{"id":"https://openalex.org/W2121670422","doi":"https://doi.org/10.1109/mobhoc.2007.4428672","title":"Trusted Application-Centric Ad-Hoc Networks","display_name":"Trusted Application-Centric Ad-Hoc Networks","publication_year":2007,"publication_date":"2007-10-01","ids":{"openalex":"https://openalex.org/W2121670422","doi":"https://doi.org/10.1109/mobhoc.2007.4428672","mag":"2121670422"},"language":"en","primary_location":{"id":"doi:10.1109/mobhoc.2007.4428672","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mobhoc.2007.4428672","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102827878","display_name":"Gang Xu","orcid":"https://orcid.org/0000-0002-1071-6577"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]},{"id":"https://openalex.org/I1283103587","display_name":"AT&T (United States)","ror":"https://ror.org/02bbd5539","country_code":"US","type":"company","lineage":["https://openalex.org/I1283103587"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Gang Xu","raw_affiliation_strings":["AT and T, Middletown, NJ, USA","Department of Computer Science, Rutgers University, Piscataway, NJ, USA"],"affiliations":[{"raw_affiliation_string":"AT and T, Middletown, NJ, USA","institution_ids":["https://openalex.org/I1283103587"]},{"raw_affiliation_string":"Department of Computer Science, Rutgers University, Piscataway, NJ, USA","institution_ids":["https://openalex.org/I102322142"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074290416","display_name":"Cristian Borcea","orcid":"https://orcid.org/0000-0003-0020-0910"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cristian Borcea","raw_affiliation_strings":["Department of Computer Science, New Jersey Institute of Technology, Newark, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, New Jersey Institute of Technology, Newark, NJ, USA","institution_ids":["https://openalex.org/I118118575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083907939","display_name":"Liviu Iftode","orcid":null},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Liviu Iftode","raw_affiliation_strings":["Department of Computer Science, Rutgers University, Piscataway, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Rutgers University, Piscataway, NJ, USA","institution_ids":["https://openalex.org/I102322142"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102827878"],"corresponding_institution_ids":["https://openalex.org/I102322142","https://openalex.org/I1283103587"],"apc_list":null,"apc_paid":null,"fwci":0.9626,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.79208915,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2259","issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7999159097671509},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7438303828239441},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.720543622970581},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.6486697793006897},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6300340890884399},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6249274611473083},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6109563112258911},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.5437369346618652},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4653281569480896},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.44886529445648193},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.4387349486351013},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.42250579595565796},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.42221498489379883},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34715813398361206},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2711898982524872},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.1522396206855774},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08686700463294983}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7999159097671509},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7438303828239441},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.720543622970581},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.6486697793006897},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6300340890884399},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6249274611473083},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6109563112258911},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.5437369346618652},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4653281569480896},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.44886529445648193},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.4387349486351013},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.42250579595565796},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.42221498489379883},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34715813398361206},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2711898982524872},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.1522396206855774},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08686700463294983},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mobhoc.2007.4428672","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mobhoc.2007.4428672","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.49000000953674316,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":103,"referenced_works":["https://openalex.org/W42212681","https://openalex.org/W69120032","https://openalex.org/W82508160","https://openalex.org/W108080453","https://openalex.org/W111415382","https://openalex.org/W124732759","https://openalex.org