{"id":"https://openalex.org/W2075142613","doi":"https://doi.org/10.1109/wowmom.2010.5534952","title":"Detection of the Evil ring attack in wireless sensor networks using cross verification","display_name":"Detection of the Evil ring attack in wireless sensor networks using cross verification","publication_year":2010,"publication_date":"2010-06-01","ids":{"openalex":"https://openalex.org/W2075142613","doi":"https://doi.org/10.1109/wowmom.2010.5534952","mag":"2075142613"},"language":"en","primary_location":{"id":"doi:10.1109/wowmom.2010.5534952","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wowmom.2010.5534952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100651614","display_name":"Wei Shi","orcid":"https://orcid.org/0000-0002-3071-8350"},"institutions":[{"id":"https://openalex.org/I39470171","display_name":"University of Ontario Institute of Technology","ror":"https://ror.org/016zre027","country_code":"CA","type":"education","lineage":["https://openalex.org/I39470171"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Wei Shi","raw_affiliation_strings":["Information Technology, University of Ontario Institute Technology, Oshawa, Canada","Faculty of Business and Information Technology, University of Ontario Institute Technology, Oshawa, Canada"],"affiliations":[{"raw_affiliation_string":"Information Technology, University of Ontario Institute Technology, Oshawa, Canada","institution_ids":["https://openalex.org/I39470171"]},{"raw_affiliation_string":"Faculty of Business and Information Technology, University of Ontario Institute Technology, Oshawa, Canada","institution_ids":["https://openalex.org/I39470171"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087753863","display_name":"Michel Barbeau","orcid":"https://orcid.org/0000-0003-3531-4926"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Michel Barbeau","raw_affiliation_strings":["School of Computer Science, Carleton University, Ottawa, Canada","#N#            \u2020 School of Computer Science, Carleton University, Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Carleton University, Ottawa, Canada","institution_ids":["https://openalex.org/I67031392"]},{"raw_affiliation_string":"#N#            \u2020 School of Computer Science, Carleton University, Ottawa, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009496814","display_name":"Jean\u2010Pierre Corriveau","orcid":"https://orcid.org/0000-0002-6570-3108"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jean-Pierre Corriveau","raw_affiliation_strings":["School of Computer Science, Carleton University, Ottawa, Canada","#N#            \u2020 School of Computer Science, Carleton University, Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Carleton University, Ottawa, Canada","institution_ids":["https://openalex.org/I67031392"]},{"raw_affiliation_string":"#N#            \u2020 School of Computer Science, Carleton University, Ottawa, Canada","institution_ids":["https://openalex.org/I67031392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100651614"],"corresponding_institution_ids":["https://openalex.org/I39470171"],"apc_list":null,"apc_paid":null,"fwci":0.7122,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.73067218,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7377475500106812},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7162081003189087},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6643465757369995},{"id":"https://openalex.org/keywords/global-positioning-system","display_name":"Global Positioning System","score":0.5892813205718994},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5470720529556274},{"id":"https://openalex.org/keywords/ring","display_name":"Ring (chemistry)","score":0.5268774628639221},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.5262736082077026},{"id":"https://openalex.org/keywords/position","display_name":"Position (finance)","score":0.493297278881073},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4701668918132782},{"id":"https://openalex.org/keywords/geographic-routing","display_name":"Geographic routing","score":0.4695829749107361},{"id":"https://openalex.org/keywords/radius","display_name":"RADIUS","score":0.4413760006427765},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.4399162828922272},{"id":"https://openalex.org/keywords/packet-drop-attack","display_name":"Packet drop attack","score":0.4193997085094452},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.36084461212158203},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3261762857437134},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.30946314334869385},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.29744863510131836},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20507660508155823},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09570509195327759},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0819658637046814}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7377475500106812},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7162081003189087},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6643465757369995},{"id":"https://openalex.org/C60229501","wikidata":"https://www.wikidata.org/wiki/Q18822","display_name":"Global