{"id":"https://openalex.org/W2088572636","doi":"https://doi.org/10.1109/glocom.2012.6503972","title":"An efficient and sustainable self-healing protocol for Unattended Wireless Sensor Networks","display_name":"An efficient and sustainable self-healing protocol for Unattended Wireless Sensor Networks","publication_year":2012,"publication_date":"2012-12-01","ids":{"openalex":"https://openalex.org/W2088572636","doi":"https://doi.org/10.1109/glocom.2012.6503972","mag":"2088572636"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2012.6503972","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2012.6503972","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100359200","display_name":"Juan Chen","orcid":"https://orcid.org/0000-0002-0621-1971"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I4210135457","display_name":"Harbin Science and Technology Bureau","ror":"https://ror.org/03qdcb993","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210135457"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Juan Chen","raw_affiliation_strings":["Research Center of Computer Network and Information Security Technology, Harbin institute of technology, China","Research Center of Computer Network and Information Security Technology, Harbin Institute of technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Research Center of Computer Network and Information Security Technology, Harbin institute of technology, China","institution_ids":["https://openalex.org/I4210135457","https://openalex.org/I204983213"]},{"raw_affiliation_string":"Research Center of Computer Network and Information Security Technology, Harbin Institute of technology, Harbin, China","institution_ids":["https://openalex.org/I4210135457"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100417312","display_name":"Hongli Zhang","orcid":"https://orcid.org/0000-0002-8167-7106"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I4210135457","display_name":"Harbin Science and Technology Bureau","ror":"https://ror.org/03qdcb993","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210135457"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongli Zhang","raw_affiliation_strings":["Research Center of Computer Network and Information Security Technology, Harbin institute of technology, China","Research Center of Computer Network and Information Security Technology, Harbin Institute of technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Research Center of Computer Network and Information Security Technology, Harbin institute of technology, China","institution_ids":["https://openalex.org/I4210135457","https://openalex.org/I204983213"]},{"raw_affiliation_string":"Research Center of Computer Network and Information Security Technology, Harbin Institute of technology, Harbin, China","institution_ids":["https://openalex.org/I4210135457"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113587199","display_name":"Binxing Fang","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I4210135457","display_name":"Harbin Science and Technology Bureau","ror":"https://ror.org/03qdcb993","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210135457"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Binxing Fang","raw_affiliation_strings":["Research Center of Computer Network and Information Security Technology, Harbin institute of technology, China","Research Center of Computer Network and Information Security Technology, Harbin Institute of technology, Harbin, China","Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Research Center of Computer Network and Information Security Technology, Harbin institute of technology, China","institution_ids":["https://openalex.org/I4210135457","https://openalex.org/I204983213"]},{"raw_affiliation_string":"Research Center of Computer Network and Information Security Technology, Harbin Institute of technology, Harbin, China","institution_ids":["https://openalex.org/I4210135457"]},{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060514022","display_name":"Xiaojiang Du","orcid":"https://orcid.org/0000-0003-4235-9671"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojiang Du","raw_affiliation_strings":["Dept. of Computer and Information Sciences, Temple University, Philadelphia, PA, USA","Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer and Information Sciences, Temple University, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I84392919"]},{"raw_affiliation_string":"Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I84392919"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010753025","display_name":"Haining Yu","orcid":"https://orcid.org/0000-0002-4996-3233"},"institutions":[{"id":"https://openalex.org/I4210135457","display_name":"Harbin Science and Technology Bureau","ror":"https://ror.org/03qdcb993","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210135457"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haining Yu","raw_affiliation_strings":["Research Center of Computer Network and Information Security Technology, Harbin institute of technology, China","Research Center of Computer Network and Information Security Technology, Harbin Institute of technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Research Center of Computer Network and Information Security Technology, Harbin institute of technology, China","institution_ids":["https://openalex.org/I4210135457","https://openalex.org/I204983213"]},{"raw_affiliation_string":"Research Center of Computer Network and Information Security Technology, Harbin Institute of technology, Harbin, China","institution_ids":["https://openalex.org/I4210135457"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072540013","display_name":"Xiangzhan Yu","orcid":"https://orcid.org/0000-0002-1183-2844"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I4210135457","display_name":"Harbin Science and Technology Bureau","ror":"https://ror.org/03qdcb993","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210135457"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangzhan Yu","raw_affiliation_strings":["Research Center of Computer Network and Information