{"id":"https://openalex.org/W2729500655","doi":"https://doi.org/10.1109/icis.2017.7959961","title":"A secure contact protocol for delay tolerant networks","display_name":"A secure contact protocol for delay tolerant networks","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2729500655","doi":"https://doi.org/10.1109/icis.2017.7959961","mag":"2729500655"},"language":"en","primary_location":{"id":"doi:10.1109/icis.2017.7959961","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icis.2017.7959961","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111966460","display_name":"Manghui Tu","orcid":null},"institutions":[{"id":"https://openalex.org/I117015748","display_name":"Purdue University Northwest","ror":"https://ror.org/04keq6987","country_code":"US","type":"education","lineage":["https://openalex.org/I117015748"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Manghui Tu","raw_affiliation_strings":["Dept. Computer Information Technology & Graphics, Purdue University Northwest, Hammond, IN, USA"],"affiliations":[{"raw_affiliation_string":"Dept. Computer Information Technology & Graphics, Purdue University Northwest, Hammond, IN, USA","institution_ids":["https://openalex.org/I117015748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037380467","display_name":"Kyle W. Riordan","orcid":null},"institutions":[{"id":"https://openalex.org/I117015748","display_name":"Purdue University Northwest","ror":"https://ror.org/04keq6987","country_code":"US","type":"education","lineage":["https://openalex.org/I117015748"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kyle W. Riordan","raw_affiliation_strings":["Dept. Computer Information Technology & Graphics, Purdue University Northwest, Hammond, IN, USA"],"affiliations":[{"raw_affiliation_string":"Dept. Computer Information Technology & Graphics, Purdue University Northwest, Hammond, IN, USA","institution_ids":["https://openalex.org/I117015748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090983261","display_name":"Geyang Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I117015748","display_name":"Purdue University Northwest","ror":"https://ror.org/04keq6987","country_code":"US","type":"education","lineage":["https://openalex.org/I117015748"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Geyang Xie","raw_affiliation_strings":["Dept. Computer Information Technology & Graphics, Purdue University Northwest, Hammond, IN, USA"],"affiliations":[{"raw_affiliation_string":"Dept. Computer Information Technology & Graphics, Purdue University Northwest, Hammond, IN, USA","institution_ids":["https://openalex.org/I117015748"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025361199","display_name":"Shuhui Yang","orcid":"https://orcid.org/0000-0002-1263-433X"},"institutions":[{"id":"https://openalex.org/I117015748","display_name":"Purdue University Northwest","ror":"https://ror.org/04keq6987","country_code":"US","type":"education","lineage":["https://openalex.org/I117015748"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shuhui Yang","raw_affiliation_strings":["Dept. Computer Information Technology & Graphics, Purdue University Northwest, Hammond, IN, USA"],"affiliations":[{"raw_affiliation_string":"Dept. Computer Information Technology & Graphics, Purdue University Northwest, Hammond, IN, USA","institution_ids":["https://openalex.org/I117015748"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5111966460"],"corresponding_institution_ids":["https://openalex.org/I117015748"],"apc_list":null,"apc_paid":null,"fwci":0.4144,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.64987508,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2","issue":null,"first_page":"5","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9829999804496765,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9796000123023987,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7245489358901978},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7179716229438782},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6701229214668274},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6574999690055847},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6217505931854248},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5921005606651306},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.489655077457428},{"id":"https://openalex.org/keywords/delay-tolerant-networking","display_name":"Delay-tolerant networking","score":0.46519243717193604},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.41557157039642334},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.23008546233177185},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.18221482634544373}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7245489358901978},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7179716229438782},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6701229214668274},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6574999690055847},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6217505931854248},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5921005606651306},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.489655077457428},{"id":"https://openalex.org/C53264328","wikidata":"https://www.wikidata.org/wiki/Q55320","display_name":"Delay-tolerant networking","level":5,"score":0.46519243717193604},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.41557157039642334},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.23008546233177185},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.18221482634544373},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icis.2017.7959961","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icis.2017.7959961","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/3","score":0.8199999928474426,"display_name":"Good health and well-being"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1965396227","https://openalex.org/W1998067213","https://openalex.org/W2061065101","https://openalex.org/W2082674813","https://openalex.org/W2115779849","https://openalex.org/W2135385341","https://openalex.org/W2155984879","https://openalex.org/W2331451535"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W4386482731"],"abstract_inverted_index":{"Current":[0],"DTN":[1,15,31,73,117,126],"systems":[2,32],"are":[3,58,137],"vulnerable":[4],"to":[5,52,67,101,111,139],"malicious":[6],"attacks":[7],"by":[8,71],"compromised":[9],"nodes":[10,20],"taking":[11],"advantage":[12],"of":[13,40,47,63,87],"the":[14,24,38,88,98],"protocols":[16],"that":[17],"control":[18],"how":[19],"join":[21],"and":[22,43,45,54,76,79,95,105,135],"leave":[23],"backbone.":[25],"Without":[26],"addressing":[27],"such":[28,113],"security":[29],"issues,":[30],"could":[33],"result":[34],"in":[35,116],"performance":[36],"degrade,":[37],"compromise":[39],"message":[41],"confidentiality":[42],"integrity,":[44],"denial":[46],"service.":[48],"Thus,":[49],"effective":[50],"mechanisms":[51],"identify":[53,97],"fix":[55],"this":[56,64],"vulnerability":[57],"urgently":[59],"needed.":[60],"The":[61],"objective":[62],"research":[65],"is":[66,123],"address":[68],"these":[69],"issues":[70],"identifying":[72],"system":[74,102],"vulnerabilities":[75,86],"potential":[77,81,99],"threats,":[78],"providing":[80],"countermeasures.":[82],"We":[83],"first":[84],"illustrate":[85],"epidemic":[89,129],"based":[90,130],"contact":[91,121,131],"history":[92,132],"propagation":[93,133],"protocol":[94,122,134],"then":[96],"threats":[100,114],"performance,":[103],"availability,":[104],"integrity":[106],"as":[107,109],"well":[108],"countermeasures":[110],"prevent":[112],"existing":[115],"networks.":[118],"A":[119],"secure":[120],"developed":[124],"for":[125],"network":[127],"with":[128],"simulations":[136],"conducted":[138],"assess":[140],"its":[141],"effectiveness":[142],"on":[143],"attack":[144],"detection.":[145]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
