566","display_name":"ResearchOnline (Glasgow Caledonian University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I195939026","host_organization_name":"Glasgow Caledonian University","host_organization_lineage":["https://openalex.org/I195939026"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Usman , M , Asghar , M R , Ansari , I S , Granelli , F &amp; Qaraqe , M 2019 , Trust-based DoS mitigation technique for medical implants in wireless body area networks . in 2019 IEEE International Conference on Communications (ICC) . IEEE International Conference on Communications , vol. 2019-May , Institute of Electrical and Electronics Engineers Inc. , 2019 IEEE International Conference on Communications , Shanghai , China , 20/05/19 . https://doi.org/10.1109/ICC.2019.8761504","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Life below water","score":0.5699999928474426,"id":"https://metadata.un.org/sdg/14"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1523228572","https://openalex.org/W1986958759","https://openalex.org/W1992699253","https://openalex.org/W2064800378","https://openalex.org/W2065043957","https://openalex.org/W2076264348","https://openalex.org/W2090766960","https://openalex.org/W2105403832","https://openalex.org/W2141136786","https://openalex.org/W2142100695","https://openalex.org/W2142882457","https://openalex.org/W2143472559","https://openalex.org/W2201009198","https://openalex.org/W2219995598","https://openalex.org/W2326481203","https://openalex.org/W2496345498","https://openalex.org/W2496853399","https://openalex.org/W2739692131","https://openalex.org/W2883798712","https://openalex.org/W2895432812"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2397688129","https://openalex.org/W2018522155"],"abstract_inverted_index":{"Medical":[0,104],"implants":[1,49,74,83],"are":[2,28,64],"an":[3,14],"important":[4,15],"part":[5],"of":[6,40,61,65,80,87,128],"Wireless":[7],"Body":[8],"Area":[9],"Networks":[10],"(WBANs)":[11],"and":[12,20,35,53,59,124],"play":[13],"role":[16],"to":[17,33,98,133],"monitor,":[18],"diagnose,":[19],"control":[21],"various":[22,37],"medical":[23,73,82],"conditions.":[24],"These":[25],"tiny":[26],"sensors":[27],"injected":[29],"inside":[30],"human":[31,42],"body":[32],"measure":[34],"communicate":[36],"vital":[38],"signs":[39],"a":[41,85,96,112,117,126],"body.":[43],"Since":[44],"the":[45,78,81,103],"information":[46,63],"transmitted":[47],"by":[48],"is":[50,84],"very":[51],"sensitive":[52],"critical":[54],"in":[55,72,102,147],"nature,":[56],"both":[57],"availability":[58,79],"confidentiality":[60],"such":[62],"prime":[66],"importance.":[67],"A":[68],"possible":[69],"security":[70],"threat":[71],"that":[75,140],"can":[76,143],"breach":[77],"Denial":[86],"Service":[88,107],"(DoS)":[89],"attack.":[90],"In":[91],"this":[92],"work,":[93],"we":[94],"propose":[95,111],"solution":[97],"mitigate":[99],"DoS":[100,141],"attack":[101],"Implant":[105],"Communication":[106],"(MICS)":[108],"network.":[109],"We":[110],"three-level":[113],"trust":[114],"model":[115],"for":[116],"MICS":[118,149],"network":[119],"based":[120],"on":[121],"its":[122],"environment":[123],"couple":[125],"threshold":[127],"maximum":[129],"allowed":[130],"data":[131],"rate":[132],"each":[134],"environment.":[135],"The":[136],"simulation":[137],"results":[138],"show":[139],"attacks":[142],"be":[144],"seamlessly":[145],"mitigated":[146],"many":[148],"settings.":[150]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
