{"id":"https://openalex.org/W4400727165","doi":"https://doi.org/10.1109/iwcmc61514.2024.10592503","title":"A Hierarchical PoW-Powered Access Mechanism for Shuffling-Based Moving Target Defense System","display_name":"A Hierarchical PoW-Powered Access Mechanism for Shuffling-Based Moving Target Defense System","publication_year":2024,"publication_date":"2024-05-27","ids":{"openalex":"https://openalex.org/W4400727165","doi":"https://doi.org/10.1109/iwcmc61514.2024.10592503"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc61514.2024.10592503","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwcmc61514.2024.10592503","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113292447","display_name":"Zeyuan Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I4392021250","display_name":"State Key Laboratory of Networking and Switching Technology","ror":"https://ror.org/00qtv5q45","country_code":null,"type":"facility","lineage":["https://openalex.org/I139759216","https://openalex.org/I4392021250"]},{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zeyuan Guo","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology,Beijing,China,100876"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology,Beijing,China,100876","institution_ids":["https://openalex.org/I139759216","https://openalex.org/I4392021250"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111259842","display_name":"Changjun Ren","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I4392021250","display_name":"State Key Laboratory of Networking and Switching Technology","ror":"https://ror.org/00qtv5q45","country_code":null,"type":"facility","lineage":["https://openalex.org/I139759216","https://openalex.org/I4392021250"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changjun Ren","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology,Beijing,China,100876"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology,Beijing,China,100876","institution_ids":["https://openalex.org/I139759216","https://openalex.org/I4392021250"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101713914","display_name":"Lin Yan","orcid":"https://orcid.org/0009-0007-2586-8702"},"institutions":[{"id":"https://openalex.org/I4392021250","display_name":"State Key Laboratory of Networking and Switching Technology","ror":"https://ror.org/00qtv5q45","country_code":null,"type":"facility","lineage":["https://openalex.org/I139759216","https://openalex.org/I4392021250"]},{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Yan","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology,Beijing,China,100876"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology,Beijing,China,100876","institution_ids":["https://openalex.org/I139759216","https://openalex.org/I4392021250"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044191416","display_name":"Shujie Yang","orcid":"https://orcid.org/0000-0002-9597-2659"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I4392021250","display_name":"State Key Laboratory of Networking and Switching Technology","ror":"https://ror.org/00qtv5q45","country_code":null,"type":"facility","lineage":["https://openalex.org/I139759216","https://openalex.org/I4392021250"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shujie Yang","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology,Beijing,China,100876"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology,Beijing,China,100876","institution_ids":["https://openalex.org/I139759216","https://openalex.org/I4392021250"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110966896","display_name":"Yi Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Sun","raw_affiliation_strings":["Beijing University of Posts and Telecommunications Shenzhen Institute,Shenzhen,China,518000"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications Shenzhen Institute,Shenzhen,China,518000","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5113292447"],"corresponding_institution_ids":["https://openalex.org/I139759216","https://openalex.org/I4392021250"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08400534,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"7","issue":null,"first_page":"250","last_page":"255"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12222","display_name":"IoT-based Smart Home Systems","score":0.9670000076293945,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12222","display_name":"IoT-based Smart Home Systems","score":0.9670000076293945,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9595999717712402,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9110999703407288,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/shuffling","display_name":"Shuffling","score":0.9422045946121216},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.6923162341117859},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5902411937713623},{"id":"https://openalex.org/keywords/protection-mechanism","display_name":"Protection mechanism","score":0.4265298843383789},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33964216709136963},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1670001745223999},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.0748768150806427},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.06692743301391602},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.05792483687400818}],"concepts":[{"id":"https://openalex.org/C167927819","wikidata":"https://www.wikidata.org/wiki/Q1930567","display_name":"Shuffling","level":2,"score":0.9422045946121216},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.6923162341117859},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5902411937713623},{"id":"https://openalex.org/C2778717966","wikidata":"https://www.wikidata.org/wiki/Q4189076","display_name":"Protection mechanism","level":3,"score":0.4265298843383789},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33964216709136963},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1670001745223999},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0748768150806427},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.06692743301391602},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.05792483687400818},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc61514.2024.10592503","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwcmc61514.2024.10592503","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W75578206","https://openalex.org/W1973941703","https://openalex.org/W2041198666","https://openalex.org/W2086454935","https://openalex.org/W2801724071","https://openalex.org/W2949750931","https://openalex.org/W2984592796","https://openalex.org/W3006537789","https://openalex.org/W3043610783","https://openalex.org/W4211237290","https://openalex.org/W4213437500","https://openalex.org/W4234624150","https://openalex.org/W4283388112","https://openalex.org/W4312643771","https://openalex.org/W4313555276","https://openalex.org/W4384210192","https://openalex.org/W4391235346","https://openalex.org/W4392309441","https://openalex.org/W6603078631"],"related_works":["https://openalex.org/W2368753342","https://openalex.org/W2357327549","https://openalex.org/W2365866309","https://openalex.org/W2379406673","https://openalex.org/W2373241152","https://openalex.org/W2377238583","https://openalex.org/W2389535829","https://openalex.org/W2350752952","https://openalex.org/W2757072265","https://openalex.org/W2296102517"],"abstract_inverted_index":{"For":[0],"DDoS":[1,113],"attacks,":[2],"Moving":[3],"Target":[4],"Defense":[5],"(MTD)":[6],"has":[7],"emerged":[8],"as":[9],"a":[10,30,42,77],"promising":[11],"solution.":[12],"However,":[13],"existing":[14],"MTD":[15,45,79,92],"defense":[16,80],"systems":[17],"often":[18],"overlook":[19],"the":[20,50,54,61,87,94],"issue":[21],"of":[22,33,64,111],"user":[23,39,117],"access.":[24],"In":[25,109],"this":[26],"paper,":[27],"we":[28],"implement":[29],"hierarchical":[31],"Proof":[32],"Work":[34],"(PoW)":[35],"authentication":[36,52],"mechanism":[37,48,73,100],"for":[38,82,91],"access":[40],"in":[41],"shuffling-based":[43],"proxy-switching":[44],"system.":[46],"Our":[47],"integrates":[49],"PoW":[51,65,88],"with":[53],"proxy":[55],"cluster":[56],"architecture":[57],"and":[58,104,115],"dynamically":[59],"adjusts":[60],"difficulty":[62],"level":[63],"based":[66],"on":[67,76],"information":[68],"from":[69],"multiple":[70],"proxies.":[71],"The":[72],"was":[74],"deployed":[75],"real":[78],"system":[81],"performance":[83],"evaluation.":[84],"By":[85],"adapting":[86],"scheduling":[89],"approach":[90],"systems,":[93],"experimental":[95],"results":[96],"demonstrate":[97],"that":[98],"our":[99],"can":[101],"adapt":[102],"to":[103,123],"leverage":[105],"dynamic":[106],"network":[107],"structures.":[108],"terms":[110],"mitigating":[112],"attacks":[114],"ensuring":[116],"experience,":[118],"it":[119],"shows":[120],"improvements":[121],"compared":[122],"directly":[124],"migrating":[125],"traditional":[126],"methods.":[127]},"counts_by_year":[],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
