{"id":"https://openalex.org/W4244190483","doi":"https://doi.org/10.1109/ipdps.2006.1639682","title":"Preserving source location privacy in monitoring-based wireless sensor networks","display_name":"Preserving source location privacy in monitoring-based wireless sensor networks","publication_year":2006,"publication_date":"2006-01-01","ids":{"openalex":"https://openalex.org/W4244190483","doi":"https://doi.org/10.1109/ipdps.2006.1639682"},"language":"en","primary_location":{"id":"doi:10.1109/ipdps.2006.1639682","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipdps.2006.1639682","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings 20th IEEE International Parallel &amp; Distributed Processing Symposium","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100296831","display_name":"Yong Xi","orcid":null},"institutions":[{"id":"https://openalex.org/I185443292","display_name":"Wayne State University","ror":"https://ror.org/01070mq45","country_code":"US","type":"education","lineage":["https://openalex.org/I185443292"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yong Xi","raw_affiliation_strings":["Department of Computer Science, Wayne State University, Detroit, MI, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Wayne State University, Detroit, MI, USA","institution_ids":["https://openalex.org/I185443292"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085222174","display_name":"Loren Schwiebert","orcid":"https://orcid.org/0000-0002-7167-7436"},"institutions":[{"id":"https://openalex.org/I185443292","display_name":"Wayne State University","ror":"https://ror.org/01070mq45","country_code":"US","type":"education","lineage":["https://openalex.org/I185443292"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"L. Schwiebert","raw_affiliation_strings":["Department of Computer Science, Wayne State University, Detroit, MI, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Wayne State University, Detroit, MI, USA","institution_ids":["https://openalex.org/I185443292"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100651611","display_name":"Weisong Shi","orcid":"https://orcid.org/0000-0001-5864-4675"},"institutions":[{"id":"https://openalex.org/I185443292","display_name":"Wayne State University","ror":"https://ror.org/01070mq45","country_code":"US","type":"education","lineage":["https://openalex.org/I185443292"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Weisong Shi","raw_affiliation_strings":["Department of Computer Science, Wayne State University, Detroit, MI, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Wayne State University, Detroit, MI, USA","institution_ids":["https://openalex.org/I185443292"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100296831"],"corresponding_institution_ids":["https://openalex.org/I185443292"],"apc_list":null,"apc_paid":null,"fwci":3.9232,"has_fulltext":false,"cited_by_count":73,"citation_normalized_percentile":{"value":0.94370137,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7879294157028198},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.7006251811981201},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6942319869995117},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6706373691558838},{"id":"https://openalex.org/keywords/backtracking","display_name":"Backtracking","score":0.6642711162567139},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.6048651337623596},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.579136848449707},{"id":"https://openalex.org/keywords/geographic-routing","display_name":"Geographic routing","score":0.5641549825668335},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.47913429141044617},{"id":"https://openalex.org/keywords/sink","display_name":"Sink (geography)","score":0.4570174515247345},{"id":"https://openalex.org/keywords/broadcasting","display_name":"Broadcasting (networking)","score":0.44260379672050476},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.43609100580215454},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.4131869375705719},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.3936215043067932},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32785531878471375},{"id":"https://openalex.org/keywords/static-routing","display_name":"Static routing","score":0.24258744716644287},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11526912450790405}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7879294157028198},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.7006251811981201},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6942319869995117},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6706373691558838},{"id":"https://openalex.org/C156884757","wikidata":"https://www.wikidata.org/wiki/Q798554","display_name":"Backtracking","level":2,"score":0.6642711162567139},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.6048651337623596},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.579136848449707},{"id":"https://openalex.org/C50558702","wikidata":"https://www.wikidata.org/wiki/Q5535067","display_name":"Geographic