{"id":"https://openalex.org/W1966851886","doi":"https://doi.org/10.1155/2013/768489","title":"Logic-Based Security Architecture for Systems Providing Multihop Communication","display_name":"Logic-Based Security Architecture for Systems Providing Multihop Communication","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W1966851886","doi":"https://doi.org/10.1155/2013/768489","mag":"1966851886"},"language":"en","primary_location":{"id":"doi:10.1155/2013/768489","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2013/768489","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1155/2013/768489","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journals.sagepub.com/doi/pdf/10.1155/2013/768489","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041848850","display_name":"Iman Almomani","orcid":"https://orcid.org/0000-0003-4639-516X"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Iman Almomani","raw_affiliation_strings":["Computer Science Department, King Abdullah II School for Information Technology, The University of Jordan, Amman 11942, Jordan","1 Computer Science Department, King Abdullah II School for Information Technology, The University of Jordan, Amman 11942, Jordan"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, King Abdullah II School for Information Technology, The University of Jordan, Amman 11942, Jordan","institution_ids":["https://openalex.org/I114972647"]},{"raw_affiliation_string":"1 Computer Science Department, King Abdullah II School for Information Technology, The University of Jordan, Amman 11942, Jordan","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051168932","display_name":"Eman Al-Banna","orcid":null},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Eman Al-Banna","raw_affiliation_strings":["Computer Science Department, King Abdullah II School for Information Technology, The University of Jordan, Amman 11942, Jordan","1 Computer Science Department, King Abdullah II School for Information Technology, The University of Jordan, Amman 11942, Jordan"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, King Abdullah II School for Information Technology, The University of Jordan, Amman 11942, Jordan","institution_ids":["https://openalex.org/I114972647"]},{"raw_affiliation_string":"1 Computer Science Department, King Abdullah II School for Information Technology, The University of Jordan, Amman 11942, Jordan","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014182270","display_name":"Mousa Al-Akhras","orcid":"https://orcid.org/0000-0002-2208-372X"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mousa AL-Akhras","raw_affiliation_strings":["Computer Information Systems Department, King Abdullah II School for Information Technology, The University of Jordan, Amman 11942, Jordan","2 Computer Information Systems Department, King Abdullah II School for Information Technology, The University of Jordan, Amman 11942, Jordan"],"affiliations":[{"raw_affiliation_string":"Computer Information Systems Department, King Abdullah II School for Information Technology, The University of Jordan, Amman 11942, Jordan","institution_ids":["https://openalex.org/I114972647"]},{"raw_affiliation_string":"2 Computer Information Systems Department, King Abdullah II School for Information Technology, The University of Jordan, Amman 11942, Jordan","institution_ids":["https://openalex.org/I114972647"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5041848850"],"corresponding_institution_ids":["https://openalex.org/I114972647"],"apc_list":{"value":2200,"currency":"USD","value_usd":2200},"apc_paid":{"value":2200,"currency":"USD","value_usd":2200},"fwci":0.38,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.6397883,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"9","issue":"1","first_page":"768489","last_page":"768489"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8803248405456543},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.687656819820404},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.6319457292556763},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.5995144248008728},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.5898425579071045},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.5808220505714417},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5129446387290955},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4855446517467499},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47040873765945435},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.4661385416984558},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46512529253959656},{"id":"https://openalex.org/keywords/distributed-system-security-architecture","display_name":"Distributed System Security Architecture","score":0.4643592834472656},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3913925290107727},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37229013442993164},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3116414546966553},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.29442712664604187},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.20226231217384338},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.156867116689682},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10245096683502197},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.09688305854797363}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8803248405456543},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.687656819820404},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.6319457292556763},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.5995144248008728},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.5898425579071045},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.5808220505714417},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5129446387290955},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4855446517467499},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47040873765945435},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.4661385416984558},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46512529253959656},{"id":"https://openalex.org/C77290126","wikidata":"https://www.wikidata.org/wiki/Q5283128","display_name":"Distributed