{"id":"https://openalex.org/W2112632754","doi":"https://doi.org/10.1016/j.entcs.2007.12.022","title":"Cryptographic Versus Trust-based Methods for MANET Routing Security","display_name":"Cryptographic Versus Trust-based Methods for MANET Routing Security","publication_year":2008,"publication_date":"2008-02-01","ids":{"openalex":"https://openalex.org/W2112632754","doi":"https://doi.org/10.1016/j.entcs.2007.12.022","mag":"2112632754"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.entcs.2007.12.022","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1016/j.entcs.2007.12.022","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048810023","display_name":"Jared Cordasco","orcid":null},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jared Cordasco","raw_affiliation_strings":["[Department of Computer Science, Stevens Institute of Technology, Hoboken, New Jersey, USA]"],"affiliations":[{"raw_affiliation_string":"[Department of Computer Science, Stevens Institute of Technology, Hoboken, New Jersey, USA]","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090048319","display_name":"Susanne Wetzel","orcid":"https://orcid.org/0009-0001-2769-3076"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Susanne Wetzel","raw_affiliation_strings":["[Department of Computer Science, Stevens Institute of Technology, Hoboken, New Jersey, USA]"],"affiliations":[{"raw_affiliation_string":"[Department of Computer Science, Stevens Institute of Technology, Hoboken, New Jersey, USA]","institution_ids":["https://openalex.org/I108468826"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.322,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":72,"citation_normalized_percentile":{"value":0.973896,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"197","issue":"2","first_page":"131","last_page":"140"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Ad Hoc Wireless Networks Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Ad Hoc Wireless Networks Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks and Communications","score":0.9977,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Diversity in Wireless Networks","score":0.9974,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mobile-ad-hoc-networks","display_name":"Mobile Ad Hoc Networks","score":0.629751},{"id":"https://openalex.org/keywords/routing-protocols","display_name":"Routing Protocols","score":0.580658},{"id":"https://openalex.org/keywords/ad-hoc-networks","display_name":"Ad Hoc Networks","score":0.574293},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-networks","display_name":"Vehicular Ad Hoc Networks","score":0.550559},{"id":"https://openalex.org/keywords/security-in-wireless-networks","display_name":"Security in Wireless Networks","score":0.540386},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.44334835},{"id":"https://openalex.org/keywords/routing-information-protocol","display_name":"Routing Information Protocol","score":0.4350758}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.78167},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5694545},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.56927794},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.5069654},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4920525},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.44334835},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.44266427},{"id":"https://openalex.org/C7573999","wikidata":"https://www.wikidata.org/wiki/Q207580","display_name":"Routing Information Protocol","level":5,"score":0.4350758},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4139796},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.32537568}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.entcs.2007.12.022","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.entcs.2007.12.022","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.63}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":35,"referenced_works":["https://openalex.org/W1484129745","https://openalex.org/W1530392688","https://openalex.org/W1550543595","https://openalex.org/W1796177958","https://openalex.org/W1965489815","https://openalex.org/W202704970","https://openalex.org/W2033751220","https://openalex.org/W2058722498","https://openalex.org/W2067514565","https://openalex.org/W2072463110","https://openalex.org/W2081633971","https://openalex.org/W2099574482","https://openalex.org/W2102258543","https://openalex.org/W2103927182","https://openalex.org/W2104514878","https://openalex.org/W2104554508","https://openalex.org/W2109033806","https://openalex.org/W2110081058","https://openalex.org/W2110279266","https://openalex.org/W2117496982","https://openalex.org/W2120926795","https://openalex.org/W2123861314","https://openalex.org/W2124651399","https://openalex.org/W2127699957","https://openalex.org/W2130280511","https://openalex.org/W2157457404","https://openalex.org/W2158923961","https://openalex.org/W2170858213","https://openalex.org/W2297141755","https://openalex.org/W2911593614","https://openalex.org/W2913677764","https://openalex.org/W3112127769","https://openalex.org/W4236944153","https://openalex.org/W4249348003","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4313451574","https://openalex.org/W4214846602","https://openalex.org/W4210319030","https://openalex.org/W3136283368","https://openalex.org/W2987730452","https://openalex.org/W2807715074","https://openalex.org/W2556271402","https://openalex.org/W2281771002","https://openalex.org/W2188603028","https://openalex.org/W2096029721"],"abstract_inverted_index":{"Mobile":[0],"Ad-hoc":[1],"Networks":[2],"(MANETs)":[3],"allow":[4],"wireless":[5],"nodes":[6],"to":[7,22,34,80],"form":[8],"a":[9,13,91],"network":[10],"without":[11],"requiring":[12,67],"fixed":[14],"infrastructure.":[15],"Early":[16],"routing":[17,37,130,134,157],"protocols":[18,44,82],"for":[19,48,155],"MANETs":[20],"failed":[21],"take":[23],"security":[24,57,135],"issues":[25],"into":[26],"account.":[27],"Subsequent":[28],"proposals":[29,105],"used":[30,79],"strong":[31],"cryptographic":[32,137],"methods":[33,76],"secure":[35],"the":[36,40,54,101,121],"information.":[38],"In":[39,116],"process,":[41],"however,":[42],"these":[43],"created":[45],"new":[46],"avenues":[47],"denial":[49],"of":[50,103,124],"service":[51],"(DoS).":[52],"Consequently,":[53],"trade-off":[55],"between":[56],"strength":[58],"and":[59,126,138],"DoS":[60],"vulnerability":[61],"has":[62],"emerged":[63],"as":[64],"an":[65],"area":[66],"further":[68],"investigation.":[69],"It":[70],"is":[71,106,113],"believed":[72],"that":[73,99],"different":[74],"trust":[75],"can":[77],"be":[78],"develop":[81],"at":[83],"various":[84],"levels":[85],"in":[86],"this":[87,94,117],"trade-off.":[88],"To":[89],"gain":[90],"handle":[92],"on":[93,146],"exchange,":[95],"real":[96],"world":[97],"testing":[98],"evaluates":[100],"cost":[102],"existing":[104],"necessary.":[107],"Without":[108],"this,":[109],"future":[110,156],"protocol":[111],"design":[112,153],"mere":[114],"speculation.":[115],"paper,":[118],"we":[119,151],"give":[120],"first":[122],"comparison":[123],"SAODV":[125],"TAODV,":[127],"two":[128],"MANET":[129],"protocols,":[131],"which":[132],"address":[133],"through":[136],"trust-based":[139],"means":[140],"respectively.":[141],"We":[142],"provide":[143],"performance":[144],"comparisons":[145],"actual":[147],"resource-limited":[148],"hardware.":[149],"Finally,":[150],"discuss":[152],"decisions":[154],"protocols.":[158]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2112632754","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":11},{"year":2017,"cited_by_count":11},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":11},{"year":2014,"cited_by_count":6},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":7}],"updated_date":"2024-11-27T13:51:10.934081","created_date":"2016-06-24"}