{"id":"https://openalex.org/W2124807054","doi":"https://doi.org/10.1145/2462096.2462120","title":"Adversarial testing of wireless routing implementations","display_name":"Adversarial testing of wireless routing implementations","publication_year":2013,"publication_date":"2013-04-16","ids":{"openalex":"https://openalex.org/W2124807054","doi":"https://doi.org/10.1145/2462096.2462120","mag":"2124807054"},"language":"en","primary_location":{"id":"doi:10.1145/2462096.2462120","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2462096.2462120","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102093723","display_name":"Md. Endadul Hoque","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Md. Endadul Hoque","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101581546","display_name":"Hyojeong Lee","orcid":"https://orcid.org/0000-0001-8283-5471"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hyojeong Lee","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080951829","display_name":"Rahul Potharaju","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rahul Potharaju","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103697281","display_name":"Charles Killian","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Charles E. Killian","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034838576","display_name":"Cristina Nita-Rotaru","orcid":"https://orcid.org/0000-0002-9649-6789"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cristina Nita-Rotaru","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102093723"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":2.4302,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.89355993,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"143","last_page":"148"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8176876306533813},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7183901071548462},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.6280109286308289},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5689395666122437},{"id":"https://openalex.org/keywords/dynamic-source-routing","display_name":"Dynamic Source Routing","score":0.4831687808036804},{"id":"https://openalex.org/keywords/static-routing","display_name":"Static routing","score":0.46172019839286804},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.437951922416687},{"id":"https://openalex.org/keywords/policy-based-routing","display_name":"Policy-based routing","score":0.4354332983493805},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.4302263855934143},{"id":"https://openalex.org/keywords/link-state-routing-protocol","display_name":"Link-state routing protocol","score":0.4212021231651306}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8176876306533813},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7183901071548462},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.6280109286308289},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5689395666122437},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.4831687808036804},{"id":"https://openalex.org/C204948658","wikidata":"https://www.wikidata.org/wiki/Q1119410","display_name":"Static routing","level":4,"score":0.46172019839286804},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.437951922416687},{"id":"https://openalex.org/C196423136","wikidata":"https://www.wikidata.org/wiki/Q7209671","display_name":"Policy-based routing","level":5,"score":0.4354332983493805},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.4302263855934143},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.4212021231651306},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2462096.2462120","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2462096.2462120","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W115429978","https://openalex.org/W162810358","https://openalex.org/W199779285","https://openalex.org/W207759855","https://openalex.org/W1515250855","https://openalex.org/W1517173520","https://openalex.org/W1834470623","https://openalex.org/W1973883609","https://openalex.org/W2023272701","https://openalex.org/W2028960556","https://openalex.org/W2099574482","https://openalex.org/W2109334958","https://openalex.org/W2115309705","https://openalex.org/W2117009500","https://openalex.org/W2123861314","https://openalex.org/W2125367520","https://openalex.org/W2127931941","https://openalex.org/W2132082225","https://openalex.org/W2132826554","https://openalex.org/W2135057483","https://openalex.org/W2138703291","https://openalex.org/W2145998704","https://openalex.org/W2157283388","https://openalex.org/W2157457404","https://openalex.org/W2162338299","https://openalex.org/W2167518846","https://openalex.org/W2495067601","https://openalex.org/W3160107060","https://openalex.org/W4251167975","https://openalex.org/W6604836748","https://openalex.org/W6675315432"],"related_works":["https://openalex.org/W1997091564","https://openalex.org/W2102655743","https://openalex.org/W2607223747","https://openalex.org/W2081964190","https://openalex.org/W2117123509","https://openalex.org/W2082566976","https://openalex.org/W2012247215","https://openalex.org/W3193458326","https://openalex.org/W2372626604","https://openalex.org/W2740434786"],"abstract_inverted_index":{"We":[0,13],"focus":[1],"on":[2,86],"automated":[3],"adversarial":[4],"testing":[5],"of":[6,9,28,79,90],"real-world":[7],"implementations":[8,89],"wireless":[10,29,45,80],"routing":[11,30,38,54,93],"protocols.":[12,31],"extend":[14],"an":[15],"existing":[16],"platform,":[17,62],"Turret,":[18],"designed":[19],"for":[20],"general":[21],"distributed":[22],"systems,":[23],"to":[24,36,68,75],"address":[25],"the":[26,84],"specifics":[27],"Specifically,":[32],"we":[33,95],"add":[34],"functionality":[35],"differentiate":[37],"messages":[39,42],"from":[40],"data":[41],"and":[43,51,73,99],"support":[44],"specific":[46],"attacks":[47,55,98],"such":[48,56],"as":[49,57],"blackhole":[50],"wormhole,":[52],"or":[53],"replay":[58],"attacks.":[59],"The":[60],"extended":[61],"Turret-W,":[63],"uses":[64],"a":[65],"network":[66,71],"emulator":[67],"create":[69],"reproducible":[70],"conditions":[72],"virtualization":[74],"run":[76],"unmodified":[77],"binaries":[78],"protocol":[81],"implementations.":[82],"Using":[83],"platform":[85],"publicly":[87],"available":[88],"two":[91],"representative":[92],"protocols":[94],"(re-)discovered":[96],"14":[97],"3":[100],"bugs.":[101]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
