{"id":"https://openalex.org/W2171304578","doi":"https://doi.org/10.1186/1687-1499-2013-180","title":"WRSR: wormhole-resistant secure routing for wireless mesh networks","display_name":"WRSR: wormhole-resistant secure routing for wireless mesh networks","publication_year":2013,"publication_date":"2013-07-03","ids":{"openalex":"https://openalex.org/W2171304578","doi":"https://doi.org/10.1186/1687-1499-2013-180","mag":"2171304578"},"language":"en","primary_location":{"id":"doi:10.1186/1687-1499-2013-180","is_oa":true,"landing_page_url":"https://doi.org/10.1186/1687-1499-2013-180","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/1687-1499-2013-180","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/1687-1499-2013-180","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061302597","display_name":"Rakesh Matam","orcid":"https://orcid.org/0000-0002-1825-2914"},"institutions":[{"id":"https://openalex.org/I132153292","display_name":"Indian Institute of Technology Patna","ror":"https://ror.org/01ft5vz71","country_code":"IN","type":"education","lineage":["https://openalex.org/I132153292"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rakesh Matam","raw_affiliation_strings":["Dept. of Computer Science and Engineering, Indian Institute of Technology Patna, Patna, Bihar, 800013, India"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Engineering, Indian Institute of Technology Patna, Patna, Bihar, 800013, India","institution_ids":["https://openalex.org/I132153292"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071224481","display_name":"Somanath Tripathy","orcid":"https://orcid.org/0000-0002-6964-2648"},"institutions":[{"id":"https://openalex.org/I132153292","display_name":"Indian Institute of Technology Patna","ror":"https://ror.org/01ft5vz71","country_code":"IN","type":"education","lineage":["https://openalex.org/I132153292"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Somanath Tripathy","raw_affiliation_strings":["Dept. of Computer Science and Engineering, Indian Institute of Technology Patna, Patna, Bihar, 800013, India"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Engineering, Indian Institute of Technology Patna, Patna, Bihar, 800013, India","institution_ids":["https://openalex.org/I132153292"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5061302597"],"corresponding_institution_ids":["https://openalex.org/I132153292"],"apc_list":{"value":1140,"currency":"GBP","value_usd":1398},"apc_paid":{"value":1140,"currency":"GBP","value_usd":1398},"fwci":5.0742,"has_fulltext":true,"cited_by_count":25,"citation_normalized_percentile":{"value":0.95855248,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"2013","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wormhole","display_name":"Wormhole","score":0.9592733383178711},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8598794937133789},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.697311520576477},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5795152187347412},{"id":"https://openalex.org/keywords/traverse","display_name":"Traverse","score":0.5583295822143555},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.4679955840110779},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.4414075016975403},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.42034488916397095},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3579888939857483},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34387215971946716},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08948719501495361}],"concepts":[{"id":"https://openalex.org/C29013271","wikidata":"https://www.wikidata.org/wiki/Q7544","display_name":"Wormhole","level":2,"score":0.9592733383178711},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8598794937133789},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.697311520576477},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5795152187347412},{"id":"https://openalex.org/C176809094","wikidata":"https://www.wikidata.org/wiki/Q15401496","display_name":"Traverse","level":2,"score":0.5583295822143555},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.4679955840110779},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.4414075016975403},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.42034488916397095},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3579888939857483},