{"id":"https://openalex.org/W2616364971","doi":"https://doi.org/10.1109/ict.2017.7998272","title":"Intrusion recovery in NLOS WSNs with a varying network density","display_name":"Intrusion recovery in NLOS WSNs with a varying network density","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2616364971","doi":"https://doi.org/10.1109/ict.2017.7998272","mag":"2616364971"},"language":"en","primary_location":{"id":"doi:10.1109/ict.2017.7998272","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ict.2017.7998272","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 24th International Conference on Telecommunications (ICT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032212838","display_name":"Eliana Stavrou","orcid":"https://orcid.org/0000-0003-4040-4942"},"institutions":[{"id":"https://openalex.org/I4210108889","display_name":"University of Central Lancashire Cyprus","ror":"https://ror.org/020ps3a34","country_code":"CY","type":"education","lineage":["https://openalex.org/I185852735","https://openalex.org/I4210108889"]}],"countries":["CY"],"is_corresponding":true,"raw_author_name":"Eliana Stavrou","raw_affiliation_strings":["Computing Department, University of Central Lancashire, Larnaca, Cyprus"],"affiliations":[{"raw_affiliation_string":"Computing Department, University of Central Lancashire, Larnaca, Cyprus","institution_ids":["https://openalex.org/I4210108889"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003106918","display_name":"Stavros Stavrou","orcid":null},"institutions":[{"id":"https://openalex.org/I59746437","display_name":"Open University of Cyprus","ror":"https://ror.org/033sm2k57","country_code":"CY","type":"education","lineage":["https://openalex.org/I59746437"]}],"countries":["CY"],"is_corresponding":false,"raw_author_name":"Stavros Stavrou","raw_affiliation_strings":["Faculty of Pure and Applied Sciences, Open University of Cyprus, Nicosia, Cyprus"],"affiliations":[{"raw_affiliation_string":"Faculty of Pure and Applied Sciences, Open University of Cyprus, Nicosia, Cyprus","institution_ids":["https://openalex.org/I59746437"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5032212838"],"corresponding_institution_ids":["https://openalex.org/I4210108889"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06406427,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"3","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7092404365539551},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6518551707267761},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6339858174324036},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6037985682487488},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5634703636169434},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5403729677200317},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5196634531021118},{"id":"https://openalex.org/keywords/intrusion-tolerance","display_name":"Intrusion tolerance","score":0.4696708619594574},{"id":"https://openalex.org/keywords/non-line-of-sight-propagation","display_name":"Non-line-of-sight propagation","score":0.45898473262786865},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4183446168899536},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.34071823954582214},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3067511320114136},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17009767889976501}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7092404365539551},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6518551707267761},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6339858174324036},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6037985682487488},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5634703636169434},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5403729677200317},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5196634531021118},{"id":"https://openalex.org/C196903269","wikidata":"https://www.wikidata.org/wiki/Q6059063","display_name":"Intrusion tolerance","level":3,"score":0.4696708619594574},{"id":"https://openalex.org/C154910267","wikidata":"https://www.wikidata.org/wiki/Q1740982","display_name":"Non-line-of-sight propagation","level":3,"score":0.45898473262786865},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4183446168899536},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.34071823954582214},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3067511320114136},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17009767889976501},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ict.2017.7998272","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ict.2017.7998272","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 