{"id":"https://openalex.org/W3048586642","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162756","title":"Quantitative Analysis on Source-Location Privacy for Wireless Sensor Networks","display_name":"Quantitative Analysis on Source-Location Privacy for Wireless Sensor Networks","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3048586642","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162756","mag":"3048586642"},"language":"en","primary_location":{"id":"doi:10.1109/infocomwkshps50562.2020.9162756","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162756","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107983832","display_name":"Di Tang","orcid":"https://orcid.org/0000-0002-7031-3315"},"institutions":[{"id":"https://openalex.org/I1302611135","display_name":"Ministry of Public Security of the People's Republic of China","ror":"https://ror.org/00bt9we26","country_code":"CN","type":"government","lineage":["https://openalex.org/I1302611135"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Di Tang","raw_affiliation_strings":["The Third Research Institute of the Ministry of Public Security,Shanghai,China,200031","The Third Research Institute of the Ministry of Public Security, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"The Third Research Institute of the Ministry of Public Security,Shanghai,China,200031","institution_ids":["https://openalex.org/I1302611135"]},{"raw_affiliation_string":"The Third Research Institute of the Ministry of Public Security, Shanghai, China","institution_ids":["https://openalex.org/I1302611135"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100370047","display_name":"Jian Gu","orcid":"https://orcid.org/0009-0005-5918-7433"},"institutions":[{"id":"https://openalex.org/I1302611135","display_name":"Ministry of Public Security of the People's Republic of China","ror":"https://ror.org/00bt9we26","country_code":"CN","type":"government","lineage":["https://openalex.org/I1302611135"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Gu","raw_affiliation_strings":["The Third Research Institute of the Ministry of Public Security,Shanghai,China,200031","The Third Research Institute of the Ministry of Public Security, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"The Third Research Institute of the Ministry of Public Security,Shanghai,China,200031","institution_ids":["https://openalex.org/I1302611135"]},{"raw_affiliation_string":"The Third Research Institute of the Ministry of Public Security, Shanghai, China","institution_ids":["https://openalex.org/I1302611135"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028236191","display_name":"Weijia Han","orcid":"https://orcid.org/0000-0001-8378-3036"},"institutions":[{"id":"https://openalex.org/I88830068","display_name":"Shaanxi Normal University","ror":"https://ror.org/0170z8493","country_code":"CN","type":"education","lineage":["https://openalex.org/I88830068"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weijia Han","raw_affiliation_strings":["Shaan Xi Normal University,Xian,China,710062","Shaan Xi Normal University, Xian, China"],"affiliations":[{"raw_affiliation_string":"Shaan Xi Normal University,Xian,China,710062","institution_ids":["https://openalex.org/I88830068"]},{"raw_affiliation_string":"Shaan Xi Normal University, Xian, China","institution_ids":["https://openalex.org/I88830068"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020323895","display_name":"Xiao Ma","orcid":"https://orcid.org/0000-0003-1017-9481"},"institutions":[{"id":"https://openalex.org/I88830068","display_name":"Shaanxi Normal University","ror":"https://ror.org/0170z8493","country_code":"CN","type":"education","lineage":["https://openalex.org/I88830068"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao Ma","raw_affiliation_strings":["Shaan Xi Normal University,Xian,China,710062","Shaan Xi Normal University, Xian, China"],"affiliations":[{"raw_affiliation_string":"Shaan Xi Normal University,Xian,China,710062","institution_ids":["https://openalex.org/I88830068"]},{"raw_affiliation_string":"Shaan Xi Normal University, Xian, China","institution_ids":["https://openalex.org/I88830068"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5107983832"],"corresponding_institution_ids":["https://openalex.org/I1302611135"],"apc_list":null,"apc_paid":null,"fwci":0.1618,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.53684261,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"805","last_page":"809"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.763698935508728},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6291150450706482},{"id":"https://openalex.org/keywords/geographic-routing","display_name":"Geographic routing","score":0.6033846735954285},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5513477325439453},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.542498767375946},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5399134159088135},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5269649624824524},{"id":"https://openalex.org/keywords/dynamic-source-routing","display_name":"Dynamic