B4SDC: A Blockchain System for Security Data Collection in MANETs Article Swipe
YOU?
·
· 2020
· Open Access
·
· DOI: https://doi.org/10.1109/icc40277.2020.9149192
Security-related data collection is an essential part for attack detection and security measurement in Mobile Ad Hoc Networks (MANETs). Due to no fixed infrastructure of MANETs, a detection node playing as a collector should discover available routes to a collection node for data collection. Notably, route discovery suffers from many attacks (e.g., wormhole attack), thus the detection node should also collect securityrelated data during route discovery and analyze these data for determining reliable routes. However, few literatures provide incentives for security-related data collection in MANETs, and thus the detection node might not collect sufficient data, which greatly impacts the accuracy of attack detection and security measurement. In this paper, we propose B4SDC, a blockchain system for security-related data collection in MANETs. Through controlling the scale of RREQ forwarding in route discovery, the collector can constrain its payment and simultaneously make each forwarder of control information (namely RREQs and RREPs) obtain rewards as much as possible to ensure fairness. At the same time, B4SDC avoids collusion attacks with cooperative receipt reporting, and spoofing attacks by adopting a secure digital signature. Based on a novel Proof-of-Stake consensus mechanism by accumulating stakes through message forwarding, B4SDC not only provides incentives for all participating nodes, but also avoids forking and ensures high efficiency and real decentralization at the same time. We analyze B4SDC in terms of incentives and security, and evaluate its performance through simulations. The thorough analysis and experimental results show the efficacy and effectiveness of B4SDC.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1109/icc40277.2020.9149192
- OA Status
- green
- Cited By
- 24
- References
- 16
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3045727737
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3045727737Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1109/icc40277.2020.9149192Digital Object Identifier
- Title
-
B4SDC: A Blockchain System for Security Data Collection in MANETsWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2020Year of publication
- Publication date
-
2020-06-01Full publication date if available
- Authors
-
Chenglian Liu, Huidong Dong, Zheng YanList of authors in order
- Landing page
-
https://doi.org/10.1109/icc40277.2020.9149192Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://aaltodoc.aalto.fi/handle/123456789/103385Direct OA link when available
- Concepts
-
Computer science, Node (physics), Computer network, Computer security, Data collection, Collusion, Spoofing attack, Incentive, Mobile ad hoc network, Network packet, Structural engineering, Economics, Engineering, Microeconomics, Mathematics, StatisticsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
24Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 3, 2024: 5, 2023: 5, 2022: 3, 2021: 6Per-year citation counts (last 5 years)
- References (count)
-
16Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3045727737 |
|---|---|
| doi | https://doi.org/10.1109/icc40277.2020.9149192 |
| ids.doi | https://doi.org/10.1109/icc40277.2020.9149192 |
| ids.mag | 3045727737 |
| ids.openalex | https://openalex.org/W3045727737 |
| fwci | 4.52917826 |
| type | article |
| title | B4SDC: A Blockchain System for Security Data Collection in MANETs |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 6 |
| biblio.first_page | 1 |
| topics[0].id | https://openalex.org/T10270 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9991000294685364 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Blockchain Technology Applications and Security |
| topics[1].id | https://openalex.org/T10761 |
| topics[1].field.id | https://openalex.org/fields/22 |
| topics[1].field.display_name | Engineering |
| topics[1].score | 0.9990000128746033 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2208 |
| topics[1].subfield.display_name | Electrical and Electronic Engineering |
| topics[1].display_name | Vehicular Ad Hoc Networks (VANETs) |
| topics[2].id | https://openalex.org/T10764 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9975000023841858 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Privacy-Preserving Technologies in Data |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.7964822053909302 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C62611344 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6117219924926758 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q1062658 |