Positioning System","level":2,"score":0.5892813205718994},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5470720529556274},{"id":"https://openalex.org/C2780378348","wikidata":"https://www.wikidata.org/wiki/Q25351438","display_name":"Ring (chemistry)","level":2,"score":0.5268774628639221},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5262736082077026},{"id":"https://openalex.org/C198082294","wikidata":"https://www.wikidata.org/wiki/Q3399648","display_name":"Position (finance)","level":2,"score":0.493297278881073},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4701668918132782},{"id":"https://openalex.org/C50558702","wikidata":"https://www.wikidata.org/wiki/Q5535067","display_name":"Geographic routing","level":5,"score":0.4695829749107361},{"id":"https://openalex.org/C178635117","wikidata":"https://www.wikidata.org/wiki/Q747499","display_name":"RADIUS","level":2,"score":0.4413760006427765},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.4399162828922272},{"id":"https://openalex.org/C35546906","wikidata":"https://www.wikidata.org/wiki/Q2900718","display_name":"Packet drop attack","level":5,"score":0.4193997085094452},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.36084461212158203},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3261762857437134},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.30946314334869385},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.29744863510131836},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20507660508155823},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09570509195327759},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0819658637046814},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.0},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wowmom.2010.5534952","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wowmom.2010.5534952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7900000214576721}],"awards":[],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1488160161","https://openalex.org/W1992874203","https://openalex.org/W2101963262","https://openalex.org/W2108613717","https://openalex.org/W2159796097","https://openalex.org/W2165274895","https://openalex.org/W2165303182","https://openalex.org/W2269131354","https://openalex.org/W2568946121"],"related_works":["https://openalex.org/W3162200841","https://openalex.org/W2586280620","https://openalex.org/W2805505483","https://openalex.org/W2334071950","https://openalex.org/W2384744344","https://openalex.org/W4233932308","https://openalex.org/W1799694159","https://openalex.org/W2947882039","https://openalex.org/W2004695235","https://openalex.org/W133227787"],"abstract_inverted_index":{"In":[0,62],"ad":[1],"hoc":[2],"networks":[3],"and":[4,24,111,122,136,148,215],"wireless":[5,205],"sensor":[6,160,206],"networks,":[7],"several":[8,45],"routing":[9],"algorithms":[10,46,78],"rely":[11],"on":[12,74,103],"the":[13,16,68,75,87,108,117,120,128,131,134,163,166,174,184,189,209],"knowledge":[14],"by":[15,177],"network":[17,207],"nodes":[18,85],"of":[19,26,79,90,112,130,165,186,211],"their":[20,91],"own":[21,36],"geographic":[22,55,76],"location":[23,77,110],"those":[25],"others.":[27],"For":[28],"cases":[29],"where":[30],"a":[31,48,99,104,113,158,195,204],"node":[32,49,161],"doesn't":[33],"have":[34],"its":[35,54,171],"positioning":[37],"device":[38],"(e.g.,":[39],"GPS),":[40],"Alfaro":[41,80],"et":[42,81],"al.":[43,82],"propose":[44,194],"that":[47,83,101],"can":[50],"run":[51],"to":[52,116],"determine":[53],"position":[56,58,89,100],"using":[57],"reports":[59,97],"from":[60,170],"neighbors.":[61,92,180],"this":[63,142],"paper,":[64],"we":[65],"first":[66],"present":[67,147],"evil":[69,151,190],"ring":[70,152,191],"attack,":[71],"an":[72,150],"attack":[73,125,153],"misleads":[84],"about":[86],"true":[88],"An":[93],"attacker":[94,137],"sends":[95],"false":[96],"with":[98,173],"sits":[102],"circle":[105],"centered":[106],"at":[107],"victim's":[109],"radius":[114],"equal":[115],"distance":[118,132],"between":[119,133],"victim":[121,135],"attacker.":[123],"The":[124],"succeeds":[126],"because":[127],"calculation":[129],"is":[138],"not":[139],"affected":[140],"despite":[141],"fake":[143],"position.":[144],"We":[145,193],"then":[146],"analyze":[149],"detection":[154],"algorithm":[155,182,198],"in":[156,203,208],"which":[157],"position-unaware":[159],"crosschecks":[162],"consistency":[164],"information":[167,175],"it":[168],"collects":[169],"neighbors":[172,187],"collected":[176],"other":[178],"trusted":[179],"This":[181],"detects":[183],"existence":[185],"running":[188],"attack.":[192],"general":[196],"distributed":[197],"for":[199],"a)":[200],"localizing":[201],"sensors":[202],"presence":[210],"some":[212],"malfunctioning":[213,219],"ones,":[214],"b)":[216],"detecting":[217],"such":[218],"sensors.":[220]},"counts_by_year":[{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
