{"id":"https://openalex.org/W2527132424","doi":"https://doi.org/10.1109/iwcmc.2016.7577025","title":"A security framework for content retrieval in DTNs","display_name":"A security framework for content retrieval in DTNs","publication_year":2016,"publication_date":"2016-09-01","ids":{"openalex":"https://openalex.org/W2527132424","doi":"https://doi.org/10.1109/iwcmc.2016.7577025","mag":"2527132424"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2016.7577025","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2016.7577025","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059113260","display_name":"Tuan Le","orcid":"https://orcid.org/0000-0002-9683-0185"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Tuan Le","raw_affiliation_strings":["Dept. of Computer Science, UCLA, Los Angeles, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, UCLA, Los Angeles, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059529956","display_name":"M\u00e1rio Gerla","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mario Gerla","raw_affiliation_strings":["Dept. of Computer Science, UCLA, Los Angeles, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, UCLA, Los Angeles, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5059113260"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5828,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.72607188,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"7","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blacklist","display_name":"Blacklist","score":0.8881040811538696},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.824198842048645},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7726317048072815},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.7046593427658081},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6964434385299683},{"id":"https://openalex.org/keywords/content-delivery","display_name":"Content delivery","score":0.666896641254425},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49694254994392395},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.46569737792015076},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.454372376203537},{"id":"https://openalex.org/keywords/mobile-social-network","display_name":"Mobile social network","score":0.4512667655944824},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.22748911380767822}],"concepts":[{"id":"https://openalex.org/C2781345505","wikidata":"https://www.wikidata.org/wiki/Q2535979","display_name":"Blacklist","level":2,"score":0.8881040811538696},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.824198842048645},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7726317048072815},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.7046593427658081},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6964434385299683},{"id":"https://openalex.org/C2986847828","wikidata":"https://www.wikidata.org/wiki/Q269415","display_name":"Content delivery","level":2,"score":0.666896641254425},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49694254994392395},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.46569737792015076},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.454372376203537},{"id":"https://openalex.org/C2780228002","wikidata":"https://www.wikidata.org/wiki/Q2059727","display_name":"Mobile social network","level":3,"score":0.4512667655944824},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.22748911380767822},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc.2016.7577025","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2016.7577025","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6700000166893005,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1567583825","https://openalex.org/W1630733292","https://openalex.org/W1813354035","https://openalex.org/W1974942795","https://openalex.org/W2027162788","https://openalex.org/W2054973775","https://openalex.org/W2069929443","https://openalex.org/W2082540700","https://openalex.org/W2109094293","https://openalex.org/W2109382821","https://openalex.org/W2109505558","https://openalex.org/W2112316694","https://openalex.org/W2161160262","https://openalex.org/W2170648111","https://openalex.org/W4234068324","https://openalex.org/W6638589518"],"related_works":["https://openalex.org/W3172840274","https://openalex.org/W50122730","https://openalex.org/W2245533262","https://openalex.org/W3129811130","https://openalex.org/W2265547225","https://openalex.org/W2334468507","https://openalex.org/W2527132424","https://openalex.org/W1999930389","https://openalex.org/W1994787131","https://openalex.org/W2156956236"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,101,149],"address":[4,98],"several":[5],"security":[6],"issues":[7],"in":[8],"our":[9,183],"previously":[10],"proposed":[11],"content":[12,21,35,94,109,197],"retrieval":[13,22,95,198],"scheme":[14,184],"for":[15,32,55],"Disruption":[16],"Tolerant":[17],"Networks":[18],"(DTNs).":[19],"The":[20,118,130],"is":[23,142],"built":[24],"upon":[25],"the":[26,63,90,93,99,127,135,196],"social-tie":[27,47,106,120,128],"relationships":[28],"among":[29],"DTN":[30],"nodes":[31,40,124,157,162,188],"routing":[33],"and":[34,51,61,65,85,108,189],"lookup":[36],"service":[37],"placement.":[38],"Malicious":[39],"can":[41,185],"launch":[42],"attacks":[43],"by":[44],"advertising":[45],"falsified":[46],"information":[48],"to":[49,74,78,89,103,158,174],"attract":[50],"drop":[52],"packets":[53,80],"intended":[54],"other":[56],"nodes,":[57,70],"or":[58],"simply":[59],"disrupt":[60],"destroy":[62],"query":[64],"delivery":[66,110,131],"paths.":[67],"Furthermore,":[68],"selfish":[69,86,146],"while":[71],"not":[72],"seeking":[73],"attack,":[75],"are":[76],"unwilling":[77],"forward":[79],"of":[81,92,139],"others.":[82],"Both":[83],"malicious":[84,123],"behaviors":[87],"contribute":[88],"deterioration":[91],"performance.":[96,199],"To":[97],"problem,":[100],"propose":[102,150],"secure":[104],"both":[105],"records":[107,111,121,132],"during":[112],"a":[113,140,151],"contact":[114,166],"between":[115],"two":[116],"nodes.":[117,176],"unforgeable":[119],"prevent":[122],"from":[125,133,163,172],"falsifying":[126],"information.":[129],"which":[134],"packet":[136],"forwarding":[137],"ratio":[138],"node":[141],"computed,":[143],"help":[144],"detect":[145,186],"behavior.":[147],"Lastly,":[148],"blacklist":[152],"distribution":[153],"method":[154],"that":[155,182],"allows":[156],"filter":[159],"out":[160],"misbehaving":[161,175,187],"their":[164,191],"social":[165],"graph,":[167],"effectively":[168],"preventing":[169],"network":[170],"traffic":[171],"flowing":[173],"Extensive":[177],"real-trace-driven":[178],"simulation":[179],"results":[180],"show":[181],"mitigate":[190],"effects":[192],"efficiently,":[193],"thus":[194],"improving":[195]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
