{"id":"https://openalex.org/W2066561326","doi":"https://doi.org/10.1109/tdsc.2014.2382601","title":"Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs","display_name":"Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs","publication_year":2014,"publication_date":"2014-12-19","ids":{"openalex":"https://openalex.org/W2066561326","doi":"https://doi.org/10.1109/tdsc.2014.2382601","mag":"2066561326"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2014.2382601","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2014.2382601","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059296628","display_name":"Xixiang Lv","orcid":"https://orcid.org/0000-0003-2879-241X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xixiang Lv","raw_affiliation_strings":["National Key Lab of ISN, Xidian University, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"National Key Lab of ISN, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008178136","display_name":"Yi Mu","orcid":"https://orcid.org/0000-0002-1637-845X"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yi Mu","raw_affiliation_strings":["Centre for Computer and Information Security Research, University of Wollongong, Wollongong, NSW, Australia","Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024453724","display_name":"Hui Li","orcid":"https://orcid.org/0000-0001-8310-7169"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["National Key Lab of ISN, Xidian University, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"National Key Lab of ISN, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5059296628"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.3584,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.67816245,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"12","issue":"6","first_page":"615","last_page":"625"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9769999980926514,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bundle","display_name":"Bundle","score":0.8525708317756653},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7611907720565796},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.6428477168083191},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.619770884513855},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5947560667991638},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5814045071601868},{"id":"https://openalex.org/keywords/erasure","display_name":"Erasure","score":0.5131734013557434},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4594131410121918},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21336564421653748},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07717517018318176}],"concepts":[{"id":"https://openalex.org/C2778134712","wikidata":"https://www.wikidata.org/wiki/Q1047307","display_name":"Bundle","level":2,"score":0.8525708317756653},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7611907720565796},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.6428477168083191},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.619770884513855},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5947560667991638},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5814045071601868},{"id":"https://openalex.org/C2778790127","wikidata":"https://www.wikidata.org/wiki/Q484885","display_name":"Erasure","level":2,"score":0.5131734013557434},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4594131410121918},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21336564421653748},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07717517018318176},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tdsc.2014.2382601","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2014.2382601","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:ro.uow.edu.au:eispapers-6254","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/eispapers/5227","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Engineering and Information Sciences - Papers: Part A","raw_type":"article"},{"id":"pmh:oai:figshare.com:article/27757179","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/27757179","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2856367412","display_name":null,"funder_award_id":"61472308","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G51740237","display_name":null,"funder_award_id":"61202388","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W23100675","https://openalex.org/W120084055","https://openalex.org/W824588392","https://openalex.org/W1534925464","https://openalex.org/W1956043843","https://openalex.org/W1970144201","https://openalex.org/W1980690490","https://openalex.org/W1995341435","https://openalex.org/W2013852685","https://openalex.org/W2017645660","https://openalex.org/W2029712200","https://openalex.org/W2037342473","https://openalex.org/W2039915451","https://openalex.org/W2045971176","https://openalex.org/W2058972589","https://openalex.org/W2075346329","https://openalex.org/W2098081605","https://openalex.org/W2108018618","https://openalex.org/W2109080675","https://openalex.org/W2111664039","https://openalex.org/W2113132517","https://openalex.org/W2125957038","https://openalex.org/W2129849999","https://openalex.org/W2140471436","https://openalex.org/W2148575324","https://openalex.org/W2161342511","https://openalex.org/W2161373140","https://openalex.org/W2257533006","https://openalex.org/W2273515758","https://openalex.org/W2529138630","https://openalex.org/W2809548040","https://openalex.org/W4206072291","https://openalex.org/W4242656826","https://openalex.org/W6600948723","https://openalex.org/W6604903113","https://openalex.org/W6623131525","https://openalex.org/W6676469328","https://openalex.org/W6727781872","https://openalex.org/W6806216642"],"related_works":["https://openalex.org/W2072016134","https://openalex.org/W2351168932","https://openalex.org/W2465690287","https://openalex.org/W2376389741","https://openalex.org/W2108143034","https://openalex.org/W1997850251","https://openalex.org/W2084549431","https://openalex.org/W913430005","https://openalex.org/W1509695971","https://openalex.org/W1985021129"],"abstract_inverted_index":{"Bundle":[0,47],"authentication,":[1],"which":[2,99,154],"ensures":[3],"the":[4,23,41,54,67,143,192],"authenticity":[5],"and":[6,35,53,167,186],"integrity":[7],"of":[8,43,58,69,87,98,125,138],"bundles,":[9],"is":[10,133,155],"critical":[11],"in":[12,102,141],"space":[13],"Delay/disruption-Tolerant":[14],"Networks":[15],"(DTNs).":[16],"When":[17],"bundle":[18,71,127],"fragment":[19,44],"services":[20],"are":[21,62,100],"needed,":[22],"previous":[24],"solutions":[25],"directly":[26],"using":[27],"digital":[28],"signatures":[29],"suffer":[30],"from":[31],"heavy":[32],"computational":[33,187],"costs":[34,188],"bandwidth":[36,117,184],"overheads.":[37],"This":[38],"paper":[39],"addresses":[40],"issue":[42],"authentication":[45],"for":[46],"Protocol":[48],"by":[49],"exploiting":[50],"erasure":[51],"codes":[52,61],"batch":[55],"transmission":[56],"characteristic":[57],"DTNs.":[59],"Erasure":[60],"adopted":[63],"to":[64,72,78,128,157,162,191],"allow":[65],"all":[66,122],"fragments":[68,105,124,160],"a":[70,114,126,163],"equally":[73],"share":[74],"only":[75,169],"one":[76,112],"signature,":[77],"tolerate":[79],"high":[80],"delays":[81],"as":[82,84,106,108,189],"well":[83],"unexpected":[85],"loss":[86],"connectivity.":[88],"Following":[89],"this":[90,147],"generic":[91],"idea,":[92],"we":[93,149],"present":[94,150],"two":[95],"approaches,":[96],"both":[97,179],"effective":[101],"filtering":[103],"inauthentic":[104,135,144,159,172],"early":[107],"possible.":[109],"The":[110,174],"first":[111],"takes":[113],"surprisingly":[115],"low":[116],"overhead,":[118],"while":[119],"it":[120],"makes":[121],"received":[123],"be":[129],"removed":[130],"when":[131],"there":[132],"an":[134,151],"one,":[136],"because":[137],"its":[139],"failure":[140],"locating":[142],"fragments.":[145],"Considering":[146],"defect,":[148],"improved":[152],"scheme":[153],"able":[156],"detect":[158],"thanks":[161],"special":[164],"hash":[165],"chain":[166],"then":[168],"remove":[170],"these":[171],"ones.":[173],"performance":[175],"simulation":[176],"demonstrates":[177],"that":[178],"our":[180],"schemes":[181],"significantly":[182],"reduce":[183],"overheads":[185],"compared":[190],"prior":[193],"works.":[194]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
