{"id":"https://openalex.org/W2761037016","doi":"https://doi.org/10.1109/infocom.2017.8057110","title":"Contact avoidance routing in delay tolerant networks","display_name":"Contact avoidance routing in delay tolerant networks","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2761037016","doi":"https://doi.org/10.1109/infocom.2017.8057110","mag":"2761037016"},"language":"en","primary_location":{"id":"doi:10.1109/infocom.2017.8057110","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2017.8057110","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2017 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034602406","display_name":"Osuki Tomoya","orcid":null},"institutions":[{"id":"https://openalex.org/I69740276","display_name":"Tokyo Metropolitan University","ror":"https://ror.org/00ws30h19","country_code":"JP","type":"education","lineage":["https://openalex.org/I69740276"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Tomoya Osuki","raw_affiliation_strings":["Department of Information and Communication Systems, Tokyo Metropolitan University, Hino, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Systems, Tokyo Metropolitan University, Hino, Tokyo, Japan","institution_ids":["https://openalex.org/I69740276"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102709220","display_name":"Kazuya Sakai","orcid":"https://orcid.org/0000-0003-3929-2533"},"institutions":[{"id":"https://openalex.org/I69740276","display_name":"Tokyo Metropolitan University","ror":"https://ror.org/00ws30h19","country_code":"JP","type":"education","lineage":["https://openalex.org/I69740276"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kazuya Sakai","raw_affiliation_strings":["Department of Information and Communication Systems, Tokyo Metropolitan University, Hino, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Systems, Tokyo Metropolitan University, Hino, Tokyo, Japan","institution_ids":["https://openalex.org/I69740276"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084127116","display_name":"Satoshi Fukumoto","orcid":"https://orcid.org/0000-0002-5025-6552"},"institutions":[{"id":"https://openalex.org/I69740276","display_name":"Tokyo Metropolitan University","ror":"https://ror.org/00ws30h19","country_code":"JP","type":"education","lineage":["https://openalex.org/I69740276"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Satoshi Fukumoto","raw_affiliation_strings":["Department of Information and Communication Systems, Tokyo Metropolitan University, Hino, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Systems, Tokyo Metropolitan University, Hino, Tokyo, Japan","institution_ids":["https://openalex.org/I69740276"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034602406"],"corresponding_institution_ids":["https://openalex.org/I69740276"],"apc_list":null,"apc_paid":null,"fwci":1.036,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.80323235,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7642440795898438},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7164600491523743},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.6408654451370239},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.532146155834198},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.5215118527412415},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5112266540527344},{"id":"https://openalex.org/keywords/delay-tolerant-networking","display_name":"Delay-tolerant networking","score":0.4843517541885376},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.45012804865837097},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38983118534088135},{"id":"https://openalex.org/keywords/wireless-routing-protocol","display_name":"Wireless Routing Protocol","score":0.19371438026428223},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13720089197158813}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7642440795898438},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7164600491523743},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.6408654451370239},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.532146155834198},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.5215118527412415},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5112266540527344},{"id":"https://openalex.org/C53264328","wikidata":"https://www.wikidata.org/wiki/Q55320","display_name":"Delay-tolerant networking","level":5,"score":0.4843517541885376},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.45012804865837097},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38983118534088135},{"id":"https://openalex.org/C47318570","wikidata":"https://www.wikidata.org/wiki/Q8026863","display_name":"Wireless Routing Protocol","level":4,"score":0.19371438026428223},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13720089197158813},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom.2017.8057110","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2017.8057110","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2017 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1531914496","https://openalex.org/W1572481965","https://openalex.org/W1966518282","https://openalex.org/W1974942795","https://openalex.org/W1994584977","https://openalex.org/W2028922670","https://openalex.org/W2038690836","https://openalex.org/W2068273572","https://openalex.org/W2077259008","https://openalex.org/W2081411782","https://openalex.org/W2109505558","https://openalex.org/W2118518442","https://openalex.org/W2125957038","https://openalex.org/W2133255965","https://openalex.org/W2133540137","https://openalex.org/W2137337560","https://openalex.org/W2147299857","https://openalex.org/W2162076967","https://openalex.org/W2294038694","https://openalex.org/W2339403638","https://openalex.org/W2509730577","https://openalex.org/W3162914541","https://openalex.org/W3200493159"],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W4242235492","https://openalex.org/W4237162029","https://openalex.org/W2367268135","https://openalex.org/W2385701518","https://openalex.org/W4376136918","https://openalex.org/W2981698663","https://openalex.org/W1994511795","https://openalex.org/W2938528237","https://openalex.org/W2900704462"],"abstract_inverted_index":{"Delay":[0],"tolerant":[1],"networks":[2],"(DTNs)":[3],"are":[4,158],"widely":[5],"adopted":[6],"to":[7,36,83,126,131,148],"many":[8],"network":[9,20,151],"applications,":[10],"such":[11],"as":[12,166,168],"disaster":[13],"recovery":[14],"and":[15,111,176],"battlefield":[16],"communications.":[17],"Such":[18],"critical":[19],"scenarios":[21],"call":[22],"for":[23],"an":[24,89,144],"outright":[25],"prevention":[26],"mechanism":[27],"against":[28,57,134],"contact-based":[29,58,136],"attacks,":[30],"e.g.,":[31],"blackmailing":[32],"a":[33,41,80,86,120,129],"legitimate":[34],"user":[35],"compromise":[37,137],"sensitive":[38],"information":[39],"at":[40],"contact.":[42],"To":[43],"the":[44,69,77,93,98,105,109,112,135,154,173],"best":[45],"of":[46,71,114,156],"our":[47],"knowledge,":[48],"there":[49],"is":[50],"no":[51],"work":[52],"on":[53],"secure":[54,99],"routing":[55,123],"protocol":[56,125],"attacks":[59],"in":[60,63,75],"DTNs.":[61],"Therefore,":[62],"this":[64],"paper,":[65],"we":[66,96,118,141],"first":[67],"formulate":[68],"problem":[70],"contact":[72,87,121],"avoidance":[73,122],"routing,":[74],"which":[76,103],"node":[78],"holding":[79],"message":[81,130],"tries":[82],"avoid":[84],"having":[85],"with":[88],"adversary.":[90],"By":[91],"applying":[92],"phase-type":[94],"distribution,":[95],"build":[97],"opportunistic":[100,115],"path":[101],"model,":[102],"integrates":[104],"delivery":[106],"probability":[107],"within":[108],"deadline":[110],"safety":[113],"paths.":[116],"Then,":[117],"propose":[119,143],"(CAR)":[124],"securely":[127],"deliver":[128],"its":[132],"destination":[133],"attack.":[138],"In":[139],"addition,":[140],"further":[142],"adaptive":[145],"CAR":[146,175],"(A-CAR)":[147],"accommodate":[149],"complicated":[150],"scenarios,":[152],"where":[153],"capabilities":[155],"adversaries":[157],"parameterized.":[159],"The":[160],"extensive":[161],"simulations":[162],"using":[163],"real":[164],"traces":[165],"well":[167],"random":[169],"graphs":[170],"demonstrate":[171],"that":[172],"proposed":[174],"A-CAR":[177],"protocols":[178],"achieve":[179],"their":[180],"design":[181],"goals.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