Security Technology, Harbin institute of technology, China","Research Center of Computer Network and Information Security Technology, Harbin Institute of technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Research Center of Computer Network and Information Security Technology, Harbin institute of technology, China","institution_ids":["https://openalex.org/I4210135457","https://openalex.org/I204983213"]},{"raw_affiliation_string":"Research Center of Computer Network and Information Security Technology, Harbin Institute of technology, Harbin, China","institution_ids":["https://openalex.org/I4210135457"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100359200"],"corresponding_institution_ids":["https://openalex.org/I204983213","https://openalex.org/I4210135457"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.1754166,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"5356","last_page":"5361"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.7511322498321533},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7201826572418213},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6928234100341797},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6867035627365112},{"id":"https://openalex.org/keywords/self-healing","display_name":"Self-healing","score":0.6353938579559326},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5770941376686096},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5660094022750854},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.46630561351776123},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.4439283609390259},{"id":"https://openalex.org/keywords/sensor-node","display_name":"Sensor node","score":0.4325340688228607},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4314330518245697},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3783671259880066},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3734356760978699},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.3230029344558716},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.170963853597641},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.14269942045211792},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.06633114814758301}],"concepts":[{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.7511322498321533},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7201826572418213},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6928234100341797},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6867035627365112},{"id":"https://openalex.org/C2778210392","wikidata":"https://www.wikidata.org/wiki/Q1412709","display_name":"Self-healing","level":3,"score":0.6353938579559326},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5770941376686096},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5660094022750854},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46630561351776123},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.4439283609390259},{"id":"https://openalex.org/C111185680","wikidata":"https://www.wikidata.org/wiki/Q3866206","display_name":"Sensor node","level":5,"score":0.4325340688228607},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4314330518245697},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3783671259880066},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3734356760978699},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.3230029344558716},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.170963853597641},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14269942045211792},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.06633114814758301},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2012.6503972","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2012.6503972","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Responsible consumption and production","id":"https://metadata.un.org/sdg/12","score":0.4000000059604645}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1512817052","https://openalex.org/W1581169908","https://openalex.org/W1989761324","https://openalex.org/W2024814145","https://openalex.org/W2072813709","https://openalex.org/W2109058848","https://openalex.org/W2117376893","https://openalex.org/W2157511764","https://openalex.org/W2170613004","https://openalex.org/W6634957624","https://openalex.org/W6677596385"],"related_works":["https://openalex.org/W2799361348","https://openalex.org/W1977342959","https://openalex.org/W2053773563","https://openalex.org/W2148549110","https://openalex.org/W2564820291","https://openalex.org/W2067121920","https://openalex.org/W2371193381","https://openalex.org/W1536182396","https://openalex.org/W2545116705","https://openalex.org/W1657620843"],"abstract_inverted_index":{"Due":[0],"to":[1,15,28,38,51],"the":[2,23,40,53,81,88],"unattended":[3],"operation":[4],"nature,":[5],"nodes":[6],"in":[7,44],"Unattended":[8],"Wireless":[9],"Sensor":[10],"Networks":[11],"(UWSNs)":[12],"are":[13],"susceptible":[14],"physical":[16],"attacks.":[17],"Once":[18],"a":[19,63],"sensor":[20],"is":[21],"compromised,":[22],"adversary":[24],"will":[25],"be":[26],"able":[27],"learn":[29],"all":[30],"its":[31],"secrets.":[32],"While":[33],"some":[34],"previous":[35],"works":[36],"tried":[37],"address":[39],"node":[41,56,66,82,109],"self-healing":[42,67,83,110],"issue":[43],"UWSNs,":[45],"little":[46],"effort":[47],"has":[48],"been":[49],"devoted":[50],"ensure":[52],"sustainability":[54],"of":[55,90],"self-healing.":[57],"In":[58],"this":[59],"paper,":[60],"we":[61],"present":[62],"novel":[64],"sustainable":[65,108],"protocol":[68,104],"for":[69,76],"UWSNs.":[70],"We":[71,94],"generate":[72],"unpredictable":[73],"random":[74],"data":[75],"key":[77],"update":[78],"and":[79,98,107],"thus":[80],"capability":[84],"doesn't":[85],"decrease":[86],"when":[87],"number":[89],"attack":[91],"rounds":[92],"increases.":[93],"show":[95],"both":[96],"analytically":[97],"through":[99],"simulation":[100],"experiments":[101],"that":[102],"our":[103],"provides":[105],"efficient":[106],"capabilities":[111],"with":[112],"small":[113],"overheads.":[114]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
