{"id":"https://openalex.org/W2129886986","doi":"https://doi.org/10.1155/2014/591920","title":"A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network","display_name":"A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2129886986","doi":"https://doi.org/10.1155/2014/591920","mag":"2129886986"},"language":"en","primary_location":{"id":"doi:10.1155/2014/591920","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2014/591920","pdf_url":"https://downloads.hindawi.com/journals/jcnc/2014/591920.pdf","source":{"id":"https://openalex.org/S2764435486","display_name":"Journal of Computer Networks and Communications","issn_l":"2090-7141","issn":["2090-7141","2090-715X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Networks and Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://downloads.hindawi.com/journals/jcnc/2014/591920.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012086009","display_name":"Claudio S. Malavenda","orcid":"https://orcid.org/0000-0003-0664-5208"},"institutions":[{"id":"https://openalex.org/I76806421","display_name":"SELEX Sistemi Integrati","ror":"https://ror.org/02sj0zy88","country_code":"IT","type":"company","lineage":["https://openalex.org/I76806421"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Claudio S. Malavenda","raw_affiliation_strings":["Selex ES, Via Tiburtina Km 12,400, 00131 Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Selex ES, Via Tiburtina Km 12,400, 00131 Rome, Italy","institution_ids":["https://openalex.org/I76806421"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045257843","display_name":"Francesco Menichelli","orcid":null},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"F. Menichelli","raw_affiliation_strings":["Sapienza University of Rome, Via Eudossiana 18, 00184 Rome, Italy","Engineering, Electronics and Telecommunications"],"affiliations":[{"raw_affiliation_string":"Sapienza University of Rome, Via Eudossiana 18, 00184 Rome, Italy","institution_ids":["https://openalex.org/I861853513"]},{"raw_affiliation_string":"Engineering, Electronics and Telecommunications","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067054447","display_name":"Mauro Olivieri","orcid":"https://orcid.org/0000-0002-0214-9904"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"M. Olivieri","raw_affiliation_strings":["Sapienza University of Rome, Via Eudossiana 18, 00184 Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Sapienza University of Rome, Via Eudossiana 18, 00184 Rome, Italy","institution_ids":["https://openalex.org/I861853513"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5045257843"],"corresponding_institution_ids":["https://openalex.org/I861853513"],"apc_list":{"value":1400,"currency":"USD","value_usd":1400},"apc_paid":{"value":1400,"currency":"USD","value_usd":1400},"fwci":1.0344,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.81130366,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2014","issue":null,"first_page":"1","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8888700604438782},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6829298734664917},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5598315596580505},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5451471209526062},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.5377184748649597},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5027289390563965},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.49806785583496094},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.465853750705719},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.4268917441368103},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.21469545364379883},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1534830927848816}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8888700604438782},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6829298734664917},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5598315596580505},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5451471209526062},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.5377184748649597},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5027289390563965},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.49806785583496094},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.465853750705719},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.4268917441368103},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.21469545364379883},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1534830927848816},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2014/591920","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2014/591920","pdf_url":"https://downloads.hindawi.com/journals/jcnc/2014/591920.pdf","source":{"id":"https://openalex.org/S2764435486","display_name":"Journal of Computer Networks and Communications","issn_l":"2090-7141","issn":["2090-7141","2090-715X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Networks and Communications","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3fc580ddfb8c42df9bd68c6cdc972ecf","is_oa":true,"landing_page_url":"https://doaj.org/article/3fc580ddfb8c42df9bd68c6cdc972ecf","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Computer Networks and Communications, Vol 2014 (2014)","raw_type":"article"},{"id":"pmh:oai:iris.uniroma1.it:11573/625584","is_oa":true,"landing_page_url":"http://hdl.handle.net/11573/625584","pdf_url":null,"source":{"id":"https://openalex.org/S4377196107","display_name":"IRIS Research product catalog (Sapienza University of Rome)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1155/2014/591920","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2014/591920","pdf_url":"https://downloads.hindawi.com/journals/jcnc/2014/591920.pdf","source":{"id":"https://openalex.org/S2764435486","display_name":"Journal of Computer Networks and Communications","issn_l":"2090-7141","issn":["2090-7141","2090-715X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Networks and Communications","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2129886986.pdf","grobid_xml":"https://content.openalex.org/works/W2129886986.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W1494290749","https://openalex.org/W1520610471","https://openalex.org/W1601456732","https://openalex.org/W1676584033","https://openalex.org/W1932124839","https://openalex.org/W1970123348","https://openalex.org/W1971971880","https://openalex.org/W2000548713","https://openalex.org/W2026969698","https://openalex.org/W2033751220","https://openalex.org/W2099574482","https://openalex.org/W2100441850","https://openalex.org/W2102082762","https://openalex.org/W2114495437","https://openalex.org/W2128381560","https://openalex.org/W2131152570","https://openalex.org/W2137622216","https://openalex.org/W2139180402","https://openalex.org/W2140372921","https://openalex.org/W2145544977","https://openalex.org/W2148922257","https://openalex.org/W2149838554","https://openalex.org/W2164060202","https://openalex.org/W2165491783","https://openalex.org/W2167137530","https://openalex.org/W2220048921","https://openalex.org/W2262588884","https://openalex.org/W2592168804","https://openalex.org/W2975825783","https://openalex.org/W3103987592"],"related_works":["https://openalex.org/W2500106866","https://openalex.org/W1975451135","https://openalex.org/W2282990539","https://openalex.org/W2358638783","https://openalex.org/W2252724828","https://openalex.org/W2379701766","https://openalex.org/W3156271395","https://openalex.org/W1533722674","https://openalex.org/W1530940119","https://openalex.org/W2766896269"],"abstract_inverted_index":{"This":[0,88],"article":[1],"presents":[2],"a":[3,68,76,94,113,140],"novel":[4],"approach":[5,89],"to":[6,62,79,92,129,145,158],"the":[7,17,26,38,130,137,152,161],"analysis":[8,27,50],"of":[9,30,70,116,132],"wireless":[10,21],"sensor":[11],"networks":[12],"(WSN)":[13],"security,":[14],"based":[15,52],"on":[16,41,53],"regulations":[18],"intended":[19],"for":[20,45,101,125,164],"communication":[22,43],"devices.":[23],"Starting":[24],"from":[25,67],"and":[28,33,57,98],"classification":[29,99],"attacks,":[31,73],"countermeasures,":[32],"available":[34],"protocols,":[35,128],"we":[36,74,155],"present":[37,112],"current":[39,108],"state":[40],"secure":[42],"stacks":[44],"embedded":[46],"systems.":[47],"The":[48,104],"regulation":[49],"is":[51,122,136,143],"civil":[54],"EN":[55],"50150":[56],"MIL":[58],"STD-188-220,":[59],"both":[60],"applicable":[61],"WSN":[63,72,81,102,127,166],"communications.":[64],"Afterwards,":[65],"starting":[66],"list":[69],"known":[71,124],"use":[75],"correspondence":[77],"table":[78],"match":[80],"attacks":[82],"with":[83],"countermeasures":[84],"required":[85],"by":[86,150],"regulations.":[87],"allows":[90],"us":[91],"produce":[93],"precise":[95],"security":[96,117],"evaluation":[97],"methodology":[100,142],"protocols.":[103],"results":[105],"show":[106],"that":[107],"protocols":[109],"do":[110],"not":[111],"complete":[114,141],"coverage":[115],"issues.":[118],"While":[119],"this":[120,135,147],"conclusion":[121],"already":[123],"many":[126],"best":[131],"our":[133],"knowledge":[134],"first":[138],"time":[139],"proposed":[144,153],"base":[146],"assertion.":[148],"Moreover,":[149],"using":[151],"methodology,":[154],"are":[156],"able":[157],"precisely":[159],"identify":[160],"exposed":[162],"threats":[163],"each":[165],"protocol":[167],"under":[168],"analysis.":[169]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
