{"id":"https://openalex.org/W2097157480","doi":"https://doi.org/10.1109/icumt.2009.5345637","title":"A Neighbor-Based Detection Scheme for wireless sensor networks against node replication attacks","display_name":"A Neighbor-Based Detection Scheme for wireless sensor networks against node replication attacks","publication_year":2009,"publication_date":"2009-10-01","ids":{"openalex":"https://openalex.org/W2097157480","doi":"https://doi.org/10.1109/icumt.2009.5345637","mag":"2097157480"},"language":"en","primary_location":{"id":"doi:10.1109/icumt.2009.5345637","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icumt.2009.5345637","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference on Ultra Modern Telecommunications &amp; Workshops","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027624505","display_name":"Lee-Chun Ko","orcid":null},"institutions":[{"id":"https://openalex.org/I4210148468","display_name":"Industrial Technology Research Institute","ror":"https://ror.org/05szzwt63","country_code":"TW","type":"nonprofit","lineage":["https://openalex.org/I4210148468"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Lee-Chun Ko","raw_affiliation_strings":["Industrial Technology and Research Institute, Hsinchu, Taiwan","Industrial Technology Research Institute (ITRI),Hsinchu,Taiwan, R.O.C"],"affiliations":[{"raw_affiliation_string":"Industrial Technology and Research Institute, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I4210148468"]},{"raw_affiliation_string":"Industrial Technology Research Institute (ITRI),Hsinchu,Taiwan, R.O.C","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054122865","display_name":"Hung-Yuan Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210148468","display_name":"Industrial Technology Research Institute","ror":"https://ror.org/05szzwt63","country_code":"TW","type":"nonprofit","lineage":["https://openalex.org/I4210148468"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Hung-Yuan Chen","raw_affiliation_strings":["Industrial Technology and Research Institute, Hsinchu, Taiwan","Industrial Technology Research Institute (ITRI),Hsinchu,Taiwan, R.O.C"],"affiliations":[{"raw_affiliation_string":"Industrial Technology and Research Institute, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I4210148468"]},{"raw_affiliation_string":"Industrial Technology Research Institute (ITRI),Hsinchu,Taiwan, R.O.C","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089719889","display_name":"Guan-Rong Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I4210148468","display_name":"Industrial Technology Research Institute","ror":"https://ror.org/05szzwt63","country_code":"TW","type":"nonprofit","lineage":["https://openalex.org/I4210148468"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Guan-Rong Lin","raw_affiliation_strings":["Industrial Technology and Research Institute, Hsinchu, Taiwan","Industrial Technology Research Institute (ITRI),Hsinchu,Taiwan, R.O.C"],"affiliations":[{"raw_affiliation_string":"Industrial Technology and Research Institute, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I4210148468"]},{"raw_affiliation_string":"Industrial Technology Research Institute (ITRI),Hsinchu,Taiwan, R.O.C","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027624505"],"corresponding_institution_ids":["https://openalex.org/I4210148468"],"apc_list":null,"apc_paid":null,"fwci":1.0285,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.78288879,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7756274938583374},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.7589476108551025},{"id":"https://openalex.org/keywords/replication","display_name":"Replication (statistics)","score":0.7485548257827759},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7277770638465881},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6680014133453369},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.625820517539978},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.49499791860580444},{"id":"https://openalex.org/keywords/sensor-node","display_name":"Sensor node","score":0.41518595814704895},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3928021192550659},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.35018959641456604},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.3005905747413635},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.289630651473999},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07450023293495178},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.060331761837005615}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7756274938583374},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.7589476108551025},{"id":"https://openalex.org/C12590798","wikidata":"https://www.wikidata.org/wiki/Q3933199","display_name":"Replication (statistics)","level":2,"score":0.7485548257827759},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7277770638465881},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6680014133453369},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.625820517539978},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.49499791860580444},{"id":"https://openalex.org/C111185680","wikidata":"https://www.wikidata.org/wiki/Q3866206","display_name":"Sensor node","level":5,"score":0.41518595814704895},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3928021192550659},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.35018959641456604},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.3005905747413635},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.289630651473999},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07450023293495178},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.060331761837005615},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icumt.2009.5345637","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icumt.2009.5345637","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference on Ultra Modern Telecommunications &amp; Workshops","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5600000023841858,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1567573409","https://openalex.org/W1643928249","https://openalex.org/W1660562555","https://openalex.org/W1940397557","https://openalex.org/W1941184313","https://openalex.org/W1964393191","https://openalex.org/W1970064480","https://openalex.org/W2101963262","https://openalex.org/W2104340336","https://openalex.org/W2118592651","https://openalex.org/W2119362555","https://openalex.org/W2123080720","https://openalex.org/W2123210925","https://openalex.org/W2136236364","https://openalex.org/W2143229717","https://openalex.org/W2153343530","https://openalex.org/W2161864928","https://openalex.org/W2162680392","https://openalex.org/W2164478452","https://openalex.org/W2165295831","https://openalex.org/W4241413379","https://openalex.org/W4289127653"],"related_works":["https://openalex.org/W2799361348","https://openalex.org/W1977342959","https://openalex.org/W2053773563","https://openalex.org/W2148549110","https://openalex.org/W2564820291","https://openalex.org/W2371193381","https://openalex.org/W2999657022","https://openalex.org/W1536182396","https://openalex.org/W2067121920","https://openalex.org/W1657620843"],"abstract_inverted_index":{"Most":[0],"of":[1,10,112],"sensor":[2,11,17],"network":[3],"applications":[4],"rely":[5],"on":[6],"deploying":[7],"large":[8],"amount":[9],"nodes":[12,56,60,115],"in":[13,24,116],"unattended":[14],"areas,":[15],"leaving":[16],"nods":[18],"suffer":[19],"from":[20,35],"node":[21,30,43,81],"capture":[22],"attacks":[23,45,48],"which":[25],"the":[26,29,36,39,110],"adversary":[27,40],"compromises":[28],"and":[31,57,106],"retrieves":[32],"secret":[33,51],"information":[34,52],"node.":[37],"Moreover,":[38],"can":[41],"launch":[42],"replication":[44,82],"or":[46,65],"clone":[47],"by":[49],"loading":[50],"into":[53],"several":[54],"replicated":[55,92,114],"rejoining":[58],"these":[59],"to":[61,79],"execute":[62],"malicious":[63],"behaviors":[64],"subvert":[66],"underlying":[67],"protocols.":[68],"In":[69],"this":[70],"paper":[71],"we":[72],"propose":[73],"a":[74],"neighbor-based":[75],"detection":[76,100],"scheme":[77],"(NBDS)":[78],"counteract":[80],"attacks.":[83],"Compare":[84],"with":[85],"previous":[86,122],"distributed":[87],"schemes":[88],"that":[89],"periodically":[90],"detect":[91],"nodes,":[93],"NBDS":[94,117],"not":[95],"only":[96],"provides":[97],"near":[98],"real-time":[99],"but":[101],"also":[102],"achieves":[103],"lower":[104],"communication":[105],"memory":[107],"costs.":[108],"Further,":[109],"probability":[111],"detecting":[113],"is":[118],"much":[119],"higher":[120],"than":[121],"schemes.":[123]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