24th International Conference on Telecommunications (ICT)","raw_type":"proceedings-article"},{"id":"pmh:oai:clok.uclan.ac.uk:17841","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402361","display_name":"CLOK (University of Central Lancashire)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I185852735","host_organization_name":"University of Lancashire","host_organization_lineage":["https://openalex.org/I185852735"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.699999988079071}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1652714411","https://openalex.org/W1997372906","https://openalex.org/W2061292137","https://openalex.org/W2063699838","https://openalex.org/W2101363008","https://openalex.org/W2107984909","https://openalex.org/W2134576828","https://openalex.org/W2136032111","https://openalex.org/W2142100695","https://openalex.org/W2151090982","https://openalex.org/W2168452204","https://openalex.org/W2323865746","https://openalex.org/W2465495723","https://openalex.org/W2473247000","https://openalex.org/W2512852454","https://openalex.org/W2547891244","https://openalex.org/W2737645800","https://openalex.org/W4290442704","https://openalex.org/W6636944078","https://openalex.org/W6700861434"],"related_works":["https://openalex.org/W2352562479","https://openalex.org/W2389356976","https://openalex.org/W2356891656","https://openalex.org/W34565110","https://openalex.org/W2347413713","https://openalex.org/W2133389611","https://openalex.org/W136910588","https://openalex.org/W2353050426","https://openalex.org/W1539957869","https://openalex.org/W2487262093"],"abstract_inverted_index":{"The":[0,32,94,114],"Internet":[1],"of":[2,10,35,62,96,122,156,219,227],"Things":[3],"(IoT)":[4],"paradigm,":[5],"supported":[6],"by":[7,176],"the":[8,39,56,68,120,145,149,154,180,191,207,217,220],"operation":[9],"wireless":[11],"sensor":[12,177],"networks":[13],"(WSNs),":[14],"has":[15],"gained":[16],"a":[17,47,60,88,123,157,169],"great":[18],"attention":[19],"lately":[20],"and":[21,25,91,109,126,137,148,160,204,230],"new":[22],"security":[23],"concerns":[24],"challenges":[26],"are":[27,223],"emerging":[28],"from":[29],"its":[30,127,161],"usage.":[31],"rising":[33],"number":[34],"cyber":[36],"threats":[37],"makes":[38],"quest":[40],"for":[41,195],"solutions":[42],"to":[43,54,76,84,87,104,107,215],"promote":[44],"resilient":[45],"operations":[46],"necessity.":[48],"A":[49],"major":[50],"threat":[51],"that":[52,80,142],"continues":[53],"concern":[55],"research":[57,133],"community":[58],"is":[59,72,100,174,183,202,211],"denial":[61],"service":[63],"(DoS)":[64],"attack.":[65],"In":[66,166,213],"case":[67],"network's":[69],"communication":[70,112,146],"path":[71],"compromised,":[73],"it":[74],"needs":[75],"be":[77,105],"restored":[78],"so":[79],"sensors":[81],"can":[82,118,152],"continue":[83],"propagate":[85],"observations":[86],"control":[89],"center":[90],"support":[92,216],"decision-making.":[93],"performance":[95,210],"intrusion":[97,129,163,208],"recovery":[98,130,164,209],"measures":[99],"critical":[101],"in":[102,138,144],"order":[103,214],"able":[106],"recover":[108],"restore":[110],"network":[111,115,150],"effectively.":[113],"deployment":[116],"layout":[117],"affect":[119],"effectiveness":[121],"DoS":[124,158,181],"attack":[125,159,182],"respective":[128,162],"measures.":[131],"This":[132],"work":[134],"investigates":[135],"how":[136,206],"what":[139],"way":[140],"shadowing":[141,201],"occurs":[143],"paths":[147],"density,":[151],"impact":[153],"efficiency":[155],"measure.":[165],"this":[167],"work,":[168],"low":[170],"duty":[171],"cycle":[172],"measure":[173],"applied":[175],"nodes":[178,193],"once":[179],"detected.":[184],"Investigations":[185],"focus":[186],"on:":[187],"a)":[188],"identifying":[189],"if":[190],"malicious":[192],"chances":[194],"compromisation":[196],"increase":[197],"or":[198],"decrease":[199],"when":[200],"considered,":[203],"b)":[205],"affected.":[212],"objectives":[218],"investigations,":[221],"comparisons":[222],"performed":[224],"between":[225],"Line":[226],"Sight":[228],"(LOS)":[229],"Non":[231],"LOS":[232],"(NLOS)":[233],"scenarios.":[234]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
