{"id":"https://openalex.org/W2135045422","doi":"https://doi.org/10.1186/1687-1499-2013-287","title":"Introduction to advances in trust, security, and privacy for wireless networks","display_name":"Introduction to advances in trust, security, and privacy for wireless networks","publication_year":2013,"publication_date":"2013-12-01","ids":{"openalex":"https://openalex.org/W2135045422","doi":"https://doi.org/10.1186/1687-1499-2013-287","mag":"2135045422"},"language":"en","primary_location":{"id":"doi:10.1186/1687-1499-2013-287","is_oa":true,"landing_page_url":"https://doi.org/10.1186/1687-1499-2013-287","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/1687-1499-2013-287","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/1687-1499-2013-287","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004458037","display_name":"Yulei Wu","orcid":"https://orcid.org/0000-0003-0801-8443"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yulei Wu","raw_affiliation_strings":["Computer Network Information Center, Chinese Academy of Sciences, Beijing, 100190, China","Computer Network Information, Center, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Computer Network Information Center, Chinese Academy of Sciences, Beijing, 100190, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Computer Network Information, Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018846193","display_name":"F\u00e9lix G\u00f3mez M\u00e1rmol","orcid":"https://orcid.org/0000-0002-6424-3322"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"F\u00e9lix G\u00f3mez M\u00e1rmol","raw_affiliation_strings":["NEC Laboratories Europe, Heidelberg, 69115, Germany","NEC Laboratories Europe, Heidelberg, Germany"],"affiliations":[{"raw_affiliation_string":"NEC Laboratories Europe, Heidelberg, 69115, Germany","institution_ids":[]},{"raw_affiliation_string":"NEC Laboratories Europe, Heidelberg, Germany","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023246930","display_name":"Ahmed Al\u2010Dubai","orcid":"https://orcid.org/0000-0001-9758-5540"},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"education","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ahmed Al-Dubai","raw_affiliation_strings":["School of Computing, Edinburgh Napier University, Edinburgh, EH10 5DT, UK","School of Computing, Edinburgh Napier University, Edinburgh, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Edinburgh Napier University, Edinburgh, EH10 5DT, UK","institution_ids":["https://openalex.org/I251738"]},{"raw_affiliation_string":"School of Computing, Edinburgh Napier University, Edinburgh, UK","institution_ids":["https://openalex.org/I251738"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5004458037"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210108629"],"apc_list":{"value":1140,"currency":"GBP","value_usd":1398},"apc_paid":{"value":1140,"currency":"GBP","value_usd":1398},"fwci":0.2365,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.63135317,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2013","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9724000096321106,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.97079998254776,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8498222827911377},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6290792226791382},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.6166423559188843},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5277876257896423},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.5166259407997131},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.5145193934440613},{"id":"https://openalex.org/keywords/wireless-routing-protocol","display_name":"Wireless Routing Protocol","score":0.4967876076698303},{"id":"https://openalex.org/keywords/ad-hoc-on-demand-distance-vector-routing","display_name":"Ad hoc On-Demand Distance Vector Routing","score":0.48948442935943604},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.479094535112381},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.4704916477203369},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.4367721974849701},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4218674302101135},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.35540494322776794},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.246712327003479}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8498222827911377},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6290792226791382},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.6166423559188843},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5277876257896423},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.5166259407997131},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.5145193934440613},{"id":"https://openalex.org/C47318570","wikidata":"https://www.wikidata.org/wiki/Q8026863","display_name":"Wireless