{"id":"https://openalex.org/W2171709479","doi":"https://doi.org/10.1109/mwc.2007.4396945","title":"Constructing secure group communication over wireless ad hoc networks based on a virtual subnet model","display_name":"Constructing secure group communication over wireless ad hoc networks based on a virtual subnet model","publication_year":2007,"publication_date":"2007-10-01","ids":{"openalex":"https://openalex.org/W2171709479","doi":"https://doi.org/10.1109/mwc.2007.4396945","mag":"2171709479"},"language":"en","primary_location":{"id":"doi:10.1109/mwc.2007.4396945","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mwc.2007.4396945","pdf_url":null,"source":{"id":"https://openalex.org/S146764194","display_name":"IEEE Wireless Communications","issn_l":"1536-1284","issn":["1536-1284","1558-0687"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071574103","display_name":"Yueh\u2010Min Huang","orcid":"https://orcid.org/0000-0001-7052-1272"},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Yueh-Min Huang","raw_affiliation_strings":["Cheng Kung University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Cheng Kung University, Taiwan","institution_ids":["https://openalex.org/I91807558"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076750711","display_name":"Ching-Hung Yeh","orcid":null},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ching-Hung Yeh","raw_affiliation_strings":["Cheng Kung University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Cheng Kung University, Taiwan","institution_ids":["https://openalex.org/I91807558"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073633265","display_name":"Tzone-I Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Tzone-I Wang","raw_affiliation_strings":["Cheng Kung University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Cheng Kung University, Taiwan","institution_ids":["https://openalex.org/I91807558"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102824651","display_name":"Han\u2010Chieh Chao","orcid":"https://orcid.org/0000-0003-3222-1708"},"institutions":[{"id":"https://openalex.org/I75430998","display_name":"National Ilan University","ror":"https://ror.org/01npf0s58","country_code":"TW","type":"education","lineage":["https://openalex.org/I75430998"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Han-Chieh Chao","raw_affiliation_strings":["National I-Lan University, Taiwan"],"affiliations":[{"raw_affiliation_string":"National I-Lan University, Taiwan","institution_ids":["https://openalex.org/I75430998"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5071574103"],"corresponding_institution_ids":["https://openalex.org/I91807558"],"apc_list":null,"apc_paid":null,"fwci":3.8505,"has_fulltext":false,"cited_by_count":35,"citation_normalized_percentile":{"value":0.94072526,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"14","issue":"5","first_page":"70","last_page":"75"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8300584554672241},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8198844194412231},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.6445873975753784},{"id":"https://openalex.org/keywords/communication-in-small-groups","display_name":"Communication in small groups","score":0.5759795904159546},{"id":"https://openalex.org/keywords/secure-multicast","display_name":"Secure multicast","score":0.5371777415275574},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.5334517955780029},{"id":"https://openalex.org/keywords/unicast","display_name":"Unicast","score":0.5131590962409973},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.49761560559272766},{"id":"https://openalex.org/keywords/subnet","display_name":"Subnet","score":0.4702507555484772},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.43608516454696655},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4356757402420044},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.4101484417915344},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38074275851249695},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2703953683376312},{"id":"https://openalex.org/keywords/pragmatic-general-multicast","display_name":"Pragmatic General Multicast","score":0.14688098430633545},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.11830508708953857},{"id":"https://openalex.org/keywords/source-specific-multicast","display_name":"Source-specific multicast","score":0.11259973049163818}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8300584554672241},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8198844194412231},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.6445873975753784},{"id":"https://openalex.org/C44871818","wikidata":"https://www.wikidata.org/wiki/Q5154139","display_name":"Communication