{"id":"https://openalex.org/W4408324562","doi":"https://doi.org/10.1109/globecom52923.2024.10901289","title":"Enhancing Source Location Privacy in UASNs: A Multi-Armed Bandit and Pseudopacket Scheduling Approach","display_name":"Enhancing Source Location Privacy in UASNs: A Multi-Armed Bandit and Pseudopacket Scheduling Approach","publication_year":2024,"publication_date":"2024-12-08","ids":{"openalex":"https://openalex.org/W4408324562","doi":"https://doi.org/10.1109/globecom52923.2024.10901289"},"language":"en","primary_location":{"id":"doi:10.1109/globecom52923.2024.10901289","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom52923.2024.10901289","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2024 - 2024 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050142428","display_name":"Rongxin Zhu","orcid":"https://orcid.org/0000-0001-5133-0868"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Rongxin Zhu","raw_affiliation_strings":["Hainan University,School of Computer Science,Haikou,China"],"affiliations":[{"raw_affiliation_string":"Hainan University,School of Computer Science,Haikou,China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105528990","display_name":"Azzedine Boukerche","orcid":null},"institutions":[{"id":"https://openalex.org/I153718931","display_name":"University of Ottawa","ror":"https://ror.org/03c4mmv16","country_code":"CA","type":"education","lineage":["https://openalex.org/I153718931"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Azzedine Boukerche","raw_affiliation_strings":["University of Ottawa,Paradise Laboratory, EECS,Ottawa,Canada"],"affiliations":[{"raw_affiliation_string":"University of Ottawa,Paradise Laboratory, EECS,Ottawa,Canada","institution_ids":["https://openalex.org/I153718931"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102805959","display_name":"Zhe Li","orcid":"https://orcid.org/0009-0007-2476-3482"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhe Li","raw_affiliation_strings":["Hainan University,School of Computer Science,Haikou,China"],"affiliations":[{"raw_affiliation_string":"Hainan University,School of Computer Science,Haikou,China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056567985","display_name":"Qiuling Yang","orcid":"https://orcid.org/0000-0001-7886-5707"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiuling Yang","raw_affiliation_strings":["Hainan University,School of Computer Science,Haikou,China"],"affiliations":[{"raw_affiliation_string":"Hainan University,School of Computer Science,Haikou,China","institution_ids":["https://openalex.org/I20942203"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5050142428"],"corresponding_institution_ids":["https://openalex.org/I20942203"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32771829,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1053","last_page":"1058"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.9829999804496765,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7270393967628479},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.5626625418663025},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4357913136482239},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.09884610772132874},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.061164796352386475}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7270393967628479},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.5626625418663025},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4357913136482239},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.09884610772132874},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.061164796352386475}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom52923.2024.10901289","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom52923.2024.10901289","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2024 - 2024 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2014724694","https://openalex.org/W2050409719","https://openalex.org/W2079064954","https://openalex.org/W2088069667","https://openalex.org/W2807919996","https://openalex.org/W2887888816","https://openalex.org/W2942933587","https://openalex.org/W3010748599","https://openalex.org/W3086453453","https://openalex.org/W3120370876","https://openalex.org/W3170612885","https://openalex.org/W3202574759","https://openalex.org/W4394863031","https://openalex.org/W4402156291"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Underwater":[0],"Acoustic":[1],"Sensor":[2],"Networks":[3],"(UASNs)":[4],"have":[5],"garnered":[6],"significant":[7],"interest":[8],"over":[9],"recent":[10],"decades,":[11],"yet":[12],"they":[13],"continue":[14],"to":[15,35,50,76,84,105,176,207],"confront":[16],"substantial":[17],"challenges":[18],"concerning":[19],"security":[20,86,107],"and":[21,38,123,140,184],"privacy.":[22,231],"The":[23,129,166],"inherent":[24],"openness":[25],"of":[26,46,59,66,191],"acoustic":[27],"communication":[28],"in":[29,69,101],"such":[30],"networks":[31],"introduces":[32],"profound":[33],"risks":[34],"node":[36,135,142,157,161,168],"privacy":[37],"overall":[39],"network":[40,109],"security.":[41],"External":[42],"attackers":[43],"are":[44],"capable":[45],"retracing":[47],"data":[48,61,138,163],"streams":[49],"identify":[51],"the":[52,57,60,64,120,133,155,189,215],"source":[53,156,209],"node,":[54],"thus":[55],"jeopardizing":[56],"confidentiality":[58],"origin.":[62],"Notably,":[63],"subtleties":[65],"passive":[67,99],"attacks":[68,100],"UASNs":[70,102,127],"render":[71],"them":[72,224],"more":[73],"elusive":[74],"compared":[75],"active":[77],"attacks.":[78],"Furthermore,":[79],"conventional":[80],"research":[81],"often":[82],"fails":[83],"reconcile":[85],"needs":[87],"with":[88,108,132],"energy":[89,186,221],"efficiency.":[90],"Addressing":[91],"these":[92],"concerns,":[93],"this":[94],"paper":[95],"concentrates":[96],"on":[97,119],"mitigating":[98],"while":[103,228],"striving":[104],"harmonize":[106],"performance.":[110],"We":[111],"introduce":[112],"a":[113,145,150,171,198],"Source":[114],"Location":[115],"Privacy":[116],"Scheme":[117],"based":[118],"Multi-Armed":[121,151],"Bandit":[122,152],"Pseudo-packet":[124],"Scheduling":[125],"for":[126,162,188],"(MP-SLP).":[128],"methodology":[130],"commences":[131],"sink":[134,167],"executing":[136],"geographic":[137],"acquisition":[139],"neighbor":[141],"identification":[143],"using":[144],"flood-based":[146],"technique.":[147],"Subsequently,":[148],"through":[149],"(MAB)":[153],"framework,":[154],"designates":[158],"an":[159],"intermediate":[160],"packet":[164],"transmission.":[165],"then":[169],"employs":[170],"location-aware":[172],"opportunistic":[173],"routing":[174],"strategy":[175],"establish":[177],"authentic":[178],"routes":[179],"that":[180,214],"combine":[181],"both":[182],"randomness":[183],"reduced":[185],"consumption":[187],"transmission":[190],"actual":[192],"packets.":[193],"Alongside,":[194],"branch":[195],"nodes":[196],"implement":[197],"pseudopacket":[199],"scheduling":[200],"tactic":[201],"aimed":[202],"at":[203],"obstructing":[204],"adversarial":[205],"efforts":[206],"track":[208],"locations.":[210],"Simulation":[211],"results":[212],"demonstrate":[213],"proposed":[216],"scheme":[217],"proficiently":[218],"moderates":[219],"additional":[220],"consumption,":[222],"maintaining":[223],"within":[225],"acceptable":[226],"limits,":[227],"safeguarding":[229],"location":[230]},"counts_by_year":[],"updated_date":"2026-04-16T15:07:20.185449","created_date":"2025-10-10T00:00:00"}