routing","level":5,"score":0.5641549825668335},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.47913429141044617},{"id":"https://openalex.org/C143050476","wikidata":"https://www.wikidata.org/wiki/Q194502","display_name":"Sink (geography)","level":2,"score":0.4570174515247345},{"id":"https://openalex.org/C110157686","wikidata":"https://www.wikidata.org/wiki/Q922122","display_name":"Broadcasting (networking)","level":2,"score":0.44260379672050476},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.43609100580215454},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.4131869375705719},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.3936215043067932},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32785531878471375},{"id":"https://openalex.org/C204948658","wikidata":"https://www.wikidata.org/wiki/Q1119410","display_name":"Static routing","level":4,"score":0.24258744716644287},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11526912450790405},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C58640448","wikidata":"https://www.wikidata.org/wiki/Q42515","display_name":"Cartography","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ipdps.2006.1639682","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipdps.2006.1639682","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings 20th IEEE International Parallel &amp; Distributed Processing Symposium","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.9200000166893005}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1993284846","https://openalex.org/W2088069667","https://openalex.org/W2101771805","https://openalex.org/W2106905049","https://openalex.org/W2116330776","https://openalex.org/W2125613938","https://openalex.org/W2126947768","https://openalex.org/W2141351878","https://openalex.org/W4213165937","https://openalex.org/W6675275259","https://openalex.org/W6678344443"],"related_works":["https://openalex.org/W2760348722","https://openalex.org/W2783885583","https://openalex.org/W2120095724","https://openalex.org/W2368326437","https://openalex.org/W1631221657","https://openalex.org/W2357479099","https://openalex.org/W2098006806","https://openalex.org/W2088874939","https://openalex.org/W2362502955","https://openalex.org/W1484363311"],"abstract_inverted_index":{"While":[0],"a":[1,45,73,111,120,168],"wireless":[2],"sensor":[3,174],"network":[4,175],"is":[5,18,108,119,131,153,165],"deployed":[6],"to":[7,83],"monitor":[8,28],"certain":[9,40],"events":[10],"and":[11,31,63,81,103],"pinpoint":[12],"their":[13],"locations,":[14],"the":[15,29,33,49,55,85,91,96,126,137,147,150,157],"location":[16,35,92],"information":[17],"intended":[19],"only":[20],"for":[21],"legitimate":[22],"users.":[23],"However,":[24],"an":[25,87],"eavesdropper":[26,88],"can":[27,89],"traffic":[30],"deduce":[32],"approximate":[34],"of":[36,125,142,160],"monitored":[37],"objects":[38],"in":[39,54,167],"situations.":[41],"We":[42,94],"first":[43],"describe":[44],"successful":[46],"attack":[47,113],"against":[48],"flooding-based":[50],"phantom":[51,162],"routing,":[52,163],"proposed":[53],"seminal":[56],"work":[57],"by":[58,99],"Celal":[59],"Ozturk,":[60],"Yanyong":[61],"Zhang,":[62],"Wade":[64],"Trappe.":[65],"Then,":[66],"we":[67,135],"propose":[68],"GROW":[69],"(Greedy":[70],"Random":[71],"Walk),":[72],"two-way":[74],"random":[75],"walk,":[76],"i.e.,":[77],"from":[78],"both":[79],"source":[80],"sink,":[82],"reduce":[84],"chance":[86],"collect":[90],"information.":[93],"improve":[95],"delivery":[97,117],"rate":[98],"using":[100],"local":[101],"broadcasting":[102],"greedy":[104],"forwarding.":[105],"Privacy":[106],"protection":[107],"verified":[109],"under":[110],"backtracking":[112],"model.":[114],"The":[115],"message":[116],"time":[118],"little":[121],"longer":[122],"than":[123,155],"that":[124],"broadcasting-based":[127],"approach,":[128],"but":[129],"it":[130],"still":[132],"acceptable":[133],"if":[134],"consider":[136],"enhanced":[138],"privacy":[139],"preserving":[140],"capability":[141],"this":[143],"new":[144],"approach.":[145],"At":[146],"same":[148],"time,":[149],"energy":[151,158],"consumption":[152,159],"less":[154],"half":[156],"flooding-base":[161],"which":[164],"preferred":[166],"low":[169],"duty":[170],"cycle,":[171],"environmental":[172],"monitoring":[173]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":8},{"year":2012,"cited_by_count":12}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