Source Routing","score":0.49574288725852966},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4878804683685303},{"id":"https://openalex.org/keywords/wireless-routing-protocol","display_name":"Wireless Routing Protocol","score":0.4815671443939209},{"id":"https://openalex.org/keywords/static-routing","display_name":"Static routing","score":0.470027893781662},{"id":"https://openalex.org/keywords/multipath-routing","display_name":"Multipath routing","score":0.4457356929779053},{"id":"https://openalex.org/keywords/statistic","display_name":"Statistic","score":0.4265996515750885},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.33389508724212646},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32464176416397095}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.763698935508728},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6291150450706482},{"id":"https://openalex.org/C50558702","wikidata":"https://www.wikidata.org/wiki/Q5535067","display_name":"Geographic routing","level":5,"score":0.6033846735954285},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5513477325439453},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.542498767375946},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5399134159088135},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5269649624824524},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.49574288725852966},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4878804683685303},{"id":"https://openalex.org/C47318570","wikidata":"https://www.wikidata.org/wiki/Q8026863","display_name":"Wireless Routing Protocol","level":4,"score":0.4815671443939209},{"id":"https://openalex.org/C204948658","wikidata":"https://www.wikidata.org/wiki/Q1119410","display_name":"Static routing","level":4,"score":0.470027893781662},{"id":"https://openalex.org/C76522221","wikidata":"https://www.wikidata.org/wiki/Q5035396","display_name":"Multipath routing","level":5,"score":0.4457356929779053},{"id":"https://openalex.org/C89128539","wikidata":"https://www.wikidata.org/wiki/Q1949963","display_name":"Statistic","level":2,"score":0.4265996515750885},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33389508724212646},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32464176416397095},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocomwkshps50562.2020.9162756","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162756","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1834982738","https://openalex.org/W1952958290","https://openalex.org/W2030687625","https://openalex.org/W2063547081","https://openalex.org/W2087811006","https://openalex.org/W2088069667","https://openalex.org/W2101963262","https://openalex.org/W2103647628","https://openalex.org/W2106905049","https://openalex.org/W2116330776","https://openalex.org/W2123115882","https://openalex.org/W2127644875","https://openalex.org/W2138515830","https://openalex.org/W2140011697","https://openalex.org/W2152683746","https://openalex.org/W6680773001"],"related_works":["https://openalex.org/W757657516","https://openalex.org/W2539097916","https://openalex.org/W4377970799","https://openalex.org/W2944616377","https://openalex.org/W3127002380","https://openalex.org/W2889464401","https://openalex.org/W2251995179","https://openalex.org/W2002267183","https://openalex.org/W2619478018","https://openalex.org/W2187878328"],"abstract_inverted_index":{"Wireless":[0],"sensor":[1],"networks":[2],"(WSNs)":[3],"have":[4],"been":[5,60],"widely":[6],"used":[7],"in":[8],"various":[9,116],"applications":[10],"for":[11,127],"continuous":[12],"event":[13],"monitoring":[14],"and":[15,63,83,107],"detection.":[16],"Dual":[17],"to":[18,28,38,81],"lack":[19],"of":[20,46,67,88,103,129],"a":[21,76],"protected":[22],"physical":[23],"boundary,":[24],"WSNs":[25],"are":[26,36],"vulnerable":[27],"trace-back":[29],"attacks.":[30],"The":[31,119],"existing":[32,104],"secure":[33,68],"routing":[34,47,69,105,117],"protocols":[35],"designed":[37],"protect":[39],"source":[40,130],"location":[41,131],"privacy":[42],"by":[43],"increasing":[44],"uncertainty":[45],"direction":[48,66,111,126],"against":[49],"statistic":[50],"analysis":[51,121],"on":[52,115],"traffic":[53],"flow.":[54],"Nevertheless,":[55],"the":[56,65,85,89,97,110,125],"security":[57,78],"has":[58],"not":[59],"quantitatively":[61,108],"measured":[62],"shown":[64],"design.":[70],"In":[71],"this":[72],"paper,":[73],"we":[74,100],"propose":[75],"theoretical":[77,98,120],"measurement":[79],"scheme":[80],"define":[82],"analyze":[84],"quantitative":[86],"amount":[87],"information":[90,112],"leakage":[91,113],"from":[92],"each":[93],"eavesdropped":[94],"message.":[95],"Through":[96],"analysis,":[99],"identify":[101],"vulnerabilities":[102],"algorithms":[106],"compute":[109],"based":[114],"strategy.":[118],"results":[122],"also":[123],"indicate":[124],"maximization":[128],"privacy.":[132]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