in small groups","level":2,"score":0.5759795904159546},{"id":"https://openalex.org/C2776147584","wikidata":"https://www.wikidata.org/wiki/Q2711392","display_name":"Secure multicast","level":5,"score":0.5371777415275574},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5334517955780029},{"id":"https://openalex.org/C11704745","wikidata":"https://www.wikidata.org/wiki/Q918337","display_name":"Unicast","level":3,"score":0.5131590962409973},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.49761560559272766},{"id":"https://openalex.org/C21099817","wikidata":"https://www.wikidata.org/wiki/Q7631721","display_name":"Subnet","level":2,"score":0.4702507555484772},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.43608516454696655},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4356757402420044},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.4101484417915344},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38074275851249695},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2703953683376312},{"id":"https://openalex.org/C112037812","wikidata":"https://www.wikidata.org/wiki/Q2107523","display_name":"Pragmatic General Multicast","level":4,"score":0.14688098430633545},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.11830508708953857},{"id":"https://openalex.org/C18787934","wikidata":"https://www.wikidata.org/wiki/Q7565105","display_name":"Source-specific multicast","level":3,"score":0.11259973049163818}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mwc.2007.4396945","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mwc.2007.4396945","pdf_url":null,"source":{"id":"https://openalex.org/S146764194","display_name":"IEEE Wireless Communications","issn_l":"1536-1284","issn":["1536-1284","1558-0687"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1994980566","https://openalex.org/W2019635157","https://openalex.org/W2039437606","https://openalex.org/W2052562490","https://openalex.org/W2071043548","https://openalex.org/W2131123432","https://openalex.org/W2153584137","https://openalex.org/W2156186849","https://openalex.org/W6679311452"],"related_works":["https://openalex.org/W2141226803","https://openalex.org/W1972955796","https://openalex.org/W1541857863","https://openalex.org/W2219910205","https://openalex.org/W2978800595","https://openalex.org/W1966768284","https://openalex.org/W207048982","https://openalex.org/W2026651734","https://openalex.org/W2385427787","https://openalex.org/W2070403242"],"abstract_inverted_index":{"Recently,":[0],"more":[1,3],"and":[2,13,50,100,182],"people":[4],"have":[5,17],"begun":[6],"using":[7],"mobile":[8,27,41],"devices":[9,105],"such":[10,22,84],"as":[11,73,162],"PDAs":[12],"notebooks.":[14],"Our":[15,168],"lives":[16],"been":[18],"profoundly":[19],"affected":[20],"by":[21,118],"devices.":[23],"A":[24,53],"MANET,":[25],"a":[26,74,101,122,141,151],"ad":[28],"hoc":[29],"network,":[30],"is":[31,55,98,121,160],"an":[32,37],"effective":[33],"networking":[34],"system":[35],"facilitating":[36],"exchange":[38],"data":[39],"between":[40],"devices,":[42],"without":[43],"the":[44,80,110,129,154,156,163,177],"support":[45],"of":[46,104,112,131,158,165],"wireless":[47,96],"access":[48],"points":[49],"base":[51],"stations.":[52],"MANET":[54],"not":[56,89],"restricted":[57],"to":[58,127,145],"unicast":[59],"or":[60],"multicast":[61],"communication,":[62],"but":[63],"can":[64,70,106,174],"also":[65],"provide":[66],"\"many-to-many\"":[67],"transmission,":[68],"which":[69,83],"be":[71],"treated":[72],"group":[75,132,148,166],"communication.":[76],"Until":[77],"recently,":[78],"however,":[79],"way":[81],"in":[82,95,134],"groups":[85,159],"are":[86,136],"formed":[87],"had":[88],"drawn":[90],"much":[91],"attention.":[92],"Because":[93],"communication":[94,149],"networks":[97],"broadcast":[99],"certain":[102],"amount":[103],"receive":[107],"transmitted":[108],"messages,":[109],"risk":[111],"unsecured":[113],"sensitive":[114],"information":[115],"being":[116],"intercepted":[117],"unintended":[119],"recipients":[120],"real":[123],"concern.":[124],"Consequently,":[125],"efforts":[126],"ensure":[128],"security":[130,181],"communications":[133],"MANETs":[135],"essential.":[137],"This":[138],"article":[139],"proposes":[140],"virtual":[142],"subnet":[143],"model":[144],"construct":[146],"secure":[147],"over":[150],"MANET.":[152],"With":[153],"model,":[155],"composition":[157],"established":[161],"forming":[164],"keys.":[167],"results":[169],"show":[170],"that":[171],"this":[172],"approach":[173],"completely":[175],"satisfy":[176],"needs":[178],"for":[179],"both":[180],"efficiency.":[183]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
