{"id":"https://openalex.org/W2135874496","doi":"https://doi.org/10.1145/1514274.1514302","title":"A practical secure neighbor verification protocol for wireless sensor networks","display_name":"A practical secure neighbor verification protocol for wireless sensor networks","publication_year":2009,"publication_date":"2009-03-16","ids":{"openalex":"https://openalex.org/W2135874496","doi":"https://doi.org/10.1145/1514274.1514302","mag":"2135874496"},"language":"en","primary_location":{"id":"doi:10.1145/1514274.1514302","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1514274.1514302","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the second ACM conference on Wireless network security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-35583","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084892128","display_name":"Reza Shokri","orcid":"https://orcid.org/0000-0001-9816-0173"},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Reza Shokri","raw_affiliation_strings":["Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland","Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland#TAB#"],"affiliations":[{"raw_affiliation_string":"Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland","institution_ids":["https://openalex.org/I5124864"]},{"raw_affiliation_string":"Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland#TAB#","institution_ids":["https://openalex.org/I5124864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041951502","display_name":"Marcin Poturalski","orcid":null},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Marcin Poturalski","raw_affiliation_strings":["Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland","Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland#TAB#"],"affiliations":[{"raw_affiliation_string":"Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland","institution_ids":["https://openalex.org/I5124864"]},{"raw_affiliation_string":"Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland#TAB#","institution_ids":["https://openalex.org/I5124864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075448894","display_name":"Gael Ravot","orcid":null},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Gael Ravot","raw_affiliation_strings":["Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland","Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland#TAB#"],"affiliations":[{"raw_affiliation_string":"Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland","institution_ids":["https://openalex.org/I5124864"]},{"raw_affiliation_string":"Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland#TAB#","institution_ids":["https://openalex.org/I5124864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030735377","display_name":"Panos Papadimitratos","orcid":"https://orcid.org/0000-0002-3267-5374"},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Panos Papadimitratos","raw_affiliation_strings":["Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland","Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland#TAB#"],"affiliations":[{"raw_affiliation_string":"Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland","institution_ids":["https://openalex.org/I5124864"]},{"raw_affiliation_string":"Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland#TAB#","institution_ids":["https://openalex.org/I5124864"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080497445","display_name":"Jean\u2010Pierre Hubaux","orcid":"https://orcid.org/0000-0003-1533-6132"},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Jean-Pierre Hubaux","raw_affiliation_strings":["Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland","Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland#TAB#"],"affiliations":[{"raw_affiliation_string":"Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland","institution_ids":["https://openalex.org/I5124864"]},{"raw_affiliation_string":"Laboratory for Computer Communications and Applications, EPFL, Lausanne, Switzerland#TAB#","institution_ids":["https://openalex.org/I5124864"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5084892128"],"corresponding_institution_ids":["https://openalex.org/I5124864"],"apc_list":null,"apc_paid":null,"fwci":8.3293,"has_fulltext":false,"cited_by_count":59,"citation_normalized_percentile":{"value":0.97786048,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"193","last_page":"200"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8164315223693848},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.721467137336731},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6528451442718506},{"id":"https://openalex.org/keywords/neighbor-discovery-protocol","display_name":"Neighbor Discovery Protocol","score":0.6229864954948425},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6071187257766724},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.5824921727180481},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5394499897956848},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.48063722252845764},{"id":"https://openalex.org/keywords/wormhole","display_name":"Wormhole","score":0.47942131757736206},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4726763367652893},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4685916304588318},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.4502984881401062},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.44244593381881714},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.43007606267929077},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.4253194332122803},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.41579556465148926},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4018319845199585},{"id":"https://openalex.org/keywords/internet-protocol","display_name":"Internet