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34387215971946716},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08948719501495361},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1186/1687-1499-2013-180","is_oa":true,"landing_page_url":"https://doi.org/10.1186/1687-1499-2013-180","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/1687-1499-2013-180","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1186/1687-1499-2013-180","is_oa":true,"landing_page_url":"https://doi.org/10.1186/1687-1499-2013-180","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/1687-1499-2013-180","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320310395","display_name":"Louisiana State University","ror":"https://ror.org/05ect4e57"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2171304578.pdf","grobid_xml":"https://content.openalex.org/works/W2171304578.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W81735479","https://openalex.org/W112549410","https://openalex.org/W158253819","https://openalex.org/W267490298","https://openalex.org/W574842602","https://openalex.org/W1913780224","https://openalex.org/W1971026061","https://openalex.org/W2023272701","https://openalex.org/W2041248965","https://openalex.org/W2057095875","https://openalex.org/W2060373563","https://openalex.org/W2063572899","https://openalex.org/W2091844035","https://openalex.org/W2101771805","https://openalex.org/W2102258543","https://openalex.org/W2110623369","https://openalex.org/W2117094586","https://openalex.org/W2120383904","https://openalex.org/W2137627435","https://openalex.org/W2142663125","https://openalex.org/W2144601362","https://openalex.org/W2146072508","https://openalex.org/W2150411054","https://openalex.org/W2150825860","https://openalex.org/W2151349302","https://openalex.org/W2151993488","https://openalex.org/W2153755097","https://openalex.org/W2167930752","https://openalex.org/W2282855657","https://openalex.org/W2736765627","https://openalex.org/W4234209089","https://openalex.org/W4243382396","https://openalex.org/W4253088513"],"related_works":["https://openalex.org/W2377402383","https://openalex.org/W2380835401","https://openalex.org/W2381912691","https://openalex.org/W2350381577","https://openalex.org/W2353618196","https://openalex.org/W2348074676","https://openalex.org/W2385033175","https://openalex.org/W2374043190","https://openalex.org/W2363298784","https://openalex.org/W2027014711"],"abstract_inverted_index":{"Wormhole":[0],"attack":[1],"is":[2],"one":[3],"of":[4,18,29,62,120,131],"the":[5,25,30,60,106,121],"most":[6,28,117],"severe":[7],"security":[8],"threats":[9],"in":[10,44],"wireless":[11],"mesh":[12],"network":[13],"that":[14,41,58,75],"can":[15],"disrupt":[16],"majority":[17],"routing":[19,56],"communications,":[20],"when":[21],"strategically":[22],"placed.":[23],"At":[24],"same":[26],"time,":[27],"existing":[31,73],"wormhole":[32,39,63,77,90,132],"defence":[33],"mechanisms":[34],"are":[35,42],"not":[36],"secure":[37,55],"against":[38,128],"attacks":[40,136],"launched":[43],"participation":[45],"mode.":[46],"In":[47],"this":[48],"paper,":[49],"we":[50],"propose":[51],"WRSR,":[52],"a":[53,89,113],"wormhole-resistant":[54],"algorithm":[57],"detects":[59],"presence":[61],"during":[64],"route":[65,86],"discovery":[66],"process":[67,79],"and":[68,91,108,134,152],"quarantines":[69],"it.":[70],"Unlike":[71],"other":[72],"schemes":[74],"initiate":[76],"detection":[78],"after":[80],"observing":[81],"packet":[82],"loss,":[83],"WRSR":[84,98,122],"identifies":[85],"requests":[87],"traversing":[88],"prevents":[92],"such":[93],"routes":[94],"from":[95],"being":[96],"established.":[97],"uses":[99],"unit":[100],"disk":[101],"graph":[102],"model":[103],"to":[104,126],"determine":[105],"necessary":[107],"sufficient":[109],"condition":[110],"for":[111],"identifying":[112],"wormhole-free":[114],"path.":[115],"The":[116],"attractive":[118],"features":[119],"include":[123],"its":[124],"ability":[125],"defend":[127],"all":[129],"forms":[130],"(hidden":[133],"Byzantine)":[135],"without":[137],"relying":[138],"on":[139],"any":[140],"extra":[141],"hardware":[142],"like":[143],"global":[144],"positioning":[145],"system,":[146],"synchronized":[147],"clocks":[148],"or":[149],"timing":[150],"information,":[151],"computational":[153],"intensive":[154],"traditional":[155],"cryptographic":[156],"mechanisms.":[157]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