/W134135760","https://openalex.org/W176141251","https://openalex.org/W201119258","https://openalex.org/W1480385649","https://openalex.org/W1487008537","https://openalex.org/W1499241274","https://openalex.org/W1504669610","https://openalex.org/W1520914943","https://openalex.org/W1526747343","https://openalex.org/W1542316315","https://openalex.org/W1556597491","https://openalex.org/W1566553981","https://openalex.org/W1575747926","https://openalex.org/W1582075201","https://openalex.org/W1585248525","https://openalex.org/W1589114032","https://openalex.org/W1599351740","https://openalex.org/W1656731780","https://openalex.org/W1721341781","https://openalex.org/W1733324781","https://openalex.org/W1948677622","https://openalex.org/W1958859150","https://openalex.org/W1966825932","https://openalex.org/W1970448459","https://openalex.org/W1970665106","https://openalex.org/W1994980566","https://openalex.org/W2000548713","https://openalex.org/W2021206047","https://openalex.org/W2022523206","https://openalex.org/W2033751220","https://openalex.org/W2042881845","https://openalex.org/W2045230301","https://openalex.org/W2063361908","https://openalex.org/W2065207200","https://openalex.org/W2066573099","https://openalex.org/W2067514565","https://openalex.org/W2068310911","https://openalex.org/W2083637282","https://openalex.org/W2099613071","https://openalex.org/W2102258543","https://openalex.org/W2105820960","https://openalex.org/W2107380993","https://openalex.org/W2108255910","https://openalex.org/W2110081058","https://openalex.org/W2110248092","https://openalex.org/W2111015674","https://openalex.org/W2112138431","https://openalex.org/W2112177610","https://openalex.org/W2112701160","https://openalex.org/W2113085255","https://openalex.org/W2116662625","https://openalex.org/W2117496982","https://openalex.org/W2120417050","https://openalex.org/W2121542813","https://openalex.org/W2124651399","https://openalex.org/W2125825081","https://openalex.org/W2125895608","https://openalex.org/W2131726714","https://openalex.org/W2132932625","https://openalex.org/W2135009572","https://openalex.org/W2135300639","https://openalex.org/W2135861925","https://openalex.org/W2136332165","https://openalex.org/W2136482194","https://openalex.org/W2137469879","https://openalex.org/W2138623315","https://openalex.org/W2139426072","https://openalex.org/W2140073547","https://openalex.org/W2140987300","https://openalex.org/W2144918660","https://openalex.org/W2151993488","https://openalex.org/W2154730255","https://openalex.org/W2155432864","https://openalex.org/W2158923961","https://openalex.org/W2161828433","https://openalex.org/W2162171351","https://openalex.org/W2163403965","https://openalex.org/W2166004296","https://openalex.org/W2166975838","https://openalex.org/W2169479894","https://openalex.org/W2170496240","https://openalex.org/W2171655636","https://openalex.org/W2250064786","https://openalex.org/W2466575204","https://openalex.org/W2528695051","https://openalex.org/W2537170501","https://openalex.org/W2539047445","https://openalex.org/W4206796831","https://openalex.org/W4250874986","https://openalex.org/W4256367411","https://openalex.org/W6605099366","https://openalex.org/W6629953387","https://openalex.org/W6631457543","https://openalex.org/W6674683537","https://openalex.org/W6675445138","https://openalex.org/W6676756633","https://openalex.org/W6838336854"],"related_works":["https://openalex.org/W1123412569","https://openalex.org/W2768875466","https://openalex.org/W3013627169","https://openalex.org/W26370491","https://openalex.org/W2393973626","https://openalex.org/W2105261429","https://openalex.org/W2107355607","https://openalex.org/W2012419258","https://openalex.org/W318167434","https://openalex.org/W2024568155"],"abstract_inverted_index":{"Nodes":[0],"in":[1,9,41,69,126],"MANETs":[2],"lack":[3],"the":[4,18,70,113,116,137],"protection":[5],"offered":[6],"by":[7,80,115,131],"firewalls":[8],"infrastructure-based":[10],"networks":[11,40],"because":[12,93],"malicious":[13],"nodes":[14,36,90,95,109],"can":[15],"roam":[16],"into":[17],"vicinity":[19],"of":[20,122,139],"another":[21],"node":[22,74],"and":[23,53,145],"start":[24],"launching":[25],"attacks.":[26],"This":[27],"paper":[28],"presents":[29],"a":[30,50,55,67,73,132,149],"distributed":[31],"mechanism":[32],"that":[33,63],"allows":[34],"trusted":[35,120],"to":[37,48,76,84,99],"create":[38],"protected":[39,44,71],"MANETs.":[42],"A":[43],"network":[45,57,117],"is":[46,129],"created":[47],"run":[49],"specific":[51],"application":[52],"enforce":[54,85],"common":[56],"access":[58],"control":[59],"policy":[60,127],"associated":[61],"with":[62,103],"application.":[64],"To":[65],"become":[66],"member":[68,104,108],"network,":[72],"has":[75],"demonstrate":[77,136],"its":[78,82,146],"trustworthiness":[79],"proving":[81],"ability":[83],"policies.":[86],"Attacks":[87,106],"from":[88,107],"untrusted":[89],"are":[91,96,110],"impossible":[92],"these":[94],"not":[97],"allowed":[98],"establish":[100],"wireless":[101],"links":[102],"nodes.":[105],"stopped":[111],"at":[112],"originators":[114],"policy.":[118],"The":[119],"execution":[121],"all":[123],"programs":[124],"involved":[125],"enforcement":[128],"guaranteed":[130],"kernel":[133],"agent.":[134],"We":[135],"correctness":[138],"our":[140],"solution":[141],"through":[142,148],"security":[143],"analysis":[144],"feasibility":[147],"prototype":[150],"implementation":[151],"tested":[152],"over":[153],"an":[154],"IEEE":[155],"802.11":[156],"ad":[157],"hoc":[158],"network.":[159]},"counts_by_year":[{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