Protocol","score":0.1541537642478943},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.14577391743659973},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08544120192527771}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8164315223693848},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.721467137336731},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6528451442718506},{"id":"https://openalex.org/C165932591","wikidata":"https://www.wikidata.org/wiki/Q1547947","display_name":"Neighbor Discovery Protocol","level":4,"score":0.6229864954948425},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6071187257766724},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.5824921727180481},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5394499897956848},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.48063722252845764},{"id":"https://openalex.org/C29013271","wikidata":"https://www.wikidata.org/wiki/Q7544","display_name":"Wormhole","level":2,"score":0.47942131757736206},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4726763367652893},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4685916304588318},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.4502984881401062},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.44244593381881714},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.43007606267929077},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.4253194332122803},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41579556465148926},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4018319845199585},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.1541537642478943},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14577391743659973},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08544120192527771},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/1514274.1514302","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1514274.1514302","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the second ACM conference on Wireless network security","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.140.4784","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.4784","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://icapeople.epfl.ch/panos/wisec2009-SND.pdf","raw_type":"text"},{"id":"pmh:oai:DiVA.org:kth-35583","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-35583","pdf_url":null,"source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference paper"},{"id":"pmh:oai:infoscience.epfl.ch:131022","is_oa":true,"landing_page_url":"http://infoscience.epfl.ch/record/131022","pdf_url":null,"source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:DiVA.org:kth-35583","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-35583","pdf_url":null,"source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference paper"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W189149407","https://openalex.org/W317521241","https://openalex.org/W1534062543","https://openalex.org/W1583345160","https://openalex.org/W1594533624","https://openalex.org/W1985671681","https://openalex.org/W2013665221","https://openalex.org/W2048402311","https://openalex.org/W2093830013","https://openalex.org/W2094636498","https://openalex.org/W2096128372","https://openalex.org/W2114989052","https://openalex.org/W2133372405","https://openalex.org/W2150298753","https://openalex.org/W2150411054","https://openalex.org/W2151993488","https://openalex.org/W2157087691","https://openalex.org/W2164947865","https://openalex.org/W2167930752","https://openalex.org/W3021571553"],"related_works":["https://openalex.org/W1559812758","https://openalex.org/W4248001395","https://openalex.org/W1645600878","https://openalex.org/W4298717831","https://openalex.org/W2126067753","https://openalex.org/W2042960896","https://openalex.org/W2962837023","https://openalex.org/W2289381772","https://openalex.org/W4300007323","https://openalex.org/W2120383904"],"abstract_inverted_index":{"Wireless":[0,99],"networking":[1],"relies":[2,105],"on":[3,73,106],"a":[4,90,135],"fundamental":[5],"building":[6],"block,":[7],"neighbor":[8,94],"discovery":[9],"(ND).":[10],"The":[11],"nature":[12],"of":[13],"wireless":[14],"communications,":[15],"however,":[16],"makes":[17],"attacks":[18,45],"against":[19,126],"ND":[20],"easy:":[21],"An":[22],"adversary":[23],"can":[24,46],"simply":[25],"replay":[26],"or":[27,76,78],"relay":[28],"(wormhole)":[29],"packets":[30],"across":[31],"the":[32,48,56,127],"network":[33],"and":[34,51,92,111,115],"mislead":[35],"disconnected":[36],"nodes":[37,63,110],"into":[38],"believing":[39],"that":[40],"they":[41,66,70],"communicate":[42],"directly.":[43],"Such":[44],"compromise":[47],"overlying":[49],"protocols":[50],"applications.":[52],"Proposed":[53],"methods":[54],"in":[55],"literature":[57],"seek":[58],"to":[59,64],"secure":[60,93,125],"ND,":[61],"allowing":[62],"verify":[65],"are":[67],"neighbors.":[68],"However,":[69],"either":[71],"rely":[72],"specialized":[74],"hardware":[75],"infrastructure,":[77],"offer":[79],"limited":[80],"security.":[81],"In":[82],"this":[83],"paper,":[84],"we":[85,133],"address":[86],"these":[87],"problems,":[88],"designing":[89],"practical":[91],"verification":[95],"protocol":[96,123],"for":[97],"constrained":[98],"Sensor":[100],"networks":[101],"(WSNs).":[102],"Our":[103],"scheme":[104],"estimated":[107],"distance":[108],"between":[109],"simple":[112],"geometric":[113],"tests,":[114],"it":[116],"is":[117,124],"fully":[118],"distributed.":[119],"We":[120],"prove":[121],"our":[122],"classic":[128],"2-end":[129],"wormhole":[130],"attack.":[131],"Moreover,":[132],"provide":[134],"proof-of-concept":[136],"implementation":[137],"with":[138],"off-the-shelf":[139],"WSN":[140],"equipment:":[141],"Cricket":[142],"motes.":[143]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":8},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":7},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":7}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
