{"id":"https://openalex.org/W2146021366","doi":"https://doi.org/10.1109/secpri.2004.1301328","title":"An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks","display_name":"An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks","publication_year":2004,"publication_date":"2004-06-10","ids":{"openalex":"https://openalex.org/W2146021366","doi":"https://doi.org/10.1109/secpri.2004.1301328","mag":"2146021366"},"language":"en","primary_location":{"id":"doi:10.1109/secpri.2004.1301328","is_oa":false,"landing_page_url":"https://doi.org/10.1109/secpri.2004.1301328","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101952501","display_name":"Sencun Zhu","orcid":"https://orcid.org/0000-0002-1047-7967"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sencun Zhu","raw_affiliation_strings":["Center for Secure Information Systems, George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"Center for Secure Information Systems, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000181158","display_name":"Sanjeev Setia","orcid":null},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. Setia","raw_affiliation_strings":["Center for Secure Information Systems, Computer Science Department, George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"Center for Secure Information Systems, Computer Science Department, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010727123","display_name":"Sushil Jajodia","orcid":"https://orcid.org/0000-0003-3210-558X"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]},{"id":"https://openalex.org/I44896327","display_name":"Mitre (United States)","ror":"https://ror.org/03ks2a131","country_code":"US","type":"company","lineage":["https://openalex.org/I44896327"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. Jajodia","raw_affiliation_strings":["Center for Secure Information Systems, George Mason University, Fairfax, VA, USA","MITRE Corporation, McLean, VA, USA"],"affiliations":[{"raw_affiliation_string":"Center for Secure Information Systems, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]},{"raw_affiliation_string":"MITRE Corporation, McLean, VA, USA","institution_ids":["https://openalex.org/I44896327"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016753473","display_name":"Peng Ning","orcid":"https://orcid.org/0000-0002-1455-9919"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Ning","raw_affiliation_strings":["Computer Science Department, North Carolina State University, Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101952501"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":36.613,"has_fulltext":false,"cited_by_count":561,"citation_normalized_percentile":{"value":0.99777678,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"259","last_page":"271"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.752517819404602},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7460379600524902},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7259114980697632},{"id":"https://openalex.org/keywords/hop","display_name":"Hop (telecommunications)","score":0.6677443981170654},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6216438412666321},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6211614608764648},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5634771585464478},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.546215295791626},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.48771676421165466},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.42343801259994507},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41341865062713623},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.19690218567848206},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07688474655151367}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.752517819404602},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7460379600524902},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7259114980697632},{"id":"https://openalex.org/C25906391","wikidata":"https://www.wikidata.org/wiki/Q1432381","display_name":"Hop (telecommunications)","level":2,"score":0.6677443981170654},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6216438412666321},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6211614608764648},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5634771585464478},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.546215295791626},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.48771676421165466},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42343801259994507},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41341865062713623},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.19690218567848206},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07688474655151367},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/secpri.2004.1301328","is_oa":false,"landing_page_url":"https://doi.org/10.1109/secpri.2004.1301328","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.60.1753","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.1753","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://discovery.csc.ncsu.edu/~pning/pubs/oakland04.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.9.9134","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.9.9134","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://mason.gmu.edu/~szhu1/ilhap.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1514361308","https://openalex.org/W1818597000","https://openalex.org/W1822822445","https://openalex.org/W2002054891","https://openalex.org/W2019396864","https://openalex.org/W2033751220","https://openalex.org/W2041610068","https://openalex.org/W2048402311","https://openalex.org/W2064757631","https://openalex.org/W2104532741","https://openalex.org/W2113446256","https://openalex.org/W2116269350","https://openalex.org/W2117362057","https://openalex.org/W2117781301","https://openalex.org/W2117984332","https://openalex.org/W2119407531","https://openalex.org/W2123080720","https://openalex.org/W2128381560","https://openalex.org/W2139890752","https://openalex.org/W2140372921","https://openalex.org/W2146021366","https://openalex.org/W2167569963","https://openalex.org/W2293675996","https://openalex.org/W3211513184","https://openalex.org/W4231753281","https://openalex.org/W4241413379","https://openalex.org/W4243443630","https://openalex.org/W4254200646","https://openalex.org/W6630673747","https://openalex.org/W6681375359","https://openalex.org/W6684529137"],"related_works":["https://openalex.org/W2166668397","https://openalex.org/W2116285675","https://openalex.org/W1533309011","https://openalex.org/W3048245612","https://openalex.org/W1980599209","https://openalex.org/W4220718301","https://openalex.org/W1555715488","https://openalex.org/W1991172351","https://openalex.org/W1510656496","https://openalex.org/W2061637199"],"abstract_inverted_index":{"Sensor":[0],"networks":[1,11],"are":[2,96,128],"often":[3],"deployed":[4],"in":[5,18,138],"unattended":[6],"environments,":[7],"thus":[8],"leaving":[9],"these":[10],"vulnerable":[12],"to":[13,130,158],"false":[14,23,84,113],"data":[15,24,85,114],"injection":[16],"attacks":[17],"which":[19],"an":[20,69,102],"adversary":[21,53],"injects":[22],"into":[25],"the":[26,29,33,38,41,52,77,107,139,159],"network":[27],"with":[28,156],"goal":[30],"of":[31,40,61,109],"deceiving":[32],"base":[34,78],"station":[35,79],"or":[36,57],"depleting":[37],"resources":[39],"relaying":[42],"nodes.":[43,63,134],"Standard":[44],"authentication":[45,72],"mechanisms":[46],"cannot":[47],"prevent":[48],"this":[49,65],"attack":[50],"if":[51],"has":[54],"compromised":[55,133],"one":[56],"a":[58,91,112,167],"small":[59],"number":[60,93,108],"sensor":[62],"In":[64],"paper,":[66],"we":[67,149],"present":[68],"interleaved":[70],"hop-by-hop":[71],"scheme":[73,100,153],"that":[74,76,111,126,137,151],"guarantees":[75],"will":[80],"detect":[81],"any":[82],"injected":[83],"packets":[86],"when":[87],"no":[88],"more":[89],"than":[90],"certain":[92],"t":[94,131],"nodes":[95],"compromised.":[97],"Further,":[98],"our":[99,152],"provides":[101],"upper":[103],"bound":[104],"B":[105,142],"for":[106],"hops":[110],"packet":[115],"could":[116],"be":[117],"forwarded":[118],"before":[119],"it":[120,161,164],"is":[121,143,154],"detected":[122],"and":[123,163,171],"dropped,":[124],"given":[125],"there":[127],"up":[129],"colluding":[132],"We":[135],"show":[136,150],"worst":[140],"case":[141],"O(t/sup":[144],"2/).":[145],"Through":[146],"performance":[147],"analysis,":[148],"efficient":[155],"respect":[157],"security":[160,170],"provides,":[162],"also":[165],"allows":[166],"tradeoff":[168],"between":[169],"performance.":[172]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":28},{"year":2017,"cited_by_count":20},{"year":2016,"cited_by_count":19},{"year":2015,"cited_by_count":26},{"year":2014,"cited_by_count":38},{"year":2013,"cited_by_count":43},{"year":2012,"cited_by_count":31}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
