{"id":"https://openalex.org/W2980834005","doi":"https://doi.org/10.1109/etfa.2019.8869338","title":"An Efficient Location Privacy Scheme for Wireless Multimedia Sensor Networks","display_name":"An Efficient Location Privacy Scheme for Wireless Multimedia Sensor Networks","publication_year":2019,"publication_date":"2019-09-01","ids":{"openalex":"https://openalex.org/W2980834005","doi":"https://doi.org/10.1109/etfa.2019.8869338","mag":"2980834005"},"language":"en","primary_location":{"id":"doi:10.1109/etfa.2019.8869338","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2019.8869338","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082310594","display_name":"Islam T. Almalkawi","orcid":"https://orcid.org/0000-0002-0392-6955"},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Islam T. Almalkawi","raw_affiliation_strings":["Computer Engineering Dep., Hashemite University, Zarqa, Jordan"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Dep., Hashemite University, Zarqa, Jordan","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060116085","display_name":"Jafar Raed","orcid":null},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Jafar Raed","raw_affiliation_strings":["Computer Engineering Dep., Hashemite University, Zarqa, Jordan"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Dep., Hashemite University, Zarqa, Jordan","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069247562","display_name":"Nawaf Alghaeb","orcid":null},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Nawaf Alghaeb","raw_affiliation_strings":["Computer Engineering Dep., Hashemite University, Zarqa, Jordan"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Dep., Hashemite University, Zarqa, Jordan","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028460689","display_name":"Manel Guerrero Zapata","orcid":"https://orcid.org/0000-0002-7983-2525"},"institutions":[{"id":"https://openalex.org/I9617848","display_name":"Universitat Polit\u00e8cnica de Catalunya","ror":"https://ror.org/03mb6wj31","country_code":"ES","type":"education","lineage":["https://openalex.org/I9617848"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Manel Guerrero Zapata","raw_affiliation_strings":["Computer Architecture Dep., Technical University of Catalunya, Barcelona, Spain"],"affiliations":[{"raw_affiliation_string":"Computer Architecture Dep., Technical University of Catalunya, Barcelona, Spain","institution_ids":["https://openalex.org/I9617848"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5082310594"],"corresponding_institution_ids":["https://openalex.org/I157392197"],"apc_list":null,"apc_paid":null,"fwci":0.8842,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.77232143,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1615","last_page":"1618"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8433768153190613},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6974666118621826},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6687898635864258},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.659989595413208},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6566460132598877},{"id":"https://openalex.org/keywords/multipath-routing","display_name":"Multipath routing","score":0.6387742757797241},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.5111179947853088},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4913617670536041},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.48594391345977783},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.45596426725387573},{"id":"https://openalex.org/keywords/geographic-routing","display_name":"Geographic routing","score":0.4102644920349121},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.37719786167144775},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31330201029777527},{"id":"https://openalex.org/keywords/dynamic-source-routing","display_name":"Dynamic Source Routing","score":0.2409767210483551}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8433768153190613},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6974666118621826},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6687898635864258},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.659989595413208},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6566460132598877},{"id":"https://openalex.org/C76522221","wikidata":"https://www.wikidata.org/wiki/Q5035396","display_name":"Multipath routing","level":5,"score":0.6387742757797241},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.5111179947853088},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4913617670536041},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.48594391345977783},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.45596426725387573},{"id":"https://openalex.org/C50558702","wikidata":"https://www.wikidata.org/wiki/Q5535067","display_name":"Geographic routing","level":5,"score":0.4102644920349121},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.37719786167144775},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31330201029777527},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.2409767210483551},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/etfa.2019.8869338","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2019.8869338","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1483098776","https://openalex.org/W1995799737","https://openalex.org/W2012510063","https://openalex.org/W2038976731","https://openalex.org/W2050409719","https://openalex.org/W2088069667","https://openalex.org/W2116330776","https://openalex.org/W2144092819","https://openalex.org/W2151912442","https://openalex.org/W2898045258"],"related_works":["https://openalex.org/W2002267183","https://openalex.org/W2904118576","https://openalex.org/W2900249366","https://openalex.org/W2965704649","https://openalex.org/W2114784287","https://openalex.org/W2619478018","https://openalex.org/W2069654893","https://openalex.org/W2570478374","https://openalex.org/W2137565168","https://openalex.org/W2810255618"],"abstract_inverted_index":{"Most":[0],"of":[1,25,35,40,123],"the":[2,7,23,26,38,41,66,100,109,118,128,139],"security":[3,58],"algorithms":[4],"proposed":[5,90,136],"for":[6,80,84],"sensor":[8,87],"networks":[9],"such":[10,44],"as":[11,45],"secure":[12],"routing,":[13],"data":[14,28],"encryption":[15],"and":[16,18,50,60,76,102,121,142],"authentication,":[17],"intrusion":[19],"detection":[20],"target":[21],"protecting":[22],"content":[24],"collected":[27,42],"from":[29],"being":[30],"exposed":[31],"to":[32,65,107,116,147],"different":[33],"types":[34],"attacks.":[36],"However,":[37],"context":[39],"data,":[43],"event":[46,48,51,119],"occurrence,":[47],"time,":[49],"location,":[52],"is":[53,93],"not":[54],"addressed":[55],"by":[56],"these":[57],"mechanisms":[59],"can":[61],"still":[62],"be":[63],"leaked":[64],"adversaries.":[67],"Therefore,":[68],"we":[69],"propose":[70],"in":[71,105],"this":[72],"paper":[73],"a":[74,96],"novel":[75],"efficient":[77],"unobservability":[78],"scheme":[79,92,137],"source/sink":[81],"location":[82],"privacy":[83,91,140],"wireless":[85],"multimedia":[86,110],"networks.":[88],"The":[89],"based":[94],"on":[95],"cross-layer":[97],"design":[98],"between":[99],"application":[101],"routing":[103,115],"layers":[104],"order":[106],"exploit":[108],"processing":[111],"technique":[112],"with":[113],"multipath":[114],"hide":[117],"occurrences":[120],"locations":[122],"important":[124],"nodes":[125],"without":[126],"degrading":[127],"network":[129],"performance.":[130],"Simulation":[131],"analysis":[132],"shows":[133],"that":[134],"our":[135],"satisfies":[138],"requirements":[141],"has":[143],"better":[144],"performance":[145],"compared":[146],"other":[148],"existing":[149],"techniques.":[150]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
