{"id":"https://openalex.org/W2526152280","doi":"https://doi.org/10.1109/iwcmc.2016.7577042","title":"Isolated Adversary Zone for source location privacy in Wireless Sensor Networks","display_name":"Isolated Adversary Zone for source location privacy in Wireless Sensor Networks","publication_year":2016,"publication_date":"2016-09-01","ids":{"openalex":"https://openalex.org/W2526152280","doi":"https://doi.org/10.1109/iwcmc.2016.7577042","mag":"2526152280"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2016.7577042","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2016.7577042","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071991420","display_name":"A. Nassiri","orcid":"https://orcid.org/0000-0001-7603-4977"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ali Nassiri","raw_affiliation_strings":["Faculty of Computing, University Technology Malaysia, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computing, University Technology Malaysia, Malaysia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025527058","display_name":"Mohammad A. Razzaque","orcid":"https://orcid.org/0000-0002-5572-057X"},"institutions":[{"id":"https://openalex.org/I205274468","display_name":"Trinity College Dublin","ror":"https://ror.org/02tyrky19","country_code":"IE","type":"education","lineage":["https://openalex.org/I205274468"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"M. A. Razzaque","raw_affiliation_strings":["School of Computer Science and Statistics, Trinity College, Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Statistics, Trinity College, Dublin, Ireland","institution_ids":["https://openalex.org/I205274468"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051692886","display_name":"Abdul Hanan Abdullah","orcid":"https://orcid.org/0000-0002-4948-9607"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Abdul Hanan Abdullah","raw_affiliation_strings":["Faculty of Computing, University Technology Malaysia, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computing, University Technology Malaysia, Malaysia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5071991420"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.7372,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.86580197,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7137031555175781},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6711435317993164},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6174770593643188},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.53061443567276},{"id":"https://openalex.org/keywords/adversary-model","display_name":"Adversary model","score":0.5061852335929871},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4873379170894623},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4684816598892212},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15839174389839172}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7137031555175781},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6711435317993164},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6174770593643188},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.53061443567276},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.5061852335929871},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4873379170894623},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4684816598892212},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15839174389839172}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iwcmc.2016.7577042","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2016.7577042","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},{"id":"pmh:oai:https://research.tees.ac.uk/ws/oai:openaire_cris_publications/8047f819-b747-4269-8e4e-3455f17a611b","is_oa":false,"landing_page_url":"https://research.tees.ac.uk/en/publications/8047f819-b747-4269-8e4e-3455f17a611b","pdf_url":null,"source":{"id":"https://openalex.org/S4306401198","display_name":"TeesRep (Teesside University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I874055015","host_organization_name":"Teesside University","host_organization_lineage":["https://openalex.org/I874055015"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Nassiri, A, Razzaque, M A & Abdullah, A H 2016, Isolated Adversary Zone for source location privacy in Wireless Sensor Networks. in 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016., 7577042, 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016, Institute of Electrical and Electronics Engineers Inc., pp. 108-113, 12th IEEE International Wireless Communications and Mobile Computing Conference, Paphos, Cyprus, 5/09/16. https://doi.org/10.1109/IWCMC.2016.7577042","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.9200000166893005,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1570289766","https://openalex.org/W1835428711","https://openalex.org/W1972001002","https://openalex.org/W1995799737","https://openalex.org/W1995862556","https://openalex.org/W2010357191","https://openalex.org/W2030384189","https://openalex.org/W2050409719","https://openalex.org/W2083388965","https://openalex.org/W2086047941","https://openalex.org/W2088069667","https://openalex.org/W2088233793","https://openalex.org/W2104532741","https://openalex.org/W2110526464","https://openalex.org/W2113398958","https://openalex.org/W2116330776","https://openalex.org/W2117176859","https://openalex.org/W2133494063","https://openalex.org/W2142856968","https://openalex.org/W2154563674","https://openalex.org/W2161411322","https://openalex.org/W2166438308","https://openalex.org/W2168452204","https://openalex.org/W2499130578","https://openalex.org/W2583614008","https://openalex.org/W3142043969","https://openalex.org/W4244190483","https://openalex.org/W4250880474","https://openalex.org/W6634272563","https://openalex.org/W6679839651"],"related_works":["https://openalex.org/W2123681352","https://openalex.org/W2999599390","https://openalex.org/W4315472290","https://openalex.org/W4295124898","https://openalex.org/W2212585693","https://openalex.org/W2918039754","https://openalex.org/W3112099530","https://openalex.org/W2088745056","https://openalex.org/W2085319386","https://openalex.org/W1658340114"],"abstract_inverted_index":{"Privacy,":[0],"especially":[1,98],"source":[2,24,55,87],"location":[3,25,56,88],"privacy":[4,57,89],"in":[5,16,27,37,64,90,130,142],"many":[6],"Wireless":[7],"Sensor":[8],"Networks":[9],"(WSNs)":[10],"applications":[11,29],"plays":[12],"an":[13,113,149,160],"important":[14],"role":[15],"the":[17,32,145],"effectiveness":[18],"of":[19,23,68,123],"these":[20,28],"applications.":[21],"Exposure":[22],"information":[26],"may":[30,60],"put":[31],"monitored":[33],"entities":[34],"or":[35],"subjects":[36],"danger.":[38],"Many":[39],"solutions":[40],"are":[41],"available":[42],"based":[43,54,92],"on":[44,93],"various":[45],"techniques,":[46],"including":[47],"random":[48,52,95],"walk.":[49],"Most":[50],"existing":[51,146],"walk":[53,96],"preservation":[58],"proposals":[59],"not":[61],"work":[62],"well":[63],"critical":[65],"applications,":[66],"because":[67],"their":[69],"insufficient":[70],"safety":[71,104,137],"period,":[72],"high":[73],"energy":[74,107,140],"consumption,":[75],"and":[76,106,126,139],"data":[77],"delivery":[78],"delay.":[79],"This":[80,133],"article":[81],"proposes":[82],"a":[83,94,120],"novel":[84],"solution":[85],"for":[86,99,155],"WSNs":[91],"routing,":[97],"patient":[100,128,151],"attackers":[101,129],"to":[102,144,158],"improve":[103],"period":[105,138],"efficiency.":[108],"The":[109],"proposed":[110],"strategy":[111],"forms":[112],"Isolated":[114],"Adversary":[115],"Zone":[116],"(IAZ)":[117],"by":[118],"sacrificing":[119],"certain":[121],"percentage":[122],"sensor":[124],"nodes":[125],"entraps":[127],"that":[131],"zone.":[132],"approach":[134],"will":[135,153],"increase":[136],"efficiency":[141],"compared":[143],"approaches":[147],"as":[148],"entrapped":[150],"attacker":[152],"wait":[154],"long":[156],"time":[157],"make":[159],"attack.":[161]},"counts_by_year":[{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