Routing Protocol","level":4,"score":0.4967876076698303},{"id":"https://openalex.org/C104503742","wikidata":"https://www.wikidata.org/wiki/Q345335","display_name":"Ad hoc On-Demand Distance Vector Routing","level":5,"score":0.48948442935943604},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.479094535112381},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.4704916477203369},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4367721974849701},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4218674302101135},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.35540494322776794},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.246712327003479},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1186/1687-1499-2013-287","is_oa":true,"landing_page_url":"https://doi.org/10.1186/1687-1499-2013-287","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/1687-1499-2013-287","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1186/1687-1499-2013-287","is_oa":true,"landing_page_url":"https://doi.org/10.1186/1687-1499-2013-287","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1186/1687-1499-2013-287","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2135045422.pdf","grobid_xml":"https://content.openalex.org/works/W2135045422.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2027636740","https://openalex.org/W2062688728","https://openalex.org/W2061231656","https://openalex.org/W4231650586","https://openalex.org/W2771454953","https://openalex.org/W3046762796","https://openalex.org/W3202102306","https://openalex.org/W4327774248","https://openalex.org/W2998294818","https://openalex.org/W3046260513"],"abstract_inverted_index":{"In":[0,131,260],"recent":[1],"years,":[2],"wireless":[3,25,41,58,108,247,269],"networks":[4,42,61,154,249],"have":[5,43],"become":[6,44],"one":[7,239],"of":[8,21,95,101,125,180,183,221,240,254],"the":[9,80,111,135,140,203,209,241,261],"most":[10,242],"influential":[11],"technological":[12],"accomplishments":[13],"and":[14,24,32,37,60,77,98,104,110,118,120,139,165,168,225,273],"pervaded":[15],"our":[16],"daily":[17],"lives":[18],"in":[19,40,62,86,175,197,219,246],"forms":[20],"mobile":[22],"telephony":[23],"computing.":[26],"Due":[27],"to":[28,56,68,145,149,160,193],"their":[29,176],"rapid":[30],"development":[31],"widespread":[33],"applications,":[34],"trust,":[35,75,102],"security,":[36,76,103],"privacy":[38,78,105],"issues":[39,100],"very":[45],"important":[46,96],"topics.":[47],"As":[48],"a":[49,53,92,157,188,231],"result,":[50],"there":[51],"is":[52,143,238],"grand":[54],"challenge":[55],"build":[57],"systems":[59,148],"which":[63],"various":[64],"applications":[65],"allow":[66],"users":[67],"enjoy":[69],"more":[70],"comprehensive":[71],"services":[72],"while":[73,229],"preserving":[74],"at":[79],"same":[81],"time.":[82],"The":[83,123],"accepted":[84],"papers":[85,127],"this":[87],"special":[88],"issue":[89],"deal":[90],"with":[91],"wide":[93],"range":[94],"aspects":[97],"challenging":[99],"techniques":[106],"for":[107,268],"networks,":[109],"contents":[112],"are":[113,128,156],"built":[114],"on":[115],"analytical":[116],"modelling,":[117],"experimental":[119],"simulation":[121],"studies.":[122],"contributions":[124],"these":[126,147],"outlined":[129],"below.":[130],"intelligent":[132],"transportation":[133],"systems,":[134],"cooperation":[136],"between":[137,166],"vehicles":[138,167],"roadside":[141,169],"units":[142],"essential":[144],"bring":[146],"fruition.":[150],"Vehicular":[151],"ad":[152,185,211],"hoc":[153,186,212],"(VANETs)":[155],"promising":[158],"technology":[159],"enable":[161],"communications":[162,256],"among":[163],"vehicles,":[164],"units.":[170],"Eiza":[171],"et":[172],"al.":[173],"propose":[174],"work":[177],"entitled":[178,263],"\u2018Investigation":[179],"routing":[181,196,206,217,233,255,267],"reliability":[182,191],"vehicular":[184,190],"networks\u2019":[187],"new":[189],"model":[192],"facilitate":[194],"reliable":[195,205],"VANETs.":[198],"Simulation":[199],"experiments":[200],"demonstrate":[201],"that":[202,250],"proposed":[204],"outperforms":[207],"significantly":[208],"well-known":[210],"on-demand":[213],"distance":[214],"vector":[215],"(AODV)":[216],"protocol":[218],"terms":[220],"better":[222],"delivery":[223],"ratio":[224],"less":[226],"link":[227],"failures":[228],"maintaining":[230],"reasonable":[232],"control":[234],"overhead.":[235],"Wormhole":[236],"attack":[237],"severe":[243],"security":[244],"threats":[245],"mesh":[248,270],"can":[251],"disrupt":[252],"majority":[253],"when":[257],"strategically":[258],"placed.":[259],"paper":[262],"\u2018WRSR:":[264],"wormhole-resistant":[265],"secure":[266],"networks\u2019,":[271],"Matam":[272],"Tripathy":[274]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
