{"id":"https://openalex.org/W2113261592","doi":"https://doi.org/10.1145/1288107.1288116","title":"Surviving attacks on disruption-tolerant networks without authentication","display_name":"Surviving attacks on disruption-tolerant networks without authentication","publication_year":2007,"publication_date":"2007-09-09","ids":{"openalex":"https://openalex.org/W2113261592","doi":"https://doi.org/10.1145/1288107.1288116","mag":"2113261592"},"language":"en","primary_location":{"id":"doi:10.1145/1288107.1288116","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1288107.1288116","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002026660","display_name":"John Burgess","orcid":"https://orcid.org/0000-0003-4748-9571"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"John Burgess","raw_affiliation_strings":["BBN Technologies, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"BBN Technologies, Cambridge, MA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024184063","display_name":"George Bissias","orcid":null},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"George Dean Bissias","raw_affiliation_strings":["Univ. of Massachusetts Amherst, Amherst, MA","University of Massachusetts Amherst Amherst, MA"],"affiliations":[{"raw_affiliation_string":"Univ. of Massachusetts Amherst, Amherst, MA","institution_ids":["https://openalex.org/I24603500"]},{"raw_affiliation_string":"University of Massachusetts Amherst Amherst, MA","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112567796","display_name":"Mark D. Corner","orcid":null},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mark D. Corner","raw_affiliation_strings":["Univ. of Massachusetts Amherst, Amherst, MA","University of Massachusetts Amherst Amherst, MA"],"affiliations":[{"raw_affiliation_string":"Univ. of Massachusetts Amherst, Amherst, MA","institution_ids":["https://openalex.org/I24603500"]},{"raw_affiliation_string":"University of Massachusetts Amherst Amherst, MA","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102976517","display_name":"Brian Neil Levine","orcid":"https://orcid.org/0000-0003-2262-0617"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brian Neil Levine","raw_affiliation_strings":["Univ. of Massachusetts Amherst, Amherst, MA","University of Massachusetts Amherst Amherst, MA"],"affiliations":[{"raw_affiliation_string":"Univ. of Massachusetts Amherst, Amherst, MA","institution_ids":["https://openalex.org/I24603500"]},{"raw_affiliation_string":"University of Massachusetts Amherst Amherst, MA","institution_ids":["https://openalex.org/I24603500"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5002026660"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":10.589,"has_fulltext":false,"cited_by_count":109,"citation_normalized_percentile":{"value":0.98429681,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"61","last_page":"70"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8064587712287903},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7548403739929199},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5847318172454834},{"id":"https://openalex.org/keywords/delay-tolerant-networking","display_name":"Delay-tolerant networking","score":0.5546631813049316},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5511868596076965},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.4942181408405304},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4596942961215973},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.45714879035949707},{"id":"https://openalex.org/keywords/wireless-routing-protocol","display_name":"Wireless Routing Protocol","score":0.10329347848892212}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8064587712287903},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7548403739929199},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5847318172454834},{"id":"https://openalex.org/C53264328","wikidata":"https://www.wikidata.org/wiki/Q55320","display_name":"Delay-tolerant networking","level":5,"score":0.5546631813049316},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5511868596076965},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.4942181408405304},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4596942961215973},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.45714879035949707},{"id":"https://openalex.org/C47318570","wikidata":"https://www.wikidata.org/wiki/Q8026863","display_name":"Wireless Routing Protocol","level":4,"score":0.10329347848892212},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1288107.1288116","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1288107.1288116","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6499999761581421,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322771","display_name":"Secret\u00e1rio de Ci\u00eancia, Tecnologia e Ensino Superior, Governo do Estado de