| concepts[1].display_name | Node (physics) |
| concepts[2].id | https://openalex.org/C31258907 |
| concepts[2].level | 1 |
| concepts[2].score | 0.6056915521621704 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[2].display_name | Computer network |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.5752329230308533 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C133462117 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5563492178916931 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q4929239 |
| concepts[4].display_name | Data collection |
| concepts[5].id | https://openalex.org/C2781198186 |
| concepts[5].level | 2 |
| concepts[5].score | 0.48625433444976807 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q701521 |
| concepts[5].display_name | Collusion |
| concepts[6].id | https://openalex.org/C167900197 |
| concepts[6].level | 2 |
| concepts[6].score | 0.46914806962013245 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q11081100 |
| concepts[6].display_name | Spoofing attack |
| concepts[7].id | https://openalex.org/C29122968 |
| concepts[7].level | 2 |
| concepts[7].score | 0.4356018602848053 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q1414816 |
| concepts[7].display_name | Incentive |
| concepts[8].id | https://openalex.org/C91280400 |
| concepts[8].level | 3 |
| concepts[8].score | 0.41298624873161316 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q4085781 |
| concepts[8].display_name | Mobile ad hoc network |
| concepts[9].id | https://openalex.org/C158379750 |
| concepts[9].level | 2 |
| concepts[9].score | 0.07694193720817566 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q214111 |
| concepts[9].display_name | Network packet |
| concepts[10].id | https://openalex.org/C66938386 |
| concepts[10].level | 1 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q633538 |
| concepts[10].display_name | Structural engineering |
| concepts[11].id | https://openalex.org/C162324750 |
| concepts[11].level | 0 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q8134 |
| concepts[11].display_name | Economics |
| concepts[12].id | https://openalex.org/C127413603 |
| concepts[12].level | 0 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[12].display_name | Engineering |
| concepts[13].id | https://openalex.org/C175444787 |
| concepts[13].level | 1 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q39072 |
| concepts[13].display_name | Microeconomics |
| concepts[14].id | https://openalex.org/C33923547 |
| concepts[14].level | 0 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[14].display_name | Mathematics |
| concepts[15].id | https://openalex.org/C105795698 |
| concepts[15].level | 1 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q12483 |
| concepts[15].display_name | Statistics |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.7964822053909302 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/node |
| keywords[1].score | 0.6117219924926758 |
| keywords[1].display_name | Node (physics) |
| keywords[2].id | https://openalex.org/keywords/computer-network |
| keywords[2].score | 0.6056915521621704 |
| keywords[2].display_name | Computer network |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.5752329230308533 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/data-collection |
| keywords[4].score | 0.5563492178916931 |
| keywords[4].display_name | Data collection |
| keywords[5].id | https://openalex.org/keywords/collusion |
| keywords[5].score | 0.48625433444976807 |
| keywords[5].display_name | Collusion |
| keywords[6].id | https://openalex.org/keywords/spoofing-attack |
| keywords[6].score | 0.46914806962013245 |
| keywords[6].display_name | Spoofing attack |
| keywords[7].id | https://openalex.org/keywords/incentive |
| keywords[7].score | 0.4356018602848053 |
| keywords[7].display_name | Incentive |
| keywords[8].id | https://openalex.org/keywords/mobile-ad-hoc-network |
| keywords[8].score | 0.41298624873161316 |
| keywords[8].display_name | Mobile ad hoc network |
| keywords[9].id | https://openalex.org/keywords/network-packet |
| keywords[9].score | 0.07694193720817566 |
| keywords[9].display_name | Network packet |
| language | en |
| locations[0].id | doi:10.1109/icc40277.2020.9149192 |
| locations[0].is_oa | False |
| locations[0].source | |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | ICC 2020 - 2020 IEEE International Conference on Communications (ICC) |
| locations[0].landing_page_url | https://doi.org/10.1109/icc40277.2020.9149192 |
