{"id":"https://openalex.org/W1542089994","doi":"https://doi.org/10.1109/icsmc.2003.1244370","title":"Architecture of the mobile ad-hoc network security (MANS) system","display_name":"Architecture of the mobile ad-hoc network security (MANS) system","publication_year":2004,"publication_date":"2004-04-23","ids":{"openalex":"https://openalex.org/W1542089994","doi":"https://doi.org/10.1109/icsmc.2003.1244370","mag":"1542089994"},"language":"en","primary_location":{"id":"doi:10.1109/icsmc.2003.1244370","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsmc.2003.1244370","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087932443","display_name":"C.N. Manikopoulos","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"C. Manikopoulos","raw_affiliation_strings":["CONEX Laboratory, NJWINS Center, ECE Department, NJIT, University Heights, Newark, NJ, USA","Dept. of Electr. & Comput. Eng., NJWINS Center, Newark, CA, USA"],"affiliations":[{"raw_affiliation_string":"CONEX Laboratory, NJWINS Center, ECE Department, NJIT, University Heights, Newark, NJ, USA","institution_ids":[]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., NJWINS Center, Newark, CA, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100435341","display_name":"Ling Li","orcid":"https://orcid.org/0000-0002-3338-8756"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li Ling","raw_affiliation_strings":["CONEX Laboratory, NJWINS Center, ECE Department, NJIT, University Heights, Newark, NJ, USA","Dept. of Electr. & Comput. Eng., NJWINS Center, Newark, CA, USA"],"affiliations":[{"raw_affiliation_string":"CONEX Laboratory, NJWINS Center, ECE Department, NJIT, University Heights, Newark, NJ, USA","institution_ids":[]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., NJWINS Center, Newark, CA, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087932443"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.1588,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.82084461,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"4","issue":null,"first_page":"3122","last_page":"3127"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8246046304702759},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.7037572860717773},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.6767536401748657},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6167435646057129},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.603069007396698},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6000970602035522},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.530734121799469},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.4458999037742615},{"id":"https://openalex.org/keywords/voting","display_name":"Voting","score":0.42984163761138916},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34459203481674194},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1393728256225586},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.12727290391921997},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.11406821012496948},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07741260528564453},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07740005850791931}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8246046304702759},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.7037572860717773},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.6767536401748657},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6167435646057129},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.603069007396698},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6000970602035522},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.530734121799469},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.4458999037742615},{"id":"https://openalex.org/C520049643","wikidata":"https://www.wikidata.org/wiki/Q189760","display_name":"Voting","level":3,"score":0.42984163761138916},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34459203481674194},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1393728256225586},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.12727290391921997},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.11406821012496948},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07741260528564453},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07740005850791931},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsmc.2003.1244370","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsmc.2003.1244370","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2036358294","https://openalex.org/W2068310911","https://openalex.org/W2069519268","https://openalex.org/W2142091051","https://openalex.org/W2158923961","https://openalex.org/W4236287335","https://openalex.org/W6683246877"],"related_works":["https://openalex.org/W3035283282","https://openalex.org/W2768875466","https://openalex.org/W1591014886","https://openalex.org/W2551975114","https://openalex.org/W2025838880","https://openalex.org/W1511473871","https://openalex.org/W1581687089","https://openalex.org/W2003275014","https://openalex.org/W4210799434","https://openalex.org/W2282175249"],"abstract_inverted_index":{"This":[0,65],"paper":[1],"investigates":[2],"the":[3,6,46,106,123,128,154,173],"architecture":[4],"of":[5,48,130,140,183],"mobile":[7,19],"ad-hoc":[8,20],"network":[9],"security":[10,17,37,43,72,107],"(MANS),":[11],"a":[12,27,41,61,68,85,141,161],"novel":[13],"system":[14],"that":[15,33,74,139,151],"provides":[16],"to":[18,165,171],"networks":[21],"(MANETs).":[22],"MANET":[23],"nodes":[24],"operate":[25],"in":[26,104],"decentralized":[28,70],"\"trust":[29],"no":[30],"peer\"":[31],"mode":[32],"complicates":[34],"and":[35,52,95,113,175],"inhibits":[36],"services,":[38],"thus":[39,176],"creating":[40],"formidable":[42],"challenge.":[44],"Here":[45],"design":[47],"MANS":[49,57,82,115,152,169],"is":[50,55,58,75,149],"presented":[51,125],"its":[53,184],"performance":[54],"investigated.":[56],"based":[59],"on":[60],"\"neighborhood":[62],"watch\"":[63],"concept.":[64],"approach":[66],"builds":[67],"fully":[69],"scalable":[71],"policy":[73],"law-governed":[76],"globally":[77],"using":[78],"only":[79,160],"local":[80,86],"actions.":[81],"formally":[83],"prescribes":[84],"collaborative":[87],"group":[88],"function":[89],"by":[90],"defining":[91],"neighborhoods,":[92],"their":[93],"states":[94],"neighborhood-wide":[96],"majority":[97],"voting":[98],"decisions.":[99],"It":[100],"utilizes":[101],"these":[102],"concepts":[103],"developing":[105],"recovery":[108],"policy,":[109],"including":[110],"specification,":[111],"implementation,":[112],"enforcement.":[114],"has":[116],"been":[117],"tested":[118],"successfully":[119],"with":[120],"simulation":[121],"experiments;":[122],"results":[124],"here":[126],"cover":[127],"case":[129],"an":[131],"attacked":[132,155],"but":[133],"honest":[134],"node":[135,174],"as":[136,138],"well":[137],"compromised":[142,157],"dishonest":[143],"node.":[144],"In":[145],"both":[146],"cases,":[147],"it":[148],"shown":[150],"identifies":[153],"and/or":[156],"node,":[158],"requiring":[159],"modest":[162],"size":[163],"neighborhood":[164],"accomplish":[166],"it.":[167],"Then,":[168],"acts":[170],"isolate":[172],"avoid":[177],"or":[178],"minimize":[179],"any":[180],"adverse":[181],"impact":[182],"compromise.":[185]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
