{"id":"https://openalex.org/W2738659033","doi":"https://doi.org/10.1109/iwcmc.2017.7986468","title":"An energy-efficient technique for MANETs distributed monitoring","display_name":"An energy-efficient technique for MANETs distributed monitoring","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2738659033","doi":"https://doi.org/10.1109/iwcmc.2017.7986468","mag":"2738659033"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2017.7986468","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2017.7986468","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091140244","display_name":"Chaker Abdelaziz Kerrache","orcid":"https://orcid.org/0000-0001-9990-519X"},"institutions":[{"id":"https://openalex.org/I50219554","display_name":"University of Laghouat","ror":"https://ror.org/018bbh535","country_code":"DZ","type":"education","lineage":["https://openalex.org/I50219554"]}],"countries":["DZ"],"is_corresponding":true,"raw_author_name":"Chaker Abdelaziz Kerrache","raw_affiliation_strings":["Laboratoire d'Informatique et de Math\u00e9matiques, University of Laghouat, Laghouat, Algeria"],"affiliations":[{"raw_affiliation_string":"Laboratoire d'Informatique et de Math\u00e9matiques, University of Laghouat, Laghouat, Algeria","institution_ids":["https://openalex.org/I50219554"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026855686","display_name":"Andrea Lupia","orcid":null},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Andrea Lupia","raw_affiliation_strings":["DIMES Dept., University of Calabria Rende (CS), Italy"],"affiliations":[{"raw_affiliation_string":"DIMES Dept., University of Calabria Rende (CS), Italy","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075581736","display_name":"Floriano De Rango","orcid":"https://orcid.org/0000-0003-4901-6233"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Floriano De Rango","raw_affiliation_strings":["DIMES Dept., University of Calabria Rende (CS), Italy"],"affiliations":[{"raw_affiliation_string":"DIMES Dept., University of Calabria Rende (CS), Italy","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066242048","display_name":"Carlos T. Calafate","orcid":"https://orcid.org/0000-0001-5729-3041"},"institutions":[{"id":"https://openalex.org/I60053951","display_name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","ror":"https://ror.org/01460j859","country_code":"ES","type":"education","lineage":["https://openalex.org/I60053951"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Carlos T. Calafate","raw_affiliation_strings":["Department of Computer Engineering, Universitat Polit\u00e8cnica de Val\u00e8ncia, Valencia, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Universitat Polit\u00e8cnica de Val\u00e8ncia, Valencia, Spain","institution_ids":["https://openalex.org/I60053951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086152745","display_name":"Juan\u2010Carlos Cano","orcid":"https://orcid.org/0000-0002-0038-0539"},"institutions":[{"id":"https://openalex.org/I60053951","display_name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","ror":"https://ror.org/01460j859","country_code":"ES","type":"education","lineage":["https://openalex.org/I60053951"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Juan-Carlos Cano","raw_affiliation_strings":["Department of Computer Engineering, Universitat Polit\u00e8cnica de Val\u00e8ncia, Valencia, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Universitat Polit\u00e8cnica de Val\u00e8ncia, Valencia, Spain","institution_ids":["https://openalex.org/I60053951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043546527","display_name":"Pietro Manzoni","orcid":"https://orcid.org/0000-0003-3753-0403"},"institutions":[{"id":"https://openalex.org/I60053951","display_name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","ror":"https://ror.org/01460j859","country_code":"ES","type":"education","lineage":["https://openalex.org/I60053951"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Pietro Manzoni","raw_affiliation_strings":["Department of Computer Engineering, Universitat Polit\u00e8cnica de Val\u00e8ncia, Valencia, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Universitat Polit\u00e8cnica de Val\u00e8ncia, Valencia, Spain","institution_ids":["https://openalex.org/I60053951"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5091140244"],"corresponding_institution_ids":["https://openalex.org/I50219554"],"apc_list":null,"apc_paid":null,"fwci":0.2072,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.55693317,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"74","issue":null,"first_page":"1274","last_page":"1279"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8087468147277832},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.7325741052627563},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.561773419380188},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5279098153114319},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5124450325965881},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5099502801895142},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.46653228998184204},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.4539856016635895},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.451689749956131},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4391659200191498},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4248828887939453},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11283531785011292},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09087839722633362}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8087468147277832},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.7325741052627563},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.561773419380188},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5279098153114319},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5124450325965881},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5099502801895142},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.46653228998184204},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.4539856016635895},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.451689749956131},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4391659200191498},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4248828887939453},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11283531785011292},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09087839722633362},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc.2017.7986468","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2017.7986468","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.9100000262260437}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1586099608","https://openalex.org/W1886816453","https://openalex.org/W1986856591","https://openalex.org/W2019239966","https://openalex.org/W2029310072","https://openalex.org/W2047301871","https://openalex.org/W2050067204","https://openalex.org/W2057072130","https://openalex.org/W2086628796","https://openalex.org/W2096371059","https://openalex.org/W2099825463","https://openalex.org/W2102258543","https://openalex.org/W2130280511","https://openalex.org/W2149830313","https://openalex.org/W2168764490","https://openalex.org/W2186807639","https://openalex.org/W2367148674","https://openalex.org/W2520210465","https://openalex.org/W2564679178","https://openalex.org/W6708346854"],"related_works":["https://openalex.org/W2989915292","https://openalex.org/W2117806953","https://openalex.org/W1975451135","https://openalex.org/W2890570089","https://openalex.org/W2073793005","https://openalex.org/W3148968234","https://openalex.org/W2111773953","https://openalex.org/W1510116864","https://openalex.org/W2166724027","https://openalex.org/W1915823365"],"abstract_inverted_index":{"Dishonesty":[0],"detection":[1,159],"in":[2],"mobile":[3],"and":[4,98,110,147],"wireless":[5],"networks":[6],"is":[7,46],"a":[8,25,75],"task":[9],"that":[10,45],"typically":[11],"relies":[12],"on":[13],"watchdog":[14],"techniques.":[15],"However,":[16],"these":[17,60],"medium":[18],"overhearing-based":[19],"techniques":[20],"are":[21],"prone":[22],"to":[23,32,48,66,81,104,119],"cause":[24],"high":[26,137,158],"energy":[27,68,90,129],"consumption.":[28,69,91],"In":[29,70],"an":[30,42],"attempt":[31],"address":[33],"this":[34,71,121],"problem,":[35],"several":[36],"proposals":[37],"adopted":[38],"trust":[39,97],"management":[40],"as":[41],"alternative":[43],"solution":[44,122],"able":[47],"overcome":[49],"the":[50,83,89,107,114,128,143,152],"shortcomings":[51],"of":[52,113,154,161],"cryptography-based":[53],"solutions":[54,62],"when":[55],"facing":[56],"inside":[57],"attacks.":[58],"Unfortunately,":[59],"trust-based":[61],"remain":[63],"mostly":[64],"unable":[65],"reduce":[67],"paper":[72],"we":[73],"propose":[74],"distributed":[76],"time":[77],"division-based":[78],"monitoring":[79,108],"strategy":[80],"achieve":[82],"required":[84],"security":[85],"levels":[86],"while":[87,156],"optimizing":[88],"Our":[92],"proposal":[93],"accounts":[94],"for":[95,136],"both":[96],"link":[99],"duration":[100],"among":[101],"honest":[102],"peers":[103],"fairly":[105],"divide":[106],"period,":[109],"takes":[111],"advantage":[112],"periodically":[115],"exchanged":[116],"hello":[117],"messages":[118],"make":[120],"fully":[123],"distributed.":[124],"Simulations":[125],"results":[126],"evidence":[127],"efficiency":[130],"achieved":[131],"by":[132],"our":[133],"proposal,":[134],"especially":[135],"density":[138],"scenarios":[139],"(>120":[140],"nodes)":[141],"where":[142],"consumption":[144],"becomes":[145],"stable":[146],"does":[148],"not":[149],"increase":[150],"with":[151],"number":[153],"nodes,":[155],"ensuring":[157],"ratios":[160],"malicious":[162],"nodes":[163],"(>85%).":[164]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