| locations[1].id | pmh:oai:aaltodoc.aalto.fi:123456789/103385 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306401662 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | Aaltodoc (Aalto University) |
| locations[1].source.host_organization | https://openalex.org/I9927081 |
| locations[1].source.host_organization_name | Aalto University |
| locations[1].source.host_organization_lineage | https://openalex.org/I9927081 |
| locations[1].license | other-oa |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | acceptedVersion |
| locations[1].license_id | https://openalex.org/licenses/other-oa |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://aaltodoc.aalto.fi/handle/123456789/103385 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5069041501 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-9086-9740 |
| authorships[0].author.display_name | Chenglian Liu |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I149594827 |
| authorships[0].affiliations[0].raw_affiliation_string | State Key Laboratory on Integrated Services Networks and School of Cyber Engineering, Xidian University, Xi'an, China |
| authorships[0].institutions[0].id | https://openalex.org/I149594827 |
| authorships[0].institutions[0].ror | https://ror.org/05s92vm98 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I149594827 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Xidian University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Gao Liu |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | State Key Laboratory on Integrated Services Networks and School of Cyber Engineering, Xidian University, Xi'an, China |
| authorships[1].author.id | https://openalex.org/A5059384738 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Huidong Dong |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I149594827 |
| authorships[1].affiliations[0].raw_affiliation_string | State Key Laboratory on Integrated Services Networks and School of Cyber Engineering, Xidian University, Xi'an, China |
| authorships[1].institutions[0].id | https://openalex.org/I149594827 |
| authorships[1].institutions[0].ror | https://ror.org/05s92vm98 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I149594827 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | Xidian University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Huidong Dong |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | State Key Laboratory on Integrated Services Networks and School of Cyber Engineering, Xidian University, Xi'an, China |
| authorships[2].author.id | https://openalex.org/A5078219471 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-9697-2108 |
| authorships[2].author.display_name | Zheng Yan |
| authorships[2].countries | CN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I149594827 |
| authorships[2].affiliations[0].raw_affiliation_string | State Key Laboratory on Integrated Services Networks and School of Cyber Engineering, Xidian University, Xi'an, China |
| authorships[2].institutions[0].id | https://openalex.org/I149594827 |
| authorships[2].institutions[0].ror | https://ror.org/05s92vm98 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I149594827 |
| authorships[2].institutions[0].country_code | CN |
| authorships[2].institutions[0].display_name | Xidian University |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | Zheng Yan |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | State Key Laboratory on Integrated Services Networks and School of Cyber Engineering, Xidian University, Xi'an, China |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://aaltodoc.aalto.fi/handle/123456789/103385 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | B4SDC: A Blockchain System for Security Data Collection in MANETs |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10270 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9991000294685364 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Blockchain Technology Applications and Security |
| related_works | https://openalex.org/W2953525470, https://openalex.org/W2155698199, https://openalex.org/W2137458166, https://openalex.org/W3049664077, https://openalex.org/W3012615340, https://openalex.org/W2167359476, https://openalex.org/W2740554405, https://openalex.org/W2064840241, https://openalex.org/W4310930759, https://openalex.org/W2187411498 |
| cited_by_count | 24 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 3 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 5 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 5 |
| counts_by_year[3].year | 2022 |
| counts_by_year[3].cited_by_count | 3 |
| counts_by_year[4].year | 2021 |
| counts_by_year[4].cited_by_count | 6 |
| counts_by_year[5].year | 2020 |