System Security Architecture","level":5,"score":0.4643592834472656},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3913925290107727},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37229013442993164},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3116414546966553},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.29442712664604187},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.20226231217384338},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.156867116689682},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10245096683502197},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.09688305854797363},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2013/768489","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2013/768489","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1155/2013/768489","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:sae:intdis:v:9:y:2013:i:1:p:768489","is_oa":false,"landing_page_url":"https://journals.sagepub.com/doi/10.1155/2013/768489","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:edc95928dc674ad4b9ea43f03fde8e2e","is_oa":true,"landing_page_url":"https://doaj.org/article/edc95928dc674ad4b9ea43f03fde8e2e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Journal of Distributed Sensor Networks, Vol 9 (2013)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2013/768489","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2013/768489","pdf_url":"https://journals.sagepub.com/doi/pdf/10.1155/2013/768489","source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1966851886.pdf","grobid_xml":"https://content.openalex.org/works/W1966851886.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W1968548714","https://openalex.org/W1976057180","https://openalex.org/W1988647585","https://openalex.org/W1991085086","https://openalex.org/W1997098333","https://openalex.org/W2025630281","https://openalex.org/W2027232457","https://openalex.org/W2027524273","https://openalex.org/W2050727098","https://openalex.org/W2054702704","https://openalex.org/W2056181025","https://openalex.org/W2063127731","https://openalex.org/W2105042273","https://openalex.org/W2105918178","https://openalex.org/W2110081058","https://openalex.org/W2121192848","https://openalex.org/W2127931941","https://openalex.org/W2145745196","https://openalex.org/W2146973388","https://openalex.org/W2150865951","https://openalex.org/W2151461610","https://openalex.org/W2157283388","https://openalex.org/W2161219541","https://openalex.org/W2163758100","https://openalex.org/W2168677351","https://openalex.org/W2252814878","https://openalex.org/W2285044945","https://openalex.org/W2295606730","https://openalex.org/W2506519536","https://openalex.org/W3000670419"],"related_works":["https://openalex.org/W2112397448","https://openalex.org/W2008985775","https://openalex.org/W422595749","https://openalex.org/W2979370664","https://openalex.org/W2784006287","https://openalex.org/W198076453","https://openalex.org/W2515916393","https://openalex.org/W99985435","https://openalex.org/W4238669181","https://openalex.org/W2900565524"],"abstract_inverted_index":{"Security":[0],"is":[1,31,54,63,99,154,199],"a":[2,48,55,61,103,182],"basic":[3],"element":[4],"of":[5,97,161],"distributed":[6],"systems":[7],"such":[8,23],"as":[9,24,181],"ad":[10],"hoc":[11],"and":[12,21,28,35,75,132,137,139,151,185],"sensor":[13],"communication":[14],"networks.":[15],"Several":[16],"standards":[17],"define":[18],"security":[19,41,50,68,104,135,143,149,174],"requirements":[20,42,69,144,150],"enforcers,":[22],"ITU-T":[25],"Recommendations":[26],"X.800":[27],"X.805.":[29],"It":[30],"essential":[32],"to":[33,38,58,90,106,157,169,188,194],"specify":[34],"analyze":[36],"protocols":[37,138],"know":[39],"which":[40,77,142],"they":[43,145,172],"achieve.":[44,146],"This":[45,128],"paper":[46,129],"presents":[47],"logic-based":[49],"architecture":[51,193],"(LBSA).":[52],"LBSA":[53,82,98,115,168,192],"systematic":[56],"way":[57],"test":[59],"if":[60],"protocol":[62,105,180,198],"secure":[64],"by":[65,114,125],"checking":[66],"what":[67],"are":[70,83,87,165],"achieved.":[71],"Different":[72],"rules,":[73],"actions,":[74],"sets":[76],"fit":[78],"into":[79],"the":[80,92,159,190],"proposed":[81,191],"included,":[84],"new":[85],"ones":[86],"also":[88,130,155],"added":[89],"complete":[91],"architecture.":[93],"The":[94],"key":[95],"advantage":[96],"that":[100,119,196],"it":[101],"enables":[102],"prove":[107,195],"its":[108],"correctness":[109],"mathematically.":[110],"Mathematical":[111],"proofs":[112],"provided":[113,156],"cover":[116],"more":[117],"cases":[118],"usually":[120],"cannot":[121],"be":[122],"covered":[123],"exhaustively":[124],"simulation":[126],"tools.":[127],"specifies":[131],"analyzes":[133],"several":[134],"enforcers":[136,164],"mathematically":[140],"proves":[141],"Mapping":[147],"between":[148],"inference":[152],"rules/actions":[153],"facilitate":[158],"use":[160,189],"LBSA.":[162],"Some":[163],"analyzed":[166],"using":[167],"demonstrate":[170],"how":[171,187],"achieve":[173],"requirements.":[175],"Finally,":[176],"we":[177],"take":[178],"Ariadne":[179],"case":[183],"study":[184],"show":[186],"this":[197],"secure.":[200]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
