{"id":"https://openalex.org/W2009376866","doi":"https://doi.org/10.1109/isias.2010.5604051","title":"Two tier detection model for misbehavior of low-power nodes in virtual MIMO based wireless networks","display_name":"Two tier detection model for misbehavior of low-power nodes in virtual MIMO based wireless networks","publication_year":2010,"publication_date":"2010-08-01","ids":{"openalex":"https://openalex.org/W2009376866","doi":"https://doi.org/10.1109/isias.2010.5604051","mag":"2009376866"},"language":"en","primary_location":{"id":"doi:10.1109/isias.2010.5604051","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2010.5604051","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Information Assurance and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100355814","display_name":"Yang Liu","orcid":"https://orcid.org/0000-0002-1917-783X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yang Liu","raw_affiliation_strings":["National Engineering Laboratory of Information Content Analysis School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, China","National Engineering Lab of Information Content Analysis, School of Information Security Engineering, Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory of Information Content Analysis School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"National Engineering Lab of Information Content Analysis, School of Information Security Engineering, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101902977","display_name":"Yue Wu","orcid":"https://orcid.org/0000-0002-1929-4067"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Wu","raw_affiliation_strings":["National Engineering Laboratory of Information Content Analysis School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, China","National Engineering Lab of Information Content Analysis, School of Information Security Engineering, Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory of Information Content Analysis School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"National Engineering Lab of Information Content Analysis, School of Information Security Engineering, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102360979","display_name":"Junhua Tang","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junhua Tang","raw_affiliation_strings":["National Engineering Laboratory of Information Content Analysis School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, China","National Engineering Lab of Information Content Analysis, School of Information Security Engineering, Shanghai Jiao Tong University, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory of Information Content Analysis School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"National Engineering Lab of Information Content Analysis, School of Information Security Engineering, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100355814"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":1.11277069,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.77385198,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"4","issue":null,"first_page":"155","last_page":"160"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mimo","display_name":"MIMO","score":0.746859610080719},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7411448359489441},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.602302610874176},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5492746829986572},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.5259119272232056},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.4971216022968292},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.4928038418292999},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.45485615730285645},{"id":"https://openalex.org/keywords/energy","display_name":"Energy (signal processing)","score":0.4421883523464203},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4094543755054474},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.3619999885559082},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3391781449317932},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15276628732681274},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1397998332977295},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.12467706203460693},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.10307967662811279}],"concepts":[{"id":"https://openalex.org/C207987634","wikidata":"https://www.wikidata.org/wiki/Q176862","display_name":"MIMO","level":3,"score":0.746859610080719},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7411448359489441},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.602302610874176},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5492746829986572},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.5259119272232056},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.4971216022968292},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.4928038418292999},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.45485615730285645},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.4421883523464203},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4094543755054474},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.3619999885559082},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3391781449317932},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15276628732681274},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1397998332977295},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.12467706203460693},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.10307967662811279},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isias.2010.5604051","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2010.5604051","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Information Assurance and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.9100000262260437}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1522924819","https://openalex.org/W1807835759","https://openalex.org/W2102934991","https://openalex.org/W2129967784","https://openalex.org/W2136810841","https://openalex.org/W2145593604","https://openalex.org/W2151644457","https://openalex.org/W2152121970","https://openalex.org/W2155605081","https://openalex.org/W2160778940","https://openalex.org/W2161850939","https://openalex.org/W2165249727","https://openalex.org/W2167447263","https://openalex.org/W2544793373","https://openalex.org/W6683841474","https://openalex.org/W6729103992"],"related_works":["https://openalex.org/W2545343974","https://openalex.org/W4291895924","https://openalex.org/W1783583321","https://openalex.org/W2038397443","https://openalex.org/W2941374357","https://openalex.org/W2112785353","https://openalex.org/W2026727497","https://openalex.org/W4388520214","https://openalex.org/W2164866798","https://openalex.org/W179829755"],"abstract_inverted_index":{"MIMO":[0,11,95],"(Multiple-Input-Multiple-Output)":[1],"is":[2,130],"a":[3,62,108],"promising":[4],"structure":[5,12,24,96,116],"for":[6,16],"wireless":[7,20],"communication.":[8],"While":[9],"virtual":[10,94],"has":[13,25],"been":[14],"proposed":[15,23],"distributed":[17],"and":[18,75,97,124],"cooperative":[19],"networks,":[21],"this":[22,58,115],"also":[26],"put":[27],"additional":[28],"energy":[29,32,48],"consumption":[30],"where":[31],"stands":[33],"in":[34,93,117],"the":[35,39,53,89,100,118],"important":[36],"position.":[37],"At":[38],"same":[40],"time,":[41],"we":[42,60],"have":[43],"observed":[44],"that":[45,107],"this-problem-caused":[46],"low":[47,67,90,121],"nodes'":[49],"mibehavior":[50],"will":[51],"degrade":[52],"whole":[54],"system":[55,71,101],"efficiency.":[56,102],"In":[57],"paper,":[59],"propose":[61],"two-tier":[63],"correlation":[64],"matrix":[65],"based":[66],"power":[68,91,122],"nodes":[69],"detection":[70,126],"which":[72],"can":[73,85],"capture":[74],"mitigate":[76],"relays'":[77],"malicious":[78],"behavior":[79],"before":[80],"signal":[81],"combining.":[82],"This":[83],"mechanism":[84,127],"effectively":[86],"find":[87],"out":[88],"node":[92,123],"thus":[98],"improve":[99],"The":[103],"simulation":[104],"results":[105],"show":[106],"better":[109],"bit":[110],"error":[111],"rate":[112],"performance":[113],"of":[114,120],"presence":[119],"our":[125],"as":[128],"well":[129],"achieved.":[131]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