| counts_by_year[5].cited_by_count | 2 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:aaltodoc.aalto.fi:123456789/103385 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306401662 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Aaltodoc (Aalto University) |
| best_oa_location.source.host_organization | https://openalex.org/I9927081 |
| best_oa_location.source.host_organization_name | Aalto University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I9927081 |
| best_oa_location.license | other-oa |
| best_oa_location.pdf_url | |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | acceptedVersion |
| best_oa_location.license_id | https://openalex.org/licenses/other-oa |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://aaltodoc.aalto.fi/handle/123456789/103385 |
| primary_location.id | doi:10.1109/icc40277.2020.9149192 |
| primary_location.is_oa | False |
| primary_location.source | |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | ICC 2020 - 2020 IEEE International Conference on Communications (ICC) |
| primary_location.landing_page_url | https://doi.org/10.1109/icc40277.2020.9149192 |
| publication_date | 2020-06-01 |
| publication_year | 2020 |
| referenced_works | https://openalex.org/W2157921329, https://openalex.org/W6755258799, https://openalex.org/W2913713113, https://openalex.org/W2057248704, https://openalex.org/W1978649650, https://openalex.org/W2003610845, https://openalex.org/W2122426592, https://openalex.org/W2763398287, https://openalex.org/W2004640266, https://openalex.org/W6712179443, https://openalex.org/W2902144422, https://openalex.org/W2789858278, https://openalex.org/W2793701237, https://openalex.org/W4248175462, https://openalex.org/W2895650323, https://openalex.org/W2397661077 |
| referenced_works_count | 16 |
| abstract_inverted_index.a | 26, 31, 38, 112, 175, 181 |
| abstract_inverted_index.Ad | 15 |
| abstract_inverted_index.At | 158 |
| abstract_inverted_index.In | 106 |
| abstract_inverted_index.We | 216 |
| abstract_inverted_index.an | 4 |
| abstract_inverted_index.as | 30, 151, 153 |
| abstract_inverted_index.at | 212 |
| abstract_inverted_index.by | 173, 186 |
| abstract_inverted_index.in | 13, 83, 119, 128, 219 |
| abstract_inverted_index.is | 3 |
| abstract_inverted_index.no | 21 |
| abstract_inverted_index.of | 24, 100, 125, 142, 221, 242 |
| abstract_inverted_index.on | 180 |
| abstract_inverted_index.to | 20, 37, 155 |
| abstract_inverted_index.we | 109 |
| abstract_inverted_index.Due | 19 |
| abstract_inverted_index.Hoc | 16 |
| abstract_inverted_index.The | 231 |
| abstract_inverted_index.all | 198 |
| abstract_inverted_index.and | 10, 66, 85, 103, 137, 147, 170, 205, 209, 223, 225, 234, 240 |
| abstract_inverted_index.but | 201 |
| abstract_inverted_index.can | 133 |
| abstract_inverted_index.few | 75 |
| abstract_inverted_index.for | 7, 41, 70, 79, 115, 197 |
| abstract_inverted_index.its | 135, 227 |
| abstract_inverted_index.not | 91, 193 |
| abstract_inverted_index.the | 55, 87, 98, 123, 131, 159, 213, 238 |
| abstract_inverted_index.RREQ | 126 |
| abstract_inverted_index.also | 59, 202 |
| abstract_inverted_index.data | 1, 42, 62, 69, 81, 117 |
| abstract_inverted_index.each | 140 |
| abstract_inverted_index.from | 48 |
| abstract_inverted_index.high | 207 |
| abstract_inverted_index.make | 139 |
| abstract_inverted_index.many | 49 |
| abstract_inverted_index.much | 152 |
| abstract_inverted_index.node | 28, 40, 57, 89 |
| abstract_inverted_index.only | 194 |
| abstract_inverted_index.part | 6 |
| abstract_inverted_index.real | 210 |
| abstract_inverted_index.same | 160, 214 |
| abstract_inverted_index.show | 237 |
| abstract_inverted_index.this | 107 |
| abstract_inverted_index.thus | 54, 86 |
| abstract_inverted_index.with | 166 |
| abstract_inverted_index.B4SDC | 162, 192, 218 |
| abstract_inverted_index.Based | 179 |
| abstract_inverted_index.RREQs | 146 |
| abstract_inverted_index.data, | 94 |
| abstract_inverted_index.fixed | 22 |
| abstract_inverted_index.might | 90 |
| abstract_inverted_index.novel | 182 |
| abstract_inverted_index.route | 45, 64, 129 |
| abstract_inverted_index.scale | 124 |
| abstract_inverted_index.terms | 220 |
| abstract_inverted_index.these | 68 |
| abstract_inverted_index.time, | 161 |
| abstract_inverted_index.time. | 215 |
| abstract_inverted_index.which | 95 |
| abstract_inverted_index.(e.g., | 51 |
| abstract_inverted_index.B4SDC, | 111 |
| abstract_inverted_index.B4SDC. | 243 |
| abstract_inverted_index.Mobile | 14 |
| abstract_inverted_index.RREPs) | 148 |
| abstract_inverted_index.attack | 8, 101 |
| abstract_inverted_index.avoids | 163, 203 |
