{"id":"https://openalex.org/W4315629705","doi":"https://doi.org/10.1109/globecom48099.2022.10001140","title":"Incentive Routing Design for Covert Communication in Multi-hop Decentralized Wireless Networks","display_name":"Incentive Routing Design for Covert Communication in Multi-hop Decentralized Wireless Networks","publication_year":2022,"publication_date":"2022-12-04","ids":{"openalex":"https://openalex.org/W4315629705","doi":"https://doi.org/10.1109/globecom48099.2022.10001140"},"language":"en","primary_location":{"id":"doi:10.1109/globecom48099.2022.10001140","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom48099.2022.10001140","pdf_url":null,"source":{"id":"https://openalex.org/S4363607705","display_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023419185","display_name":"Meng Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meng Xie","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University,Xi&#x0027;an,China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University,Xi&#x0027;an,China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100409698","display_name":"Jia Liu","orcid":"https://orcid.org/0000-0002-3424-050X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I184597095","display_name":"National Institute of Informatics","ror":"https://ror.org/04ksd4g47","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1319490839","https://openalex.org/I184597095","https://openalex.org/I4210158934"]}],"countries":["CN","JP"],"is_corresponding":false,"raw_author_name":"Jia Liu","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University,Xi&#x0027;an,China","Center for Strategic Cyber Resilience Research and Development, National Institute of Informatics, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University,Xi&#x0027;an,China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Center for Strategic Cyber Resilience Research and Development, National Institute of Informatics, Tokyo, Japan","institution_ids":["https://openalex.org/I184597095"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103015266","display_name":"Hiroki Takakura","orcid":"https://orcid.org/0000-0003-0238-4506"},"institutions":[{"id":"https://openalex.org/I184597095","display_name":"National Institute of Informatics","ror":"https://ror.org/04ksd4g47","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1319490839","https://openalex.org/I184597095","https://openalex.org/I4210158934"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hiroki Takakura","raw_affiliation_strings":["Center for Strategic Cyber Resilience Research and Development, National Institute of Informatics,Tokyo,Japan","Center for Strategic Cyber Resilience Research and Development, National Institute of Informatics, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Center for Strategic Cyber Resilience Research and Development, National Institute of Informatics,Tokyo,Japan","institution_ids":["https://openalex.org/I184597095"]},{"raw_affiliation_string":"Center for Strategic Cyber Resilience Research and Development, National Institute of Informatics, Tokyo, Japan","institution_ids":["https://openalex.org/I184597095"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026351888","display_name":"Yang Xu","orcid":"https://orcid.org/0000-0003-2037-6948"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Xu","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University,Xi&#x0027;an,China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University,Xi&#x0027;an,China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101485634","display_name":"Zhao Li","orcid":"https://orcid.org/0000-0002-8595-6874"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhao Li","raw_affiliation_strings":["School of Cyber Engineering, Xidian University,Xi&#x0027;an,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University,Xi&#x0027;an,China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040337456","display_name":"Norio Shiratori","orcid":"https://orcid.org/0000-0002-2560-2054"},"institutions":[{"id":"https://openalex.org/I96679780","display_name":"Chuo University","ror":"https://ror.org/03qvqb743","country_code":"JP","type":"education","lineage":["https://openalex.org/I96679780"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Norio Shiratori","raw_affiliation_strings":["Research and Development Initiative, Chuo University,Tokyo,Japan","Research and Development Initiative, Chuo University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Research and Development Initiative, Chuo University,Tokyo,Japan","institution_ids":["https://openalex.org/I96679780"]},{"raw_affiliation_string":"Research and Development Initiative, Chuo University, Tokyo, Japan","institution_ids":["https://openalex.org/I96679780"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5023419185"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.6445,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.63815294,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"49","last_page":"54"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9793000221252441,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.935699999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7282925844192505},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7090759873390198},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6951695084571838},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.685527503490448},{"id":"https://openalex.org/keywords/stackelberg-competition","display_name":"Stackelberg competition","score":0.6083720922470093},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.5132200717926025},{"id":"https://openalex.org/keywords/dijkstras-algorithm","display_name":"Dijkstra's