{"id":"https://openalex.org/W4410228905","doi":"https://doi.org/10.1109/wcnc61545.2025.10978458","title":"Comprehensive Security Analysis and DoS Attack Mitigation in Thread Networks","display_name":"Comprehensive Security Analysis and DoS Attack Mitigation in Thread Networks","publication_year":2025,"publication_date":"2025-03-24","ids":{"openalex":"https://openalex.org/W4410228905","doi":"https://doi.org/10.1109/wcnc61545.2025.10978458"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc61545.2025.10978458","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc61545.2025.10978458","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022098612","display_name":"Kumar Murugesan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Kumar Murugesan","raw_affiliation_strings":["Technology Innovation Institute,Abu Dhabi,UAE"],"affiliations":[{"raw_affiliation_string":"Technology Innovation Institute,Abu Dhabi,UAE","institution_ids":["https://openalex.org/I4210087059"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5117490824","display_name":"Muralidhara VN","orcid":null},"institutions":[{"id":"https://openalex.org/I181514455","display_name":"International Institute of Information Technology Bangalore","ror":"https://ror.org/05h9eqy10","country_code":"IN","type":"education","lineage":["https://openalex.org/I181514455"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Muralidhara VN","raw_affiliation_strings":["International Institute of Information Technology Bangalore,Bengaluru,India"],"affiliations":[{"raw_affiliation_string":"International Institute of Information Technology Bangalore,Bengaluru,India","institution_ids":["https://openalex.org/I181514455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5117490825","display_name":"Tirth Master","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Tirth Master","raw_affiliation_strings":["Technology Innovation Institute,Abu Dhabi,UAE"],"affiliations":[{"raw_affiliation_string":"Technology Innovation Institute,Abu Dhabi,UAE","institution_ids":["https://openalex.org/I4210087059"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5022098612"],"corresponding_institution_ids":["https://openalex.org/I4210087059"],"apc_list":null,"apc_paid":null,"fwci":1.5458,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.83227733,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7594954967498779},{"id":"https://openalex.org/keywords/thread","display_name":"Thread (computing)","score":0.6079675555229187},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5611793398857117},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4964776635169983},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4170815944671631},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11688914895057678}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7594954967498779},{"id":"https://openalex.org/C138101251","wikidata":"https://www.wikidata.org/wiki/Q213092","display_name":"Thread (computing)","level":2,"score":0.6079675555229187},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5611793398857117},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4964776635169983},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4170815944671631},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11688914895057678}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc61545.2025.10978458","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc61545.2025.10978458","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","display_name":"Climate action","score":0.5600000023841858}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2552202672","https://openalex.org/W2753280246","https://openalex.org/W2806099304","https://openalex.org/W4229017455","https://openalex.org/W4232754506","https://openalex.org/W4380303379","https://openalex.org/W4391878125"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4409144983"],"abstract_inverted_index":{"Thread":[0,43],"is":[1],"a":[2,37,93,98],"low-power":[3],"IPv6-based":[4],"mesh":[5],"networking":[6],"protocol":[7,84],"for":[8],"Internet":[9],"of":[10,41,54,139,150],"Things":[11],"(IoT)":[12],"applications,":[13],"operating":[14],"over":[15],"the":[16,42,50,59,78,104,109,132,137,146],"IEEE":[17],"802.15.4":[18],"low-rate":[19],"wireless":[20],"personal":[21],"area":[22],"network":[23,51,74,125],"standard.":[24],"While":[25],"it":[26],"offers":[27],"native":[28],"IP":[29],"support":[30],"and":[31,73,119,148,159],"secure":[32,156],"communication,":[33],"this":[34,140],"paper":[35],"presents":[36],"comprehensive":[38],"security":[39,147],"analysis":[40],"network,":[44],"identifying":[45],"critical":[46],"vulnerabilities":[47],"that":[48,96],"expose":[49],"to":[52,107,145],"Denial":[53],"Service":[55],"(DoS)":[56],"attacks":[57,122],"during":[58,85],"commissioning":[60,158],"process.":[61,112],"These":[62,142],"vulnerabilities,":[63],"especially":[64],"in":[65,161],"large-scale":[66],"IoT":[67,152],"deployments,":[68],"can":[69],"disrupt":[70],"device":[71,157],"authentication":[72],"operations":[75],"by":[76],"exploiting":[77],"Datagram":[79],"Transport":[80],"Layer":[81],"Security":[82],"(DTLS)":[83],"commissioning.":[86],"To":[87],"address":[88],"these":[89],"risks,":[90],"we":[91],"propose":[92],"mitigation":[94],"strategy":[95],"introduces":[97],"locally":[99],"generated":[100],"verification":[101],"cookie":[102],"at":[103],"Joiner":[105],"Router":[106],"strengthen":[108],"DTLS":[110],"handshake":[111],"This":[113],"modification":[114],"effectively":[115],"prevents":[116],"message":[117],"am-plification":[118],"mitigates":[120],"DoS":[121],"without":[123],"compromising":[124],"performance.":[126],"Our":[127],"experimental":[128],"analysis,":[129],"conducted":[130],"using":[131],"OpenThread":[133],"simulation":[134],"framework,":[135],"demonstrates":[136],"robustness":[138],"solution.":[141],"findings":[143],"contribute":[144],"resilience":[149],"Thread-based":[151],"networks,":[153],"ensuring":[154],"more":[155],"operation":[160],"real-world":[162],"environments.":[163]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
