{"id":"https://openalex.org/W2291576182","doi":"https://doi.org/10.1109/glocom.2014.7417868","title":"Chance Discovery Based Security Service Selection for Social P2P Based Sensor Networks","display_name":"Chance Discovery Based Security Service Selection for Social P2P Based Sensor Networks","publication_year":2014,"publication_date":"2014-12-01","ids":{"openalex":"https://openalex.org/W2291576182","doi":"https://doi.org/10.1109/glocom.2014.7417868","mag":"2291576182"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2014.7417868","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2014.7417868","pdf_url":null,"source":{"id":"https://openalex.org/S4363607712","display_name":"2015 IEEE Global Communications Conference (GLOBECOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004673608","display_name":"Jun Wu","orcid":"https://orcid.org/0000-0003-2483-6980"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jun Wu","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061453937","display_name":"Mianxiong Dong","orcid":"https://orcid.org/0000-0002-2788-3451"},"institutions":[{"id":"https://openalex.org/I41725924","display_name":"Muroran Institute of Technology","ror":"https://ror.org/04rymkk69","country_code":"JP","type":"education","lineage":["https://openalex.org/I41725924"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Mianxiong Dong","raw_affiliation_strings":["Department of Information and Electric Engineering, Muroran Institute of Technology, Muroran, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Information and Electric Engineering, Muroran Institute of Technology, Muroran, Japan","institution_ids":["https://openalex.org/I41725924"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106707877","display_name":"Kaoru Ota","orcid":"https://orcid.org/0000-0002-3382-1652"},"institutions":[{"id":"https://openalex.org/I41725924","display_name":"Muroran Institute of Technology","ror":"https://ror.org/04rymkk69","country_code":"JP","type":"education","lineage":["https://openalex.org/I41725924"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kaoru Ota","raw_affiliation_strings":["Department of Information and Electric Engineering, Muroran Institute of Technology, Muroran, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Information and Electric Engineering, Muroran Institute of Technology, Muroran, Japan","institution_ids":["https://openalex.org/I41725924"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100391361","display_name":"Jianhua Li","orcid":"https://orcid.org/0000-0002-6831-3973"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianhua Li","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100766945","display_name":"Longhua Guo","orcid":"https://orcid.org/0000-0002-2561-3116"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Longhua Guo","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007267530","display_name":"Gaolei Li","orcid":"https://orcid.org/0000-0003-3913-5001"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gaolei Li","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5004673608"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.734,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.74383131,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"e85 a","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13083","display_name":"Advanced Text Analysis Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13083","display_name":"Advanced Text Analysis Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7532967329025269},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7407432198524475},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.5561500787734985},{"id":"https://openalex.org/keywords/credibility","display_name":"Credibility","score":0.5413998365402222},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.47635936737060547},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47618570923805237},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.45161157846450806},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4341358542442322},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.42581671476364136},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4204099774360657},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.41452664136886597},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.40047892928123474},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32209062576293945},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.20014289021492004},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10295096039772034},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.10206401348114014},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.08772227168083191},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.08660340309143066}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7532967329025269},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7407432198524475},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.5561500787734985},{"id":"https://openalex.org/C2780224610","wikidata":"https://www.wikidata.org/wiki/Q1530061","display_name":"Credibility","level":2,"score":0.5413998365402222},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.47635936737060547},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47618570923805237},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.45161157846450806},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4341358542442322},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42581671476364136},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4204099774360657},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.41452664136886597},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40047892928123474},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32209062576293945},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.20014289021492004},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10295096039772034},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.10206401348114014},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.08772227168083191},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.08660340309143066},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2014.7417868","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2014.7417868","pdf_url":null,"source":{"id":"https://openalex.org/S4363607712","display_name":"2015 IEEE Global Communications Conference (GLOBECOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1577104490","https://openalex.org/W1968164389","https://openalex.org/W1971698341","https://openalex.org/W1974869019","https://openalex.org/W2006247821","https://openalex.org/W2044324113","https://openalex.org/W2061149982","https://openalex.org/W2113104447","https://openalex.org/W2114423594","https://openalex.org/W2123649966","https://openalex.org/W2123770198","https://openalex.org/W2128519534","https://openalex.org/W2138648016","https://openalex.org/W2155094613","https://openalex.org/W6634763207","https://openalex.org/W6678765374"],"related_works":["https://openalex.org/W8370799","https://openalex.org/W2030343105","https://openalex.org/W1623393394","https://openalex.org/W2744631404","https://openalex.org/W2404921573","https://openalex.org/W2369924108","https://openalex.org/W3099433986","https://openalex.org/W2388760686","https://openalex.org/W2357867417","https://openalex.org/W2348947824"],"abstract_inverted_index":{"Social":[0],"Peer-to-Peer":[1],"(P2P)":[2],"is":[3,127,150],"a":[4,64,122],"novel":[5],"model":[6,44,84,149],"to":[7],"organize":[8],"sensor":[9,57,76,91,175],"networks,":[10,92],"which":[11,167],"can":[12],"establish":[13,80],"social":[14,42,73,88,114,178],"relationships":[15],"in":[16,56,87],"an":[17],"autonomous":[18],"way":[19],"with":[20],"the":[21,25,30,34,81,94,136,145,156,161,169],"benefits":[22],"of":[23,97,138,160,173],"extending":[24],"network":[26,31,176],"boundaries":[27],"and":[28,36,49,54,104,141,158,171,177],"enhancing":[29],"scalability.":[32],"However,":[33],"complexity":[35],"time":[37,109],"dependence":[38,110],"characteristics":[39,111],"introduced":[40,112],"by":[41,113],"P2P":[43,74,89,115],"raise":[45],"difficulties":[46],"for":[47,72,85],"assessing":[48],"selecting":[50],"security":[51,68,82,95,119,123,163,172],"services":[52,86],"accurately":[53],"effectively":[55],"networks.":[58,77,179],"To":[59],"address":[60],"this,":[61],"we":[62],"propose":[63],"chance":[65],"discovery":[66],"based":[67,75,90,129],"service":[69,124,146,164],"selection":[70,125,165],"scheme":[71,126],"We":[78],"firstly":[79],"assessment":[83],"regarding":[93],"factors":[96],"exploitability,":[98],"credibility,":[99],"severity,":[100],"confidentiality,":[101],"integrality,":[102],"availability":[103],"importance":[105],"weight.":[106],"More":[107],"importantly,":[108],"are":[116],"considered":[117],"during":[118],"assessment.":[120],"Next,":[121],"proposed":[128,162],"on":[130],"KeyGraph":[131],"construction":[132],"as":[133,135],"well":[134],"computation":[137],"its":[139],"connection":[140],"tightness":[142],"values.":[143],"Finally,":[144],"request":[147],"forwarding":[148],"established.":[151],"The":[152],"simulation":[153],"results":[154],"show":[155],"effectiveness":[157],"accuracy":[159],"scheme,":[166],"improves":[168],"feasibility":[170],"integrated":[174]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
