{"id":"https://openalex.org/W2156616219","doi":"https://doi.org/10.1186/1687-1499-2013-220","title":"SPAWN: a secure privacy-preserving architecture in wireless mobile ad hoc networks","display_name":"SPAWN: a secure privacy-preserving architecture in wireless mobile ad hoc networks","publication_year":2013,"publication_date":"2013-09-04","ids":{"openalex":"https://openalex.org/W2156616219","doi":"https://doi.org/10.1186/1687-1499-2013-220","mag":"2156616219"},"language":"en","primary_location":{"id":"doi:10.1186/1687-1499-2013-220","is_oa":true,"landing_page_url":"https://doi.org/10.1186/1687-1499-2013-220","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/1687-1499-2013-220","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/1687-1499-2013-220","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056318419","display_name":"M. Gunasekaran","orcid":"https://orcid.org/0000-0002-2908-3052"},"institutions":[{"id":"https://openalex.org/I43814544","display_name":"Sathyabama Institute of Science and Technology","ror":"https://ror.org/01defpn95","country_code":"IN","type":"education","lineage":["https://openalex.org/I43814544"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Muthumanickam Gunasekaran","raw_affiliation_strings":["Bannari Amman Institute of Technology, Sathyamangalam, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Bannari Amman Institute of Technology, Sathyamangalam, Tamil Nadu, India","institution_ids":["https://openalex.org/I43814544"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033862904","display_name":"K. Premalatha","orcid":"https://orcid.org/0000-0002-5340-0265"},"institutions":[{"id":"https://openalex.org/I43814544","display_name":"Sathyabama Institute of Science and Technology","ror":"https://ror.org/01defpn95","country_code":"IN","type":"education","lineage":["https://openalex.org/I43814544"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kandhasamy Premalatha","raw_affiliation_strings":["Bannari Amman Institute of Technology, Sathyamangalam, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Bannari Amman Institute of Technology, Sathyamangalam, Tamil Nadu, India","institution_ids":["https://openalex.org/I43814544"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5056318419"],"corresponding_institution_ids":["https://openalex.org/I43814544"],"apc_list":{"value":1140,"currency":"GBP","value_usd":1398},"apc_paid":{"value":1140,"currency":"GBP","value_usd":1398},"fwci":1.0874,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.81820209,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2013","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8649864196777344},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.7674477696418762},{"id":"https://openalex.org/keywords/roaming","display_name":"Roaming","score":0.7548671960830688},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.717530369758606},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.6116690039634705},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5709227323532104},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.4422556161880493},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.44121187925338745},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.4368543028831482},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4330999255180359},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.36120477318763733},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.18763962388038635},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.12829256057739258}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8649864196777344},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.7674477696418762},{"id":"https://openalex.org/C194498986","wikidata":"https://www.wikidata.org/wiki/Q680016","display_name":"Roaming","level":2,"score":0.7548671960830688},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.717530369758606},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.6116690039634705},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5709227323532104},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.4422556161880493},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.44121187925338745},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.4368543028831482},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4330999255180359},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.36120477318763733},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.18763962388038635},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.12829256057739258},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1186/1687-1499-2013-220","is_oa":true,"landing_page_url":"https://doi.org/10.1186/1687-1499-2013-220","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/1687-1499-2013-220","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1186/1687-1499-2013-220","is_oa":true,"landing_page_url":"https://doi.org/10.1186/1687-1499-2013-220","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/1687-1499-2013-220","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2156616219.pdf","grobid_xml":"https://content.openalex.org/works/W2156616219.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W1533716120","https://openalex.org/W1783904641","https://openalex.org/W1827785169","https://openalex.org/W1895840745","https://openalex.org/W1975185632","https://openalex.org/W1979612096","https://openalex.org/W2005708967","https://openalex.org/W2013613544","https://openalex.org/W2056109283","https://openalex.org/W2058846940","https://openalex.org/W2059816561","https://openalex.org/W2065008051","https://openalex.org/W2088349239","https://openalex.org/W2099817984","https://openalex.org/W2102258543","https://openalex.org/W2102403671","https://openalex.org/W2106637609","https://openalex.org/W2107704516","https://openalex.org/W2110216998","https://openalex.org/W2115014275","https://openalex.org/W2116924740","https://openalex.org/W2119978940","https://openalex.org/W2120890744","https://openalex.org/W2125129768","https://openalex.org/W2126241662","https://openalex.org/W2133885751","https://openalex.org/W2156200189","https://openalex.org/W2163782594","https://openalex.org/W2164979166","https://openalex.org/W2168812739","https://openalex.org/W2346195875","https://openalex.org/W2498582020","https://openalex.org/W4232027804","https://openalex.org/W4251606613","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2369138185","https://openalex.org/W2118242884","https://openalex.org/W2945277231","https://openalex.org/W4210904806","https://openalex.org/W2388705066","https://openalex.org/W4312698066","https://openalex.org/W2015804271","https://openalex.org/W1123412569","https://openalex.org/W2768875466","https://openalex.org/W3013627169"],"abstract_inverted_index":{"Fourth-generation":[0],"wireless":[1,85],"networks":[2,11],"may":[3],"require":[4],"an":[5],"integration":[6,41],"of":[7,20,38,42,55,60,95,146],"mobile":[8,86],"ad":[9,62,87],"hoc":[10,63,88],"(MANET)":[12],"into":[13],"external":[14,45],"network":[15,46],"to":[16,76,98,108],"enhance":[17],"the":[18,21,61,93,104,113,122,142,147,157],"flexibility":[19],"communication":[22,53,83],"and":[23,31,57,79,101,107,126,144,154],"roaming.":[24,39],"This":[25,90],"phenomenon":[26],"is":[27,118],"well-suited":[28],"for":[29,52,81,103,135],"commercial":[30],"military":[32],"applications":[33],"which":[34,133],"yield":[35],"additional":[36],"benefit":[37],"However,":[40],"MANET":[43],"with":[44],"poses":[47],"a":[48,68,130],"serious":[49],"security":[50,80,102,155],"challenge":[51],"because":[54],"open":[56],"distributed":[58],"nature":[59],"network.":[64,114],"In":[65],"this":[66],"paper,":[67],"secure":[69],"privacy":[70,78,100,153],"preserving":[71],"architecture":[72,91,117,149],"has":[73],"been":[74],"proposed":[75,116,148],"provide":[77,99],"data":[82],"in":[84,112,150,156],"networks.":[89],"includes":[92],"concept":[94,132],"observer":[96],"obscurity":[97],"genuine":[105],"nodes":[106,111],"exclude":[109],"misbehaving":[110],"The":[115,138],"designed":[119],"based":[120],"on":[121],"k-times":[123],"anonymous":[124,136],"authentication":[125],"onion":[127],"routing":[128],"-":[129],"cryptography":[131],"supports":[134],"communication.":[137],"simulation":[139],"results":[140],"prove":[141],"necessity":[143],"effectiveness":[145],"achieving":[151],"such":[152],"integrated":[158],"environment.":[159]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