| abstract_inverted_index.during | 63 |
| abstract_inverted_index.ensure | 156 |
| abstract_inverted_index.nodes, | 200 |
| abstract_inverted_index.obtain | 149 |
| abstract_inverted_index.paper, | 108 |
| abstract_inverted_index.routes | 36 |
| abstract_inverted_index.secure | 176 |
| abstract_inverted_index.should | 33, 58 |
| abstract_inverted_index.stakes | 188 |
| abstract_inverted_index.system | 114 |
| abstract_inverted_index.(namely | 145 |
| abstract_inverted_index.MANETs, | 25, 84 |
| abstract_inverted_index.MANETs. | 120 |
| abstract_inverted_index.Through | 121 |
| abstract_inverted_index.analyze | 67, 217 |
| abstract_inverted_index.attacks | 50, 165, 172 |
| abstract_inverted_index.collect | 60, 92 |
| abstract_inverted_index.control | 143 |
| abstract_inverted_index.digital | 177 |
| abstract_inverted_index.ensures | 206 |
| abstract_inverted_index.forking | 204 |
| abstract_inverted_index.greatly | 96 |
| abstract_inverted_index.impacts | 97 |
| abstract_inverted_index.message | 190 |
| abstract_inverted_index.payment | 136 |
| abstract_inverted_index.playing | 29 |
| abstract_inverted_index.propose | 110 |
| abstract_inverted_index.provide | 77 |
| abstract_inverted_index.receipt | 168 |
| abstract_inverted_index.results | 236 |
| abstract_inverted_index.rewards | 150 |
| abstract_inverted_index.routes. | 73 |
| abstract_inverted_index.suffers | 47 |
| abstract_inverted_index.through | 189, 229 |
| abstract_inverted_index.However, | 74 |
| abstract_inverted_index.Networks | 17 |
| abstract_inverted_index.Notably, | 44 |
| abstract_inverted_index.accuracy | 99 |
| abstract_inverted_index.adopting | 174 |
| abstract_inverted_index.analysis | 233 |
| abstract_inverted_index.attack), | 53 |
| abstract_inverted_index.discover | 34 |
| abstract_inverted_index.efficacy | 239 |
| abstract_inverted_index.evaluate | 226 |
| abstract_inverted_index.possible | 154 |
| abstract_inverted_index.provides | 195 |
| abstract_inverted_index.reliable | 72 |
| abstract_inverted_index.security | 11, 104 |
| abstract_inverted_index.spoofing | 171 |
| abstract_inverted_index.thorough | 232 |
| abstract_inverted_index.wormhole | 52 |
| abstract_inverted_index.(MANETs). | 18 |
| abstract_inverted_index.available | 35 |
| abstract_inverted_index.collector | 32, 132 |
| abstract_inverted_index.collusion | 164 |
| abstract_inverted_index.consensus | 184 |
| abstract_inverted_index.constrain | 134 |
| abstract_inverted_index.detection | 9, 27, 56, 88, 102 |
| abstract_inverted_index.discovery | 46, 65 |
| abstract_inverted_index.essential | 5 |
| abstract_inverted_index.fairness. | 157 |
| abstract_inverted_index.forwarder | 141 |
| abstract_inverted_index.mechanism | 185 |
| abstract_inverted_index.security, | 224 |
| abstract_inverted_index.blockchain | 113 |
| abstract_inverted_index.collection | 2, 39, 82, 118 |
| abstract_inverted_index.discovery, | 130 |
| abstract_inverted_index.efficiency | 208 |
| abstract_inverted_index.forwarding | 127 |
| abstract_inverted_index.incentives | 78, 196, 222 |
| abstract_inverted_index.reporting, | 169 |
| abstract_inverted_index.signature. | 178 |
| abstract_inverted_index.sufficient | 93 |
| abstract_inverted_index.collection. | 43 |
| abstract_inverted_index.controlling | 122 |
| abstract_inverted_index.cooperative | 167 |
| abstract_inverted_index.determining | 71 |
| abstract_inverted_index.forwarding, | 191 |
| abstract_inverted_index.information | 144 |
| abstract_inverted_index.literatures | 76 |
| abstract_inverted_index.measurement | 12 |
| abstract_inverted_index.performance | 228 |
| abstract_inverted_index.accumulating | 187 |
| abstract_inverted_index.experimental | 235 |
| abstract_inverted_index.measurement. | 105 |
| abstract_inverted_index.simulations. | 230 |
| abstract_inverted_index.effectiveness | 241 |
| abstract_inverted_index.participating | 199 |
| abstract_inverted_index.Proof-of-Stake | 183 |
| abstract_inverted_index.infrastructure | 23 |
| abstract_inverted_index.simultaneously | 138 |
| abstract_inverted_index.securityrelated | 61 |
| abstract_inverted_index.Security-related | 0 |
| abstract_inverted_index.decentralization | 211 |
| abstract_inverted_index.security-related | 80, 116 |
| cited_by_percentile_year.max | 98 |
| cited_by_percentile_year.min | 94 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 3 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/9 |
| sustainable_development_goals[0].score | 0.5899999737739563 |
| sustainable_development_goals[0].display_name | Industry, innovation and infrastructure |
| citation_normalized_percentile.value | 0.94990115 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |