{"id":"https://openalex.org/W2100375917","doi":"https://doi.org/10.1145/1180345.1180351","title":"SIGF","display_name":"SIGF","publication_year":2006,"publication_date":"2006-10-30","ids":{"openalex":"https://openalex.org/W2100375917","doi":"https://doi.org/10.1145/1180345.1180351","mag":"2100375917"},"language":"en","primary_location":{"id":"doi:10.1145/1180345.1180351","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1180345.1180351","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108392388","display_name":"Anthony D. Wood","orcid":null},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Anthony D. Wood","raw_affiliation_strings":["University of Virginia","University of Virginia'"],"affiliations":[{"raw_affiliation_string":"University of Virginia","institution_ids":["https://openalex.org/I51556381"]},{"raw_affiliation_string":"University of Virginia'","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033174228","display_name":"Lei Fang","orcid":"https://orcid.org/0000-0003-2510-1281"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lei Fang","raw_affiliation_strings":["University of Virginia","University of Virginia'"],"affiliations":[{"raw_affiliation_string":"University of Virginia","institution_ids":["https://openalex.org/I51556381"]},{"raw_affiliation_string":"University of Virginia'","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100603760","display_name":"John A. Stankovic","orcid":"https://orcid.org/0000-0001-7307-9395"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"John A. Stankovic","raw_affiliation_strings":["University of Virginia","University of Virginia'"],"affiliations":[{"raw_affiliation_string":"University of Virginia","institution_ids":["https://openalex.org/I51556381"]},{"raw_affiliation_string":"University of Virginia'","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038811034","display_name":"Tian He","orcid":"https://orcid.org/0000-0001-6062-2619"},"institutions":[{"id":"https://openalex.org/I2800403580","display_name":"University of Minnesota System","ror":"https://ror.org/03grvy078","country_code":"US","type":"education","lineage":["https://openalex.org/I2800403580"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tian He","raw_affiliation_strings":["University of Minnesota"],"affiliations":[{"raw_affiliation_string":"University of Minnesota","institution_ids":["https://openalex.org/I2800403580"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5108392388"],"corresponding_institution_ids":["https://openalex.org/I51556381"],"apc_list":null,"apc_paid":null,"fwci":7.5447,"has_fulltext":false,"cited_by_count":88,"citation_normalized_percentile":{"value":0.97431639,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"35","last_page":"48"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7476641535758972},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6080178022384644},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5338807106018066},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.45006006956100464},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4422469139099121},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.42214053869247437},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.41918304562568665}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7476641535758972},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6080178022384644},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5338807106018066},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.45006006956100464},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4422469139099121},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.42214053869247437},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.41918304562568665},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1180345.1180351","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1180345.1180351","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1495606459","https://openalex.org/W1518780012","https://openalex.org/W1558230724","https://openalex.org/W1805023694","https://openalex.org/W2033751220","https://openalex.org/W2048402311","https://openalex.org/W2067514565","https://openalex.org/W2070301163","https://openalex.org/W2086824628","https://openalex.org/W2101963262","https://openalex.org/W2114495437","https://openalex.org/W2116269350","https://openalex.org/W2117984332","https://openalex.org/W2123861314","https://openalex.org/W2127699957","https://openalex.org/W2128381560","https://openalex.org/W2131595204","https://openalex.org/W2135057483","https://openalex.org/W2136032111","https://openalex.org/W2157457404","https://openalex.org/W2158923961","https://openalex.org/W2162685648","https://openalex.org/W2164478452","https://openalex.org/W2165491783","https://openalex.org/W2537170501","https://openalex.org/W3112127769","https://openalex.org/W3211513184","https://openalex.org/W4231753281","https://openalex.org/W4285719527","https://openalex.org/W6629504260","https://openalex.org/W6672579688","https://openalex.org/W6862240463"],"related_works":["https://openalex.org/W2494523064","https://openalex.org/W2943623134","https://openalex.org/W2588219639","https://openalex.org/W2215759665","https://openalex.org/W2030292806","https://openalex.org/W1975451135","https://openalex.org/W2960358116","https://openalex.org/W4287727129","https://openalex.org/W3041172967","https://openalex.org/W2590022098"],"abstract_inverted_index":{"As":[0],"sensor":[1,59],"networks":[2,60],"are":[3],"deployed":[4],"in":[5],"adversarial":[6],"environments":[7],"and":[8,17,66,83,97,103,128,135,158,172,183,191],"used":[9],"for":[10,37,57,113],"critical":[11],"applications":[12],"such":[13],"as":[14],"battlefield":[15],"surveillance":[16],"medical":[18],"monitoring,":[19],"security":[20,40,65,95,143,164,170],"weaknesses":[21],"become":[22],"a":[23,51,111],"big":[24],"concern.":[25],"The":[26],"severe":[27],"resource":[28,38],"constraints":[29],"of":[30,165,194],"WSNs":[31],"give":[32],"rise":[33],"to":[34,86,130,140],"the":[35,75,87,92,114,163,178],"need":[36],"bound":[39],"solutions.In":[41],"this":[42],"paper":[43],"we":[44],"present":[45],"SIGF":[46,149,166],"(Secure":[47],"Implicit":[48],"Geographic":[49],"Forwarding),":[50],"configurable":[52],"secure":[53],"routing":[54],"protocol":[55],"family":[56],"wireless":[58],"that":[61,148,174],"provides":[62,121],"good":[63],"enough":[64],"high":[67,151],"performance.":[68],"By":[69],"avoiding":[70],"or":[71],"limiting":[72],"shared":[73],"state,":[74,119],"protocols":[76,167],"prevent":[77],"many":[78],"common":[79],"attacks":[80,171],"against":[81,132,185],"routing,":[82],"contain":[84],"others":[85],"local":[88,126],"neighborhood.SIGF":[89],"makes":[90],"explicit":[91],"tradeoff":[93],"between":[94],"provided":[96],"state":[98,139],"which":[99],"must":[100],"be":[101],"stored":[102],"maintained.":[104],"It":[105],"comprises":[106],"three":[107],"protocols,":[108],"each":[109],"forming":[110],"basis":[112],"next:":[115],"SIGF-0":[116],"keeps":[117],"no":[118],"but":[120],"probabilistic":[122],"defenses;":[123],"SIGF-1":[124],"uses":[125,137],"history":[127],"reputation":[129],"protect":[131],"certain":[133],"attacks;":[134],"SIGF-2":[136],"neighborhood-shared":[138],"provide":[141],"stronger":[142],"guarantees.Our":[144],"performance":[145],"evaluation":[146],"shows":[147],"achieves":[150],"packet":[152],"delivery":[153],"ratios":[154],"with":[155],"low":[156],"overhead":[157],"end-to-end":[159],"delay.":[160],"We":[161],"evaluate":[162],"under":[168],"various":[169],"show":[173],"it":[175],"effectively":[176],"contains":[177],"damage":[179],"from":[180],"compromised":[181],"nodes":[182],"defends":[184],"black":[186],"hole,":[187],"selective":[188],"forwarding,":[189],"Sybil,":[190],"some":[192],"denial":[193],"service":[195],"attacks.":[196]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":9},{"year":2012,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
