{"id":"https://openalex.org/W2791900462","doi":"https://doi.org/10.1155/2018/8071267","title":"Secure and DoS\u2010Resilient Fragment Authentication in CCN\u2010Based Vehicular Networks","display_name":"Secure and DoS\u2010Resilient Fragment Authentication in CCN\u2010Based Vehicular Networks","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2791900462","doi":"https://doi.org/10.1155/2018/8071267","mag":"2791900462"},"language":"en","primary_location":{"id":"doi:10.1155/2018/8071267","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2018/8071267","pdf_url":"http://downloads.hindawi.com/journals/wcmc/2018/8071267.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://downloads.hindawi.com/journals/wcmc/2018/8071267.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102992568","display_name":"Sangwon Hyun","orcid":"https://orcid.org/0000-0003-2265-4518"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]},{"id":"https://openalex.org/I97750245","display_name":"Software (Spain)","ror":"https://ror.org/02ethns06","country_code":"ES","type":"company","lineage":["https://openalex.org/I4210087817","https://openalex.org/I97750245"]}],"countries":["ES","KR"],"is_corresponding":false,"raw_author_name":"Sangwon Hyun","raw_affiliation_strings":["Department of Software, Sungkyunkwan University, Suwon 16419, Republic of Korea","Department of Software, Sungkyunkwan University, Suwon 16419"],"affiliations":[{"raw_affiliation_string":"Department of Software, Sungkyunkwan University, Suwon 16419, Republic of Korea","institution_ids":["https://openalex.org/I848706"]},{"raw_affiliation_string":"Department of Software, Sungkyunkwan University, Suwon 16419","institution_ids":["https://openalex.org/I848706","https://openalex.org/I97750245"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016563574","display_name":"Hyoungshick Kim","orcid":"https://orcid.org/0000-0002-1605-3866"},"institutions":[{"id":"https://openalex.org/I97750245","display_name":"Software (Spain)","ror":"https://ror.org/02ethns06","country_code":"ES","type":"company","lineage":["https://openalex.org/I4210087817","https://openalex.org/I97750245"]},{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["ES","KR"],"is_corresponding":true,"raw_author_name":"Hyoungshick Kim","raw_affiliation_strings":["Department of Software, Sungkyunkwan University, Suwon 16419, Republic of Korea","Department of Software, Sungkyunkwan University, Suwon 16419"],"affiliations":[{"raw_affiliation_string":"Department of Software, Sungkyunkwan University, Suwon 16419, Republic of Korea","institution_ids":["https://openalex.org/I848706"]},{"raw_affiliation_string":"Department of Software, Sungkyunkwan University, Suwon 16419","institution_ids":["https://openalex.org/I848706","https://openalex.org/I97750245"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5016563574"],"corresponding_institution_ids":["https://openalex.org/I848706","https://openalex.org/I97750245"],"apc_list":{"value":2300,"currency":"USD","value_usd":2300},"apc_paid":{"value":2300,"currency":"USD","value_usd":2300},"fwci":0.0,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.02946052,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2018","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.883499026298523},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7735785245895386},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7075002193450928},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.690751850605011},{"id":"https://openalex.org/keywords/content-centric-networking","display_name":"Content centric networking","score":0.5956540107727051},{"id":"https://openalex.org/keywords/content-delivery","display_name":"Content delivery","score":0.5658573508262634},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5274988412857056},{"id":"https://openalex.org/keywords/fragment","display_name":"Fragment (logic)","score":0.4960046708583832},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.4879312217235565},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.42775222659111023},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35262858867645264},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3053484559059143},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.2390420138835907},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.21042147278785706},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.11240977048873901},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1119047999382019},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.07466256618499756}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.883499026298523},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7735785245895386},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7075002193450928},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.690751850605011},{"id":"https://openalex.org/C2779649860","wikidata":"https://www.wikidata.org/wiki/Q18206174","display_name":"Content centric networking","level":3,"score":0.5956540107727051},{"id":"https://openalex.org/C2986847828","wikidata":"https://www.wikidata.org/wiki/Q269415","display_name":"Content delivery","level":2,"score":0.5658573508262634},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5274988412857056},{"id":"https://openalex.org/C2776235265","wikidata":"https://www.wikidata.org/wiki/Q18392052","display_name":"Fragment (logic)","level":2,"score":0.4960046708583832},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.4879312217235565},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.42775222659111023},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35262858867645264},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3053484559059143},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.2390420138835907},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.21042147278785706},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.11240977048873901},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1119047999382019},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.07466256618499756},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2018/8071267","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2018/8071267","pdf_url":"http://downloads.hindawi.com/journals/wcmc/2018/8071267.