Parana","ror":"https://ror.org/05nyhnc56"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1520914943","https://openalex.org/W1537681856","https://openalex.org/W1560625027","https://openalex.org/W1597344219","https://openalex.org/W1655958391","https://openalex.org/W1923680614","https://openalex.org/W1966518282","https://openalex.org/W1967385589","https://openalex.org/W1977197733","https://openalex.org/W1997529336","https://openalex.org/W2003600644","https://openalex.org/W2011039300","https://openalex.org/W2073418598","https://openalex.org/W2086042811","https://openalex.org/W2097760683","https://openalex.org/W2099217666","https://openalex.org/W2100468043","https://openalex.org/W2110519146","https://openalex.org/W2112701160","https://openalex.org/W2116420072","https://openalex.org/W2123825896","https://openalex.org/W2125957038","https://openalex.org/W2127931941","https://openalex.org/W2128928510","https://openalex.org/W2136420233","https://openalex.org/W2140531391","https://openalex.org/W2142522527","https://openalex.org/W2151342861","https://openalex.org/W2157283388","https://openalex.org/W2157875131","https://openalex.org/W2162076967","https://openalex.org/W2167675430","https://openalex.org/W2200366263","https://openalex.org/W3003535479","https://openalex.org/W3112127769","https://openalex.org/W6642090696","https://openalex.org/W6862240463"],"related_works":["https://openalex.org/W2039543756","https://openalex.org/W2386325437","https://openalex.org/W2353043494","https://openalex.org/W2441202759","https://openalex.org/W2770593030","https://openalex.org/W2352220317","https://openalex.org/W2166344389","https://openalex.org/W2938528237","https://openalex.org/W2900704462","https://openalex.org/W2241074003"],"abstract_inverted_index":{"Disruption-Tolerant":[0],"Networks":[1],"(DTNs)":[2],"deliver":[3],"data":[4,29],"in":[5,15,30,78,165,212],"network":[6,42,51,173],"environments":[7],"composed":[8],"of":[9,88,106,150,168,181,222,237],"intermittently":[10],"connected":[11,243],"nodes.":[12],"Just":[13],"as":[14,66],"traditional":[16],"networks,":[17],"malicious":[18],"nodes":[19,224],"within":[20],"a":[21,67,79,131,190,199],"DTN":[22,132],"may":[23,91],"attempt":[24],"to":[25,32,74,125,162,174,210,230,233],"delay":[26],"or":[27],"destroy":[28],"transit":[31],"its":[33],"destination.":[34],"Such":[35],"attacks":[36],"include":[37],"dropping":[38],"data,":[39],"flooding":[40],"the":[41,86,104,122,148,155,166,172,179,182],"with":[43,158,235],"extra":[44],"messages,":[45],"corrupting":[46],"routing":[47,58,127,157],"tables,":[48],"and":[49,76,121,140,143,232],"counterfeiting":[50],"acknowledgments.":[52],"Many":[53],"existing":[54],"methods":[55],"for":[56,147],"securing":[57],"protocols":[59],"require":[60],"authentication":[61],"supported":[62],"by":[63,103],"mechanisms":[64,90],"such":[65,89],"public":[68],"key":[69],"infrastructure,":[70],"which":[71],"is":[72,83],"difficult":[73],"deploy":[75],"operate":[77],"DTN,":[80],"where":[81],"connectivity":[82,114],"sporadic.":[84],"Furthermore,":[85],"complexity":[87,145],"dissuade":[92],"node":[93],"participation":[94],"so":[95],"strongly":[96],"that":[97,133,154,193,204,218],"potential":[98],"attacker":[99,217],"impacts":[100],"are":[101,207,245],"dwarfed":[102],"loss":[105],"contributing":[107],"participants.":[108],"In":[109,178],"this":[110],"paper,":[111],"we":[112,188],"use":[113],"traces":[115],"from":[116,228],"our":[117,213],"UMass":[118],"DieselNet":[119],"project":[120,124],"Haggle":[123],"quantify":[126],"attack":[128,141],"effectiveness":[129],"on":[130],"lacks":[134],"security.":[135],"We":[136,152,202],"introduce":[137],"plausible":[138],"attackers":[139],"modalities":[142],"provide":[144,163],"results":[146],"strongest":[149],"attackers.":[151],"show":[153,189],"same":[156],"packet":[159],"replication":[160],"used":[161],"robustness":[164],"face":[167],"unpredictable":[169],"mobility":[170],"allows":[171],"gracefully":[175],"survive":[176],"attacks.":[177],"case":[180],"most":[183],"effective":[184],"attack,":[185],"acknowledgment":[186],"counterfeiting,":[187],"straightforward":[191],"defense":[192],"uses":[194],"cryptographic":[195],"hashes":[196],"but":[197],"not":[198],"central":[200],"authority.":[201],"conclude":[203],"disruption-tolerant":[205],"networks":[206,244],"extremely":[208],"robust":[209],"attack;":[211],"trace-driven":[214],"evaluations,":[215],"an":[216],"has":[219],"compromised":[220],"30%":[221],"all":[223],"reduces":[225],"delivery":[226],"rates":[227],"70%":[229],"55%,":[231],"20%":[234],"knowledge":[236],"future":[238],"events.":[239],"By":[240],"comparison,":[241],"contemporaneously":[242],"significantly":[246],"more":[247],"fragile.":[248]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":11},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":10}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
