{"id":"https://openalex.org/W4285813877","doi":"https://doi.org/10.1109/iwcmc55113.2022.9824151","title":"Cooperative Networking Using Passive Discovery For Dynamic Environments","display_name":"Cooperative Networking Using Passive Discovery For Dynamic Environments","publication_year":2022,"publication_date":"2022-05-30","ids":{"openalex":"https://openalex.org/W4285813877","doi":"https://doi.org/10.1109/iwcmc55113.2022.9824151"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc55113.2022.9824151","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9824151","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114026313","display_name":"Razvan Cristian Voicu","orcid":null},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Razvan Cristian Voicu","raw_affiliation_strings":["School of Electrical and Computer Engineering, Georgia Institute of Technology,Atlanta,Georgia","School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Computer Engineering, Georgia Institute of Technology,Atlanta,Georgia","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017088983","display_name":"Yusun Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yusun Chang","raw_affiliation_strings":["School of Electrical Engineering, Kennesaw State University,Atlanta,Georgia","School of Electrical Engineering, Kennesaw State University, Atlanta, Georgia"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering, Kennesaw State University,Atlanta,Georgia","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"School of Electrical Engineering, Kennesaw State University, Atlanta, Georgia","institution_ids":["https://openalex.org/I172980758"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5114026313"],"corresponding_institution_ids":["https://openalex.org/I130701444"],"apc_list":null,"apc_paid":null,"fwci":1.9448,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.86623323,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1279","last_page":"1284"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7442813515663147},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6957806944847107},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6786271333694458},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.651603639125824},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6164211630821228},{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.5200119018554688},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4835033714771271},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4757387638092041},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.4256826639175415},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34744933247566223},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3225543200969696},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.232648104429245},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19827860593795776}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7442813515663147},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6957806944847107},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6786271333694458},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.651603639125824},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6164211630821228},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.5200119018554688},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4835033714771271},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4757387638092041},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.4256826639175415},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34744933247566223},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3225543200969696},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.232648104429245},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19827860593795776},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc55113.2022.9824151","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9824151","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2002117821","https://openalex.org/W2020199432","https://openalex.org/W2070449754","https://openalex.org/W2134295053","https://openalex.org/W2168452204","https://openalex.org/W2513455534","https://openalex.org/W2595618828","https://openalex.org/W2601236274","https://openalex.org/W2771152181","https://openalex.org/W2789470429","https://openalex.org/W2795262473","https://openalex.org/W2796180369","https://openalex.org/W2937554620","https://openalex.org/W2965178788","https://openalex.org/W3011897733","https://openalex.org/W3187350759"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W4246396837","https://openalex.org/W3176240006","https://openalex.org/W3126451824","https://openalex.org/W4320018150","https://openalex.org/W2918664383","https://openalex.org/W4320855730","https://openalex.org/W3123119822","https://openalex.org/W106056076","https://openalex.org/W2135200719"],"abstract_inverted_index":{"Infrastructure":[0],"limited":[1,27],"zones":[2],"like":[3],"military":[4],"environments":[5,21],"differ":[6],"from":[7,23],"commercial":[8],"and":[9,17,35,41,62,104,128,132,135],"residential":[10],"demands":[11],"due":[12],"to":[13,28],"the":[14,45,68,74,90,111],"sensitive":[15],"applications":[16],"dynamic":[18],"environments.":[19],"Combative":[20],"suffer":[22],"many":[24],"challenges,":[25],"including":[26],"no":[29],"infrastructure":[30],"access,":[31],"rapid":[32,106],"situational":[33],"escalations,":[34],"possible":[36],"adversarial":[37],"attacks,":[38],"both":[39],"technological":[40],"physical.":[42],"Regardless":[43],"of":[44,59],"unstable":[46],"situations,":[47],"communication":[48,60,79,98],"is":[49],"a":[50,77,82],"vital":[51],"component":[52],"necessary":[53,115],"in":[54],"any":[55],"application.":[56],"A":[57],"lack":[58],"accessibility":[61],"private":[63],"transmission":[64],"can":[65],"quickly":[66],"become":[67],"adversary's":[69],"advantages.":[70],"In":[71],"previous":[72],"research,":[73],"authors":[75],"designed":[76],"cooperative":[78],"platform":[80],"executing":[81],"different":[83],"architecture":[84],"than":[85],"traditional":[86],"models,":[87],"such":[88],"as":[89],"TCP/IP":[91],"model":[92],"[1]":[93],"-":[94],"thus,":[95],"allowing":[96],"custom":[97],"implementations":[99],"for":[100,116],"additional":[101],"cybersecurity":[102],"advantages":[103],"more":[105],"deployment.":[107],"This":[108],"paper":[109],"provides":[110],"passive":[112,126],"link":[113],"detection":[114],"self-organizing":[117],"mechanisms.":[118],"The":[119],"results":[120],"depict":[121],"useable":[122],"links":[123],"developed":[124],"through":[125],"discoveries":[127],"provide":[129],"off-the-shelf":[130],"hardware":[131],"software":[133],"limitations":[134],"considerations.":[136]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
