{"id":"https://openalex.org/W2060708215","doi":"https://doi.org/10.1109/jiot.2014.2346813","title":"An Anti-Tracking Source-Location Privacy Protection Protocol in WSNs Based on Path Extension","display_name":"An Anti-Tracking Source-Location Privacy Protection Protocol in WSNs Based on Path Extension","publication_year":2014,"publication_date":"2014-08-12","ids":{"openalex":"https://openalex.org/W2060708215","doi":"https://doi.org/10.1109/jiot.2014.2346813","mag":"2060708215"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2014.2346813","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2014.2346813","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019279689","display_name":"Wei Tan","orcid":"https://orcid.org/0000-0001-8894-8290"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Tan","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China","Dept. of Computer Science & Technology, Tsinghua University, Beijing, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Dept. of Computer Science & Technology, Tsinghua University, Beijing, China#TAB#","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100665814","display_name":"Ke Xu","orcid":"https://orcid.org/0000-0003-2587-8517"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Xu","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China","Dept. of Computer Science & Technology, Tsinghua University, Beijing, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Dept. of Computer Science & Technology, Tsinghua University, Beijing, China#TAB#","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100411794","display_name":"Dan Wang","orcid":"https://orcid.org/0000-0002-0921-2726"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Dan Wang","raw_affiliation_strings":["Department of Computing, The Hong Kong Polytechnic University, Kowloon, Hong Kong","Department of computing, The Hong Kong Polytechnic University, Kowloon, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University, Kowloon, Hong Kong","institution_ids":["https://openalex.org/I14243506"]},{"raw_affiliation_string":"Department of computing, The Hong Kong Polytechnic University, Kowloon, Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5019279689"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":8.2434,"has_fulltext":false,"cited_by_count":63,"citation_normalized_percentile":{"value":0.97679526,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"1","issue":"5","first_page":"461","last_page":"471"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8387793302536011},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8256033658981323},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6564314365386963},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6241561770439148},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.5985750555992126},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5973434448242188},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.5110183954238892},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5109226107597351},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5015487670898438},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5006444454193115},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.4699796736240387},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43429094552993774},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.42691296339035034}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8387793302536011},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8256033658981323},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6564314365386963},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6241561770439148},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.5985750555992126},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5973434448242188},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.5110183954238892},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5109226107597351},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5015487670898438},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5006444454193115},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.4699796736240387},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43429094552993774},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.42691296339035034},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jiot.2014.2346813","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2014.2346813","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-167583","is_oa":false,"landing_page_url":"http://repository.hkust.edu.hk/ir/Record/1783.1-167583","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1508314238","https://openalex.org/W1969575473","https://openalex.org/W1971017549","https://openalex.org/W1989786539","https://openalex.org/W1991107360","https://openalex.org/W2030439613","https://openalex.org/W2038976731","https://openalex.org/W2086047941","https://openalex.org/W2088069667","https://openalex.org/W2088745056","https://openalex.org/W2103647628","https://openalex.org/W2106905049","https://openalex.org/W2114495437","https://openalex.org/W2116330776","https://openalex.org/W2125428225","https://openalex.org/W2128381560","https://openalex.org/W2133494063","https://openalex.org/W2138515830","https://openalex.org/W2144200627","https://openalex.org/W2152158138","https://openalex.org/W2166438308","https://openalex.org/W2168452204","https://openalex.org/W4231753281","https://openalex.org/W4244190483","https://openalex.org/W6630387966","https://openalex.org/W6675692726","https://openalex.org/W6679839651"],"related_works":["https://openalex.org/W112420819","https://openalex.org/W2918039754","https://openalex.org/W2783100162","https://openalex.org/W2889153935","https://openalex.org/W2982666975","https://openalex.org/W2154174517","https://openalex.org/W2281798379","https://openalex.org/W2949977080","https://openalex.org/W189451467","https://openalex.org/W2063001207"],"abstract_inverted_index":{"In":[0,88,131],"the":[1,26,32,37,43,61,79,117,125,139,145,161,172],"application":[2],"field":[3],"using":[4],"sensor":[5,64],"networks":[6],"to":[7,25,36,77,144],"monitor":[8],"valuable":[9],"asset,":[10],"source-location":[11,105,194],"anonymity":[12],"is":[13,176,190],"a":[14,18,93],"serious":[15],"concern.":[16],"As":[17],"series":[19],"of":[20,49,63,82,180],"event":[21,142],"packets":[22],"are":[23,75,135],"reported":[24],"base":[27,118,146],"station,":[28,119,147],"adversaries":[29],"eavesdropping":[30],"on":[31],"network":[33,162],"can":[34],"backtrack":[35],"source":[38,73,126,140,173],"through":[39],"traffic":[40],"analysis":[41],"and":[42,58,163,184,201],"RF":[44],"localization":[45],"techniques.":[46],"This":[47],"leakage":[48],"contextual":[50],"information":[51],"will":[52,166],"expose":[53],"sensitive":[54],"or":[55,72],"precious":[56],"objects":[57],"bring":[59],"down":[60],"effectiveness":[62],"networks.":[65],"Existing":[66],"techniques":[67],"such":[68],"as":[69],"phantom":[70],"routing":[71],"simulation":[74,185],"proposed":[76],"discourage":[78],"adversaries,":[80],"both":[81],"which":[83,148],"trade":[84],"energy":[85],"for":[86,104],"security.":[87],"this":[89,129],"paper,":[90],"we":[91],"propose":[92],"new":[94],"scheme,":[95],"called":[96],"path":[97],"extension":[98],"method":[99],"(PEM),":[100],"providing":[101],"strong":[102],"protection":[103],"privacy.":[106],"It":[107],"performs":[108],"quite":[109],"well":[110,127],"even":[111],"though":[112],"an":[113,164],"object":[114],"occurs":[115],"near":[116],"while":[120],"other":[121],"methods":[122],"cannot":[123],"protect":[124],"in":[128,160,192],"case.":[130],"PEM,":[132],"fake":[133,158],"sources":[134,155],"generated":[136],"dynamically":[137],"after":[138],"sends":[141],"messages":[143],"makes":[149],"it":[150,175],"much":[151],"more":[152],"flexible.":[153],"Fake":[154],"form":[156],"several":[157],"paths":[159],"adversary":[165],"be":[167],"induced":[168],"farther":[169],"away":[170],"from":[171],"if":[174],"entrapped":[177],"by":[178],"any":[179],"them.":[181],"The":[182],"theoretical":[183],"results":[186],"show":[187],"that":[188],"PEM":[189],"efficient":[191],"protecting":[193],"privacy":[195],"with":[196],"minimal":[197],"message":[198],"delivery":[199],"delay":[200],"acceptable":[202],"overhead.":[203]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":8},{"year":2016,"cited_by_count":9},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