algorithm","score":0.495108038187027},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4825393557548523},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4815440773963928},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4759135842323303},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.450860857963562},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.4444778859615326},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.44427725672721863},{"id":"https://openalex.org/keywords/shortest-path-problem","display_name":"Shortest path problem","score":0.35027360916137695},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3367929458618164},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1481623649597168},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.1024446189403534}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7282925844192505},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7090759873390198},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6951695084571838},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.685527503490448},{"id":"https://openalex.org/C199510392","wikidata":"https://www.wikidata.org/wiki/Q1184602","display_name":"Stackelberg competition","level":2,"score":0.6083720922470093},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.5132200717926025},{"id":"https://openalex.org/C173870130","wikidata":"https://www.wikidata.org/wiki/Q8548","display_name":"Dijkstra's algorithm","level":4,"score":0.495108038187027},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4825393557548523},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4815440773963928},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4759135842323303},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.450860857963562},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.4444778859615326},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.44427725672721863},{"id":"https://openalex.org/C22590252","wikidata":"https://www.wikidata.org/wiki/Q1058754","display_name":"Shortest path problem","level":3,"score":0.35027360916137695},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3367929458618164},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1481623649597168},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.1024446189403534},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom48099.2022.10001140","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom48099.2022.10001140","pdf_url":null,"source":{"id":"https://openalex.org/S4363607705","display_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3879237744","display_name":null,"funder_award_id":"2018YFE0207600","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4999695463","display_name":null,"funder_award_id":"62102303","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W100245444","https://openalex.org/W2098346479","https://openalex.org/W2150010995","https://openalex.org/W2506174538","https://openalex.org/W2808367635","https://openalex.org/W2896420513","https://openalex.org/W2962960827","https://openalex.org/W2981443503","https://openalex.org/W3104101844","https://openalex.org/W3121047872","https://openalex.org/W3195333310","https://openalex.org/W3198654303","https://openalex.org/W3198753883","https://openalex.org/W4236158019","https://openalex.org/W4285198546","https://openalex.org/W6786642666"],"related_works":["https://openalex.org/W2886787543","https://openalex.org/W3209137076","https://openalex.org/W2374560440","https://openalex.org/W1490490684","https://openalex.org/W4221129498","https://openalex.org/W2887026015","https://openalex.org/W2361442013","https://openalex.org/W2373384475","https://openalex.org/W4310124294","https://openalex.org/W143403600"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,39,68,126],"focus":[4],"on":[5,123],"a":[6,32,45,128],"multi-hop":[7],"decentralized":[8],"wireless":[9],"network":[10],"consisting":[11],"of":[12,34,62,117,160],"legitimate":[13],"nodes,":[14,38],"adversary":[15],"wardens,":[16],"and":[17,22,36,107,109,119,144],"friendly":[18],"but":[19],"selfish":[20,75],"jammers,":[21,108],"investigate":[23],"the":[24,53,59,65,90,101,105,114,135,142,158,161],"routing":[25,164],"design":[26,69],"for":[27,44,138],"achieving":[28],"covert":[29,139],"communication.":[30],"For":[31],"pair":[33],"source":[35,106,143],"destination":[37],"first":[40],"provide":[41],"theoretical":[42],"analysis":[43],"given":[46],"route":[47,137],"between":[48,104,141],"them":[49,87],"to":[50,58,77,81,99,112,133],"reveal":[51],"how":[52],"covertness":[54],"performance":[55,159],"is":[56,97],"related":[57],"jamming":[60,80,120],"power":[61],"jammers":[63,76],"in":[64],"network.":[66],"Then,":[67],"an":[70],"incentive":[71,163],"mechanism":[72],"that":[73],"stimulates":[74],"supply":[78],"artificial":[79],"protect":[82],"communication":[83,140],"covertness,":[84],"by":[85,151],"granting":[86],"rewards":[88,118],"from":[89],"source.":[91],"A":[92],"two-stage":[93],"Stackelberg":[94],"game":[95],"framework":[96],"developed":[98],"analyze":[100],"strategic":[102],"interactions":[103],"so":[110],"as":[111],"determine":[113],"optimal":[115,136],"settings":[116],"power.":[121],"Based":[122],"these":[124],"results,":[125],"formulate":[127],"shortest":[129],"weighted":[130],"path-finding":[131],"problem":[132],"identify":[134],"destination,":[145],"which":[146],"can":[147],"be":[148],"solved":[149],"efficiently":[150],"employing":[152],"Dijkstra's":[153],"algorithm.":[154],"Simulation":[155],"results":[156],"demonstrate":[157],"proposed":[162],"scheme.":[165]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-25T21:42:39.735039","created_date":"2025-10-10T00:00:00"}