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5daf538c68b5475bac18eaec57952a6b","is_oa":true,"landing_page_url":"https://doaj.org/article/5daf538c68b5475bac18eaec57952a6b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wireless Communications and Mobile Computing, Vol 2018 (2018)","raw_type":"article"},{"id":"pmh:oai:hindawi.com:10.1155/2018/8071267","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/8071267","pdf_url":null,"source":{"id":"https://openalex.org/S4306400340","display_name":"Hindawi Journal of Chemistry (Hindawi)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210126990","host_organization_name":"Hindawi (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210126990"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Research Article"}],"best_oa_location":{"id":"doi:10.1155/2018/8071267","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2018/8071267","pdf_url":"http://downloads.hindawi.com/journals/wcmc/2018/8071267.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1387461079","display_name":null,"funder_award_id":"NRF-2016R1A6A3A11930593","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"},{"id":"https://openalex.org/G1823356010","display_name":null,"funder_award_id":"IITP-2017-2015-0-00403","funder_id":"https://openalex.org/F4320322030","funder_display_name":"Ministry of Science, ICT and Future Planning"}],"funders":[{"id":"https://openalex.org/F4320322030","display_name":"Ministry of Science, ICT and Future Planning","ror":"https://ror.org/032e49973"},{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2791900462.pdf","grobid_xml":"https://content.openalex.org/works/W2791900462.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W1554812912","https://openalex.org/W1862105587","https://openalex.org/W1918162579","https://openalex.org/W1958032890","https://openalex.org/W1967984328","https://openalex.org/W1984778122","https://openalex.org/W1985839701","https://openalex.org/W1988342793","https://openalex.org/W1992517438","https://openalex.org/W2014952121","https://openalex.org/W2018793106","https://openalex.org/W2039915451","https://openalex.org/W2057230952","https://openalex.org/W2058972589","https://openalex.org/W2075120071","https://openalex.org/W2075638294","https://openalex.org/W2080284298","https://openalex.org/W2105205352","https://openalex.org/W2105889257","https://openalex.org/W2115104320","https://openalex.org/W2128765501","https://openalex.org/W2132206846","https://openalex.org/W2148575324","https://openalex.org/W2159587870","https://openalex.org/W2296125569","https://openalex.org/W2327226400","https://openalex.org/W2367132056","https://openalex.org/W2512103536","https://openalex.org/W3125100762","https://openalex.org/W4229922087"],"related_works":["https://openalex.org/W2964948631","https://openalex.org/W2973114901","https://openalex.org/W2104880446","https://openalex.org/W2162582538","https://openalex.org/W2002551309","https://openalex.org/W1607819073","https://openalex.org/W2216498415","https://openalex.org/W1974463172","https://openalex.org/W2122102131","https://openalex.org/W2021384881"],"abstract_inverted_index":{"Content\u2010Centric":[0],"Networking":[1],"(CCN)":[2],"is":[3,40,73,143],"considered":[4],"as":[5],"a":[6,66,123,133],"promising":[7],"alternative":[8],"to":[9,43,55,75],"traditional":[10],"IP\u2010based":[11],"networking":[12],"for":[13],"vehicle\u2010to\u2010everything":[14],"communication":[15],"environments.":[16],"In":[17],"general,":[18],"CCN":[19],"packets":[20,47],"must":[21],"be":[22],"fragmented":[23,46],"and":[24],"reassembled":[25],"based":[26],"on":[27,59,99,140],"the":[28,35,86,92,100,108,116,127],"Maximum":[29],"Transmission":[30],"Unit":[31],"(MTU)":[32],"size":[33],"of":[34,88,138,148],"content":[36,69],"delivery":[37],"path.":[38,102],"It":[39],"thus":[41],"challenging":[42],"securely":[44],"protect":[45],"against":[48],"attackers":[49],"who":[50],"intentionally":[51],"inject":[52],"malicious":[53],"fragments":[54,155],"disrupt":[56],"normal":[57],"services":[58],"CCN\u2010based":[60,80],"vehicular":[61,81],"networks.":[62,82],"This":[63],"paper":[64],"presents":[65],"new":[67],"secure":[68],"fragmentation":[70],"method":[71,131],"that":[72,107,147],"resistant":[74],"Denial\u2010of\u2010Service":[76],"(DoS)":[77],"attacks":[78],"in":[79,126],"Our":[83,103],"approach":[84,110,118],"guarantees":[85],"authenticity":[87],"each":[89],"fragment":[90,94],"through":[91],"immediate":[93,135],"verification":[95,136],"at":[96],"interim":[97],"nodes":[98],"routing":[101],"experiment":[104],"results":[105],"demonstrate":[106],"proposed":[109,130],"provides":[111],"much":[112],"stronger":[113],"security":[114],"than":[115,146,156],"existing":[117],"named":[119],"FIGOA,":[120,149],"without":[121],"imposing":[122],"significant":[124],"overhead":[125],"process.":[128],"The":[129],"achieves":[132],"high":[134],"probability":[137],"98.2%":[139],"average,":[141],"which":[142],"52%":[144],"higher":[145],"while":[150],"requiring":[151],"only":[152],"14%":[153],"more":[154],"FIGOA.":[157]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
