{"id":"https://openalex.org/W2565119125","doi":"https://doi.org/10.1109/nca.2016.7778643","title":"To route or to secure: Tradeoffs in ICNs over MANETs","display_name":"To route or to secure: Tradeoffs in ICNs over MANETs","publication_year":2016,"publication_date":"2016-10-01","ids":{"openalex":"https://openalex.org/W2565119125","doi":"https://doi.org/10.1109/nca.2016.7778643","mag":"2565119125"},"language":"en","primary_location":{"id":"doi:10.1109/nca.2016.7778643","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nca.2016.7778643","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 15th International Symposium on Network Computing and Applications (NCA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059838295","display_name":"Hasanat Kazmi","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hasanat Kazmi","raw_affiliation_strings":["SRI"],"affiliations":[{"raw_affiliation_string":"SRI","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086649250","display_name":"Hasnain Lakhani","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hasnain Lakhani","raw_affiliation_strings":["SRI"],"affiliations":[{"raw_affiliation_string":"SRI","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035466033","display_name":"Ashish Gehani","orcid":"https://orcid.org/0000-0002-3940-2467"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ashish Gehani","raw_affiliation_strings":["SRI"],"affiliations":[{"raw_affiliation_string":"SRI","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089339406","display_name":"Rashid Tahir","orcid":"https://orcid.org/0000-0002-5888-0050"},"institutions":[{"id":"https://openalex.org/I2801919071","display_name":"University of Illinois System","ror":"https://ror.org/05e94g991","country_code":"US","type":"education","lineage":["https://openalex.org/I2801919071"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rashid Tahir","raw_affiliation_strings":["University of Illinois"],"affiliations":[{"raw_affiliation_string":"University of Illinois","institution_ids":["https://openalex.org/I2801919071"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011363617","display_name":"Fareed Zaffar","orcid":null},"institutions":[{"id":"https://openalex.org/I207789805","display_name":"Lahore University of Management Sciences","ror":"https://ror.org/05b5x4a35","country_code":"PK","type":"education","lineage":["https://openalex.org/I207789805"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Fareed Zaffar","raw_affiliation_strings":["Lahore University of Management Sciences"],"affiliations":[{"raw_affiliation_string":"Lahore University of Management Sciences","institution_ids":["https://openalex.org/I207789805"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5059838295"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17433365,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"33","issue":null,"first_page":"367","last_page":"374"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7816698551177979},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.6924565434455872},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6349413394927979},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.5730338096618652},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.5112693309783936},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4992024898529053},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4866255223751068},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.47736454010009766},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.47014859318733215},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.4540754556655884},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4223499298095703},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.12413117289543152},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.11621624231338501},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10328671336174011}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7816698551177979},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.6924565434455872},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6349413394927979},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.5730338096618652},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.5112693309783936},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4992024898529053},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4866255223751068},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.47736454010009766},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.47014859318733215},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.4540754556655884},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4223499298095703},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.12413117289543152},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.11621624231338501},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10328671336174011},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/nca.2016.7778643","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nca.2016.7778643","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 15th International Symposium on Network Computing and Applications (NCA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1488072645","https://openalex.org/W1498316612","https://openalex.org/W1504330774","https://openalex.org/W1682451491","https://openalex.org/W1998150981","https://openalex.org/W1998662109","https://openalex.org/W2058604048","https://openalex.org/W2108072891","https://openalex.org/W2109983959","https://openalex.org/W2122101224","https://openalex.org/W2132718467","https://openalex.org/W2151850350","https://openalex.org/W2963391656","https://openalex.org/W4232913554","https://openalex.org/W6629862473","https://openalex.org/W6637293744","https://openalex.org/W6650147127","https://openalex.org/W6676054806","https://openalex.org/W6696521065"],"related_works":["https://openalex.org/W3035283282","https://openalex.org/W2768875466","https://openalex.org/W1591014886","https://openalex.org/W1581687089","https://openalex.org/W2551975114","https://openalex.org/W2025838880","https://openalex.org/W2003275014","https://openalex.org/W4210799434","https://openalex.org/W1511473871","https://openalex.org/W2734527596"],"abstract_inverted_index":{"Information-Centric":[0],"Networks":[1,8],"(ICNs)":[2],"operating":[3],"over":[4],"Mobile":[5],"Ad":[6],"hoc":[7],"(MANETs)":[9],"are":[10,46,110],"challenged":[11],"by":[12],"the":[13,22,50,59,72,77,86,130,151,162],"node":[14],"churn,":[15],"evolving":[16],"topologies,":[17],"and":[18,31,52,74,85,161,167],"limited":[19],"resources":[20],"of":[21,28,39,54,76,88,100],"underlying":[23],"network.":[24],"The":[25],"complex":[26],"interplay":[27,149],"publishers,":[29],"subscribers,":[30],"brokers":[32],"brings":[33],"with":[34],"it":[35],"a":[36,62,97,147,171],"corresponding":[37],"set":[38],"security":[40,87,126],"concerns,":[41],"where":[42],"precisely-defined":[43],"trust":[44,166],"boundaries":[45],"needed":[47],"to":[48,153,164],"guarantee":[49],"confidentiality":[51,168],"integrity":[53],"all":[55],"data":[56,89],"objects":[57,90],"in":[58,91,128,169],"ecosystem.":[60],"Building":[61],"practical":[63],"framework":[64],"that":[65,103,124,144],"can":[66],"service":[67],"users":[68],"efficiently":[69],"requires":[70],"understanding":[71],"motivations":[73],"actions":[75],"participants.":[78],"We":[79,141],"explore":[80],"several":[81],"tradeoffs":[82],"between":[83,150],"efficiency":[84],"such":[92,170],"environments,":[93],"using":[94],"ICEMAN":[95],"-":[96],"real-wold":[98],"implementation":[99],"an":[101,113],"ICN":[102],"operates":[104],"on":[105,112],"MANETs.":[106],"Since":[107],"our":[108],"findings":[109],"based":[111],"actual":[114],"system,":[115],"they":[116],"have":[117,125,154],"significant":[118],"implications":[119],"for":[120,158],"building":[121],"efficient":[122,159],"ICNs":[123],"designed":[127],"at":[129],"outset":[131],"(rather":[132],"than":[133],"added":[134],"later":[135],"when":[136],"options":[137],"may":[138],"be":[139],"limited).":[140],"empirically":[142],"establish":[143],"there":[145],"is":[146],"strong":[148],"need":[152,163],"more":[155],"specific":[156],"information":[157],"routing":[160],"ensure":[165],"decentralized":[172],"system.":[173]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
