{"id":"https://openalex.org/W2162565149","doi":"https://doi.org/10.1109/tnet.2011.2163730","title":"Topological detection on wormholes in wireless ad hoc and sensor networks","display_name":"Topological detection on wormholes in wireless ad hoc and sensor networks","publication_year":2011,"publication_date":"2011-08-25","ids":{"openalex":"https://openalex.org/W2162565149","doi":"https://doi.org/10.1109/tnet.2011.2163730","mag":"2162565149"},"language":"en","primary_location":{"id":"doi:10.1109/tnet.2011.2163730","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnet.2011.2163730","pdf_url":null,"source":{"id":"https://openalex.org/S62238642","display_name":"IEEE/ACM Transactions on Networking","issn_l":"1063-6692","issn":["1063-6692","1558-2566"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/ACM Transactions on Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006729432","display_name":"Dezun Dong","orcid":"https://orcid.org/0000-0001-6243-8479"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dezun Dong","raw_affiliation_strings":["School of Computer and the National Laboratory for Paralleling and Distributed Processing, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and the National Laboratory for Paralleling and Distributed Processing, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100361458","display_name":"Mo Li","orcid":"https://orcid.org/0000-0002-6047-9709"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Mo Li","raw_affiliation_strings":["Computer Science Division, School of Computer Engineering, Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Computer Science Division, School of Computer Engineering, Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101877973","display_name":"Yunhao Liu","orcid":"https://orcid.org/0000-0001-8052-9200"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Yunhao Liu","raw_affiliation_strings":["Hong Kong University of Science and Technology, Hong Kong, China","TNLIST, School of Software, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Hong Kong University of Science and Technology, Hong Kong, China","institution_ids":["https://openalex.org/I200769079"]},{"raw_affiliation_string":"TNLIST, School of Software, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100341802","display_name":"Xiang\u2010Yang Li","orcid":"https://orcid.org/0000-0002-6070-6625"},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiang-Yang Li","raw_affiliation_strings":["Department of Computer Science, Illinois Institute of Technology, Chicago, IL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Illinois Institute of Technology, Chicago, IL, USA","institution_ids":["https://openalex.org/I180949307"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000688713","display_name":"Xiangke Liao","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangke Liao","raw_affiliation_strings":["School of Computer and the National Laboratory for Paralleling and Distributed Processing, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and the National Laboratory for Paralleling and Distributed Processing, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5006729432"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":9.8021,"has_fulltext":false,"cited_by_count":80,"citation_normalized_percentile":{"value":0.98401204,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"19","issue":"6","first_page":"1787","last_page":"1796"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wormhole","display_name":"Wormhole","score":0.9492862224578857},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8359360098838806},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.8111684322357178},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.7161906957626343},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6669553518295288},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.5898222923278809},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.567287802696228},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.5189254283905029},{"id":"https://openalex.org/keywords/limit","display_name":"Limit (mathematics)","score":0.4980177879333496},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4775881767272949},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.44837766885757446},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.444783091545105},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.4132234752178192},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.38675373792648315},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.18925407528877258},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1016797125339508},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07641911506652832},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.068549245595932}],"concepts":[{"id":"https://openalex.org/C29013271","wikidata":"https://www.wikidata.org/wiki/Q7544","display_name":"Wormhole","level":2,"score":0.9492862224578857},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8359360098838806},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.8111684322357178},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.7161906957626343},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6669553518295288},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.5898222923278809},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.567287802696228},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.5189254283905029},{"id":"https://openalex.org/C151201525","wikidata":"https://www.wikidata.org/wiki/Q177239","display_name":"Limit (mathematics)","level":2,"score":0.4980177879333496},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4775881767272949},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.44837766885757446},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.444783091545105},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.4132234752178192},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.38675373792648315},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.18925407528877258},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1016797125339508},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07641911506652832},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.068549245595932},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tnet.2011.2163730","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnet.2011.2163730","pdf_url":null,"source":{"id":"https://openalex.org/S62238642","display_name":"IEEE/ACM Transactions on Networking","issn_l":"1063-6692","issn":["1063-6692","1558-2566"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/ACM Transactions on Networking","raw_type":"journal-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-44194","is_oa":false,"landing_page_url":"http://www.scopus.com/record/display.url?eid=2-s2.0-84655163477&origin=inward","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1484651275","https://openalex.org/W1534062543","https://openalex.org/W1558230724","https://openalex.org/W1583345160","https://openalex.org/W1970123348","https://openalex.org/W1995757115","https://openalex.org/W2023272701","https://openalex.org/W2052627089","https://openalex.org/W2060373563","https://openalex.org/W2093766264","https://openalex.org/W2102151147","https://openalex.org/W2105543555","https://openalex.org/W2114495437","https://openalex.org/W2114866901","https://openalex.org/W2127699957","https://openalex.org/W2133372405","https://openalex.org/W2135057483","https://openalex.org/W2138893037","https://openalex.org/W2140231024","https://openalex.org/W2150298753","https://openalex.org/W2150411054","https://openalex.org/W2151993488","https://openalex.org/W2152617153","https://openalex.org/W2155762594","https://openalex.org/W2157087691","https://openalex.org/W2157921329","https://openalex.org/W2159178493","https://openalex.org/W2161931410","https://openalex.org/W2167930752","https://openalex.org/W2169458211","https://openalex.org/W2169633417","https://openalex.org/W2170105021","https://openalex.org/W2171194700","https://openalex.org/W3040586665","https://openalex.org/W3112127769","https://openalex.org/W6631758428","https://openalex.org/W6634699991","https://openalex.org/W6663682837","https://openalex.org/W6682824481","https://openalex.org/W7024580046"],"related_works":["https://openalex.org/W2027636740","https://openalex.org/W3035283282","https://openalex.org/W1591014886","https://openalex.org/W2062688728","https://openalex.org/W1581687089","https://openalex.org/W2061231656","https://openalex.org/W2551975114","https://openalex.org/W2771454953","https://openalex.org/W4231650586","https://openalex.org/W2768875466"],"abstract_inverted_index":{"Wormhole":[0],"attack":[1],"is":[2],"a":[3,86],"severe":[4],"threat":[5],"to":[6,30,56],"wireless":[7],"ad":[8],"hoc":[9],"and":[10,41,60,65,75,89,128],"sensor":[11],"networks.":[12],"Most":[13],"existing":[14],"countermeasures":[15],"either":[16],"require":[17],"specialized":[18],"hardware":[19,107],"devices":[20,108],"or":[21,109],"make":[22],"strong":[23],"assumptions":[24,42,76,112],"on":[25,98,105,113],"the":[26,32,44,58,82,119],"network":[27,99,114],"in":[28,124],"order":[29],"capture":[31],"specific":[33],"(partial)":[34],"symptom":[35,62],"induced":[36],"by":[37,70],"wormholes.":[38],"Those":[39],"requirements":[40,104],"limit":[43],"applicability":[45],"of":[46,63,121],"previous":[47],"approaches.":[48],"In":[49],"this":[50,122],"paper,":[51],"we":[52],"present":[53],"our":[54],"attempt":[55],"understand":[57],"impact":[59],"inevitable":[61],"wormholes":[64],"develop":[66],"distributed":[67,93],"detection":[68],"methods":[69],"making":[71],"as":[72,77],"few":[73],"restrictions":[74],"possible.":[78],"We":[79,116,134],"fundamentally":[80],"analyze":[81],"wormhole":[83],"problem":[84],"using":[85],"topology":[87],"methodology":[88],"propose":[90],"an":[91],"effective":[92],"approach,":[94],"which":[95],"relies":[96],"solely":[97],"connectivity":[100],"information,":[101],"without":[102],"any":[103,110],"special":[106],"rigorous":[111],"properties.":[115],"formally":[117],"prove":[118],"correctness":[120],"design":[123],"continuous":[125],"geometric":[126],"domains":[127],"extend":[129],"it":[130],"into":[131],"discrete":[132],"domains.":[133],"evaluate":[135],"its":[136],"performance":[137],"through":[138],"extensive":[139],"simulations.":[140]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":9},{"year":2016,"cited_by_count":13},{"year":2015,"cited_by_count":9},{"year":2014,"cited_by_count":13},{"year":2013,"cited_by_count":9},{"year":2012,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
