{"id":"https://openalex.org/W1965976189","doi":"https://doi.org/10.1109/glocom.2011.6134560","title":"Combining Source-Location Privacy and Routing Efficiency in Wireless Sensor Networks","display_name":"Combining Source-Location Privacy and Routing Efficiency in Wireless Sensor Networks","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W1965976189","doi":"https://doi.org/10.1109/glocom.2011.6134560","mag":"1965976189"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2011.6134560","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2011.6134560","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE Global Telecommunications Conference - GLOBECOM 2011","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001325170","display_name":"Jian Ren","orcid":"https://orcid.org/0000-0001-7796-8501"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jian Ren","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Michigan State University, East Lansing, MI, USA","Dept. of Electr. & Comput. Eng., Michigan State Univ., East Lansing, MI, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Michigan State University, East Lansing, MI, USA","institution_ids":["https://openalex.org/I87216513"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Michigan State Univ., East Lansing, MI, USA#TAB#","institution_ids":["https://openalex.org/I87216513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107983832","display_name":"Di Tang","orcid":"https://orcid.org/0000-0002-7031-3315"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Di Tang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Michigan State University, East Lansing, MI, USA","Dept. of Electr. & Comput. Eng., Michigan State Univ., East Lansing, MI, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Michigan State University, East Lansing, MI, USA","institution_ids":["https://openalex.org/I87216513"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Michigan State Univ., East Lansing, MI, USA#TAB#","institution_ids":["https://openalex.org/I87216513"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5001325170"],"corresponding_institution_ids":["https://openalex.org/I87216513"],"apc_list":null,"apc_paid":null,"fwci":0.3501,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.59622307,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"33","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8182342648506165},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7782731652259827},{"id":"https://openalex.org/keywords/geographic-routing","display_name":"Geographic routing","score":0.6371857523918152},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5862396955490112},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5202715992927551},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4875158965587616},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.43821483850479126},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.4253704845905304},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.4078068435192108},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.379081130027771},{"id":"https://openalex.org/keywords/dynamic-source-routing","display_name":"Dynamic Source Routing","score":0.3717184066772461},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.25960397720336914},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.23111069202423096},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09799632430076599},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08418792486190796}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8182342648506165},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7782731652259827},{"id":"https://openalex.org/C50558702","wikidata":"https://www.wikidata.org/wiki/Q5535067","display_name":"Geographic routing","level":5,"score":0.6371857523918152},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5862396955490112},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5202715992927551},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4875158965587616},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.43821483850479126},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.4253704845905304},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.4078068435192108},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.379081130027771},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.3717184066772461},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.25960397720336914},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.23111069202423096},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09799632430076599},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08418792486190796},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2011.6134560","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2011.6134560","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE Global Telecommunications Conference - GLOBECOM 2011","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2042626642","https://openalex.org/W2045349136","https://openalex.org/W2061065101","https://openalex.org/W2086047941","https://openalex.org/W2088069667","https://openalex.org/W2098502330","https://openalex.org/W2103647628","https://openalex.org/W2120170057","https://openalex.org/W2132255584","https://openalex.org/W2134003300","https://openalex.org/W2151362442","https://openalex.org/W2155984879","https://openalex.org/W2161411322","https://openalex.org/W3141863997","https://openalex.org/W6661245368"],"related_works":["https://openalex.org/W2110333561","https://openalex.org/W2398904817","https://openalex.org/W2160189149","https://openalex.org/W2620451430","https://openalex.org/W2394677160","https://openalex.org/W2114784287","https://openalex.org/W2143656291","https://openalex.org/W1999482517","https://openalex.org/W2163375631","https://openalex.org/W2187498136"],"abstract_inverted_index":{"Wireless":[0],"sensor":[1,62],"networks":[2],"(WSNs)":[3],"have":[4],"been":[5],"widely":[6],"used":[7],"in":[8,147,152],"various":[9],"applications":[10],"for":[11,87],"continuous":[12],"event":[13],"monitoring":[14],"and":[15,67,79,116,144,213],"detection.":[16],"The":[17,136,180],"WSNs":[18],"communication":[19],"is":[20,36,54],"generally":[21],"event-driven.":[22],"While":[23],"confidentiality":[24],"of":[25,46,65,94,102,133,141,155,182],"the":[26,43,47,58,61,90,95,99,134,139,142,145,148,156,164,168,175,183,189,199],"message":[27,177,200,210,216],"content":[28,33],"can":[29,97,166,186],"be":[30,172],"ensured":[31],"through":[32,119],"encryption,":[34],"it":[35],"much":[37],"more":[38],"difficult":[39],"to":[40,111,121,171,197],"adequately":[41],"protect":[42],"source-location":[44,51,96,114],"information":[45],"event.":[48],"For":[49],"WSNs,":[50],"privacy":[52,115],"service":[53],"further":[55],"complicated":[56],"by":[57],"fact":[59],"that":[60],"nodes":[63,146,162],"consist":[64],"low-cost":[66],"low-power":[68],"radio":[69],"devices,":[70],"computationally":[71],"intensive":[72],"cryptographic":[73],"algorithms":[74],"(such":[75],"as":[76],"public-key":[77],"cryptosystems)":[78],"large":[80],"scale":[81],"broadcasting-based":[82],"protocols":[83],"are":[84,150],"not":[85],"suitable":[86],"WSNs.":[88,103],"On":[89],"other":[91],"hand,":[92],"exposure":[93],"jeopardize":[98],"successful":[100],"deployment":[101],"In":[104,203],"this":[105,205],"paper,":[106],"we":[107],"propose":[108],"a":[109,127,159,208,214],"scheme":[110],"provide":[112],"both":[113],"routing":[117,120,193],"efficiency":[118],"an":[122],"intermediate":[123,169,184],"node":[124,170,185],"selected":[125],"from":[126,163,174,191],"hierarchical":[128],"connected":[129],"dominating":[130],"set":[131],"(CDS)":[132],"network.":[135,157],"CDS":[137,149,165],"represents":[138],"backbone":[140],"network":[143],"located":[151],"different":[153],"regions":[154],"As":[158],"result,":[160],"choosing":[161],"ensure":[167],"away":[173],"actual":[176],"source":[178,201],"node.":[179,202],"selection":[181],"effectively":[187],"prevent":[188],"adversary":[190],"performing":[192],"trace":[194],"back":[195],"attack":[196],"identify":[198],"addition,":[204],"design":[206],"guarantees":[207],"high":[209,215],"delivery":[211,217],"ratio":[212],"efficiency.":[218]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
