{"id":"https://openalex.org/W2090483866","doi":"https://doi.org/10.1145/2185216.2185307","title":"FRI-attack","display_name":"FRI-attack","publication_year":2011,"publication_date":"2011-12-18","ids":{"openalex":"https://openalex.org/W2090483866","doi":"https://doi.org/10.1145/2185216.2185307","mag":"2090483866"},"language":"en","primary_location":{"id":"doi:10.1145/2185216.2185307","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2185216.2185307","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061302597","display_name":"Rakesh Matam","orcid":"https://orcid.org/0000-0002-1825-2914"},"institutions":[{"id":"https://openalex.org/I132153292","display_name":"Indian Institute of Technology Patna","ror":"https://ror.org/01ft5vz71","country_code":"IN","type":"education","lineage":["https://openalex.org/I132153292"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rakesh Matam","raw_affiliation_strings":["Indian Institute of Technology Patna Patna, Bihar","Indian Institute of Technology Patna, Patna, Bihar"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Patna Patna, Bihar","institution_ids":["https://openalex.org/I132153292"]},{"raw_affiliation_string":"Indian Institute of Technology Patna, Patna, Bihar","institution_ids":["https://openalex.org/I132153292"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071224481","display_name":"Somanath Tripathy","orcid":"https://orcid.org/0000-0002-6964-2648"},"institutions":[{"id":"https://openalex.org/I132153292","display_name":"Indian Institute of Technology Patna","ror":"https://ror.org/01ft5vz71","country_code":"IN","type":"education","lineage":["https://openalex.org/I132153292"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Somanath Tripathy","raw_affiliation_strings":["Indian Institute of Technology Patna Patna, Bihar","Indian Institute of Technology Patna, Patna, Bihar"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Patna Patna, Bihar","institution_ids":["https://openalex.org/I132153292"]},{"raw_affiliation_string":"Indian Institute of Technology Patna, Patna, Bihar","institution_ids":["https://openalex.org/I132153292"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5061302597"],"corresponding_institution_ids":["https://openalex.org/I132153292"],"apc_list":null,"apc_paid":null,"fwci":0.7002,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.72783902,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"335","last_page":"338"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-mesh-network","display_name":"Wireless mesh network","score":0.9452977776527405},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8151787519454956},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7843993902206421},{"id":"https://openalex.org/keywords/packet-drop-attack","display_name":"Packet drop attack","score":0.6035557985305786},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5473095178604126},{"id":"https://openalex.org/keywords/mesh-networking","display_name":"Mesh networking","score":0.5326943397521973},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5222142934799194},{"id":"https://openalex.org/keywords/order-one-network-protocol","display_name":"Order One Network Protocol","score":0.5203585028648376},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5158728361129761},{"id":"https://openalex.org/keywords/switched-mesh","display_name":"Switched mesh","score":0.45633500814437866},{"id":"https://openalex.org/keywords/shared-mesh","display_name":"Shared mesh","score":0.44714248180389404},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.37121033668518066},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3632773458957672},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34677889943122864},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.3292853832244873},{"id":"https://openalex.org/keywords/dynamic-source-routing","display_name":"Dynamic Source Routing","score":0.16859331727027893},{"id":"https://openalex.org/keywords/link-state-routing-protocol","display_name":"Link-state routing protocol","score":0.1402241289615631},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11120432615280151},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11071595549583435}],"concepts":[{"id":"https://openalex.org/C31548570","wikidata":"https://www.wikidata.org/wiki/Q6453712","display_name":"Wireless mesh network","level":4,"score":0.9452977776527405},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8151787519454956},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7843993902206421},{"id":"https://openalex.org/C35546906","wikidata":"https://www.wikidata.org/wiki/Q2900718","display_name":"Packet drop attack","level":5,"score":0.6035557985305786},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5473095178604126},{"id":"https://openalex.org/C123691950","wikidata":"https://www.wikidata.org/wiki/Q25552104","display_name":"Mesh networking","level":3,"score":0.5326943397521973},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5222142934799194},{"id":"https://openalex.org/C124255616","wikidata":"https://www.wikidata.org/wiki/Q7100423","display_name":"Order One Network Protocol","level":5,"score":0.5203585028648376},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5158728361129761},{"id":"https://openalex.org/C165323707","wikidata":"https://www.wikidata.org/wiki/Q7659102","display_name":"Switched mesh","level":5,"score":0.45633500814437866},{"id":"https://openalex.org/C37427157","wikidata":"https://www.wikidata.org/wiki/Q7489552","display_name":"Shared mesh","level":5,"score":0.44714248180389404},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.37121033668518066},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3632773458957672},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34677889943122864},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.3292853832244873},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.16859331727027893},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.1402241289615631},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11120432615280151},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11071595549583435},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2185216.2185307","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2185216.2185307","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1549535141","https://openalex.org/W1999572234","https://openalex.org/W2041248965","https://openalex.org/W2104554508","https://openalex.org/W2127699957","https://openalex.org/W2132082225","https://openalex.org/W2135057483","https://openalex.org/W2149157877","https://openalex.org/W2150825860","https://openalex.org/W3048384332"],"related_works":["https://openalex.org/W1572406879","https://openalex.org/W4319302693","https://openalex.org/W2757691190","https://openalex.org/W2114284183","https://openalex.org/W2088748318","https://openalex.org/W2145075150","https://openalex.org/W2145803479","https://openalex.org/W2810292777","https://openalex.org/W3116030847","https://openalex.org/W2351674249"],"abstract_inverted_index":{"Wireless":[0],"mesh":[1,12,26],"network":[2,8],"(WMN)":[3],"is":[4],"a":[5,46,65],"multihop":[6],"wireless":[7],"in":[9,53,99],"which":[10,33,54],"the":[11,22,25,61,77,78,84,91,97],"nodes":[13,27],"are":[14,28,102],"spread":[15],"over":[16],"large":[17],"area.":[18],"In":[19,41],"most":[20],"of":[21,49,76,86],"WMN":[23,100],"applications":[24],"maintained":[29],"by":[30],"different":[31],"operators":[32],"lack":[34],"cooperation":[35],"and":[36,101],"prone":[37],"to":[38,96,104],"several":[39],"attacks.":[40],"this":[42,105],"paper,":[43],"we":[44,72],"present":[45],"new":[47],"form":[48],"attack":[50],"called":[51],"FRI-Attack,":[52],"an":[55],"external":[56],"attacker":[57],"can":[58,89],"drop":[59],"all":[60],"data":[62],"communications":[63],"with":[64],"single":[66],"compromised":[67],"insider":[68],"(mesh":[69],"node).":[70],"Further,":[71],"show":[73],"that":[74],"none":[75],"existing":[79],"secure":[80],"routing":[81],"frameworks":[82],"(to":[83],"best":[85],"our":[87],"knowledge)":[88],"handle":[90],"malicious":[92],"packet":[93],"dropping":[94],"due":[95],"FRI-Attack":[98],"vulnerable":[103],"newly":[106],"identified":[107],"attack.":[108]},"counts_by_year":[{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
