{"id":"https://openalex.org/W4414871466","doi":"https://doi.org/10.1109/jiot.2025.3616959","title":"Malicious Node Detection Scheme in WSN Based on Secure Computation of Spatially Parallel Straight-Line Distance","display_name":"Malicious Node Detection Scheme in WSN Based on Secure Computation of Spatially Parallel Straight-Line Distance","publication_year":2025,"publication_date":"2025-10-06","ids":{"openalex":"https://openalex.org/W4414871466","doi":"https://doi.org/10.1109/jiot.2025.3616959"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3616959","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3616959","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058509635","display_name":"Xin Liu","orcid":"https://orcid.org/0000-0002-2242-6139"},"institutions":[{"id":"https://openalex.org/I31637741","display_name":"Inner Mongolia University of Science and Technology","ror":"https://ror.org/044rgx723","country_code":"CN","type":"education","lineage":["https://openalex.org/I31637741"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xin Liu","raw_affiliation_strings":["School of Digital and Intelligent Industry, Inner Mongolia University of Science and Technology, Baotou, China"],"affiliations":[{"raw_affiliation_string":"School of Digital and Intelligent Industry, Inner Mongolia University of Science and Technology, Baotou, China","institution_ids":["https://openalex.org/I31637741"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Huize Gao","orcid":"https://orcid.org/0009-0002-5955-9004"},"institutions":[{"id":"https://openalex.org/I31637741","display_name":"Inner Mongolia University of Science and Technology","ror":"https://ror.org/044rgx723","country_code":"CN","type":"education","lineage":["https://openalex.org/I31637741"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huize Gao","raw_affiliation_strings":["School of Digital and Intelligent Industry, Inner Mongolia University of Science and Technology, Baotou, China"],"affiliations":[{"raw_affiliation_string":"School of Digital and Intelligent Industry, Inner Mongolia University of Science and Technology, Baotou, China","institution_ids":["https://openalex.org/I31637741"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040745629","display_name":"Dan Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I4403928323","display_name":"Tianjin Renai College","ror":"https://ror.org/03e5da851","country_code":null,"type":"education","lineage":["https://openalex.org/I4403928323"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dan Luo","raw_affiliation_strings":["School of Intelligent Computing Engineering, Tianjin Renai College, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Intelligent Computing Engineering, Tianjin Renai College, Tianjin, China","institution_ids":["https://openalex.org/I4403928323"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Lanying Liang","orcid":"https://orcid.org/0009-0001-4644-5115"},"institutions":[{"id":"https://openalex.org/I31637741","display_name":"Inner Mongolia University of Science and Technology","ror":"https://ror.org/044rgx723","country_code":"CN","type":"education","lineage":["https://openalex.org/I31637741"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lanying Liang","raw_affiliation_strings":["School of Digital and Intelligent Industry, Inner Mongolia University of Science and Technology, Baotou, China"],"affiliations":[{"raw_affiliation_string":"School of Digital and Intelligent Industry, Inner Mongolia University of Science and Technology, Baotou, China","institution_ids":["https://openalex.org/I31637741"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101880469","display_name":"Zhen Wu","orcid":"https://orcid.org/0000-0002-6868-685X"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Ye","raw_affiliation_strings":["Beijing Institute of Computer Technology and Application, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of Computer Technology and Application, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028032539","display_name":"Likai Jia","orcid":"https://orcid.org/0000-0003-4151-2881"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Likai Jia","raw_affiliation_strings":["Beijing Institute of Computer Technology and Application, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of Computer Technology and Application, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101824334","display_name":"Shijie Jia","orcid":"https://orcid.org/0000-0002-4262-9478"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shijie Jia","raw_affiliation_strings":["Institute of Information Engineering, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045319978","display_name":"Gang Xu","orcid":"https://orcid.org/0000-0002-1409-252X"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gang Xu","raw_affiliation_strings":["School of Artificial Intelligence and Computer Science, North China University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence and Computer Science, North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102742229","display_name":"Xiu\u2010Bo Chen","orcid":"https://orcid.org/0000-0002-0178-6004"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiubo Chen","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086475357","display_name":"Yu Gu","orcid":"https://orcid.org/0000-0003-4345-6932"},"institutions":[{"id":"https://openalex.org/I31637741","display_name":"Inner Mongolia University of Science and Technology","ror":"https://ror.org/044rgx723","country_code":"CN","type":"education","lineage":["https://openalex.org/I31637741"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Gu","raw_affiliation_strings":["School of Digital and Intelligent Industry, Inner Mongolia University of Science and Technology, Baotou, China"],"affiliations":[{"raw_affiliation_string":"School of Digital and Intelligent Industry, Inner Mongolia University of Science and Technology, Baotou, China","institution_ids":["https://openalex.org/I31637741"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071736648","display_name":"Baohua Zhang","orcid":"https://orcid.org/0000-0003-2920-8561"},"institutions":[{"id":"https://openalex.org/I31637741","display_name":"Inner Mongolia University of Science and Technology","ror":"https://ror.org/044rgx723","country_code":"CN","type":"education","lineage":["https://openalex.org/I31637741"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baohua Zhang","raw_affiliation_strings":["School of Digital and Intelligent Industry, Inner Mongolia University of Science and Technology, Baotou, China"],"affiliations":[{"raw_affiliation_string":"School of Digital and Intelligent Industry, Inner Mongolia University of Science and Technology, Baotou, China","institution_ids":["https://openalex.org/I31637741"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":11,"corresponding_author_ids":["https://openalex.org/A5058509635"],"corresponding_institution_ids":["https://openalex.org/I31637741"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31591654,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":"24","first_page":"53520","last_page":"53537"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.8514000177383423,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.8514000177383423,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13731","display_name":"Advanced Computing and Algorithms","score":0.7803000211715698,"subfield":{"id":"https://openalex.org/subfields/3322","display_name":"Urban Studies"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.654699981212616},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4724000096321106},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4715000092983246},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.46239998936653137},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.44040000438690186},{"id":"https://openalex.org/keywords/adversary-model","display_name":"Adversary model","score":0.4390000104904175},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4207000136375427},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.40389999747276306},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.40139999985694885},{"id":"https://openalex.org/keywords/secure-two-party-computation","display_name":"Secure two-party computation","score":0.39089998602867126}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8450000286102295},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.654699981212616},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5873000025749207},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4837000072002411},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4724000096321106},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4715000092983246},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.46239998936653137},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.44040000438690186},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.4390000104904175},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4207000136375427},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.40389999747276306},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.40139999985694885},{"id":"https://openalex.org/C13652956","wikidata":"https://www.wikidata.org/wiki/Q7444883","display_name":"Secure two-party computation","level":4,"score":0.39089998602867126},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3610999882221222},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.3538999855518341},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3418000042438507},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.3224000036716461},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.3109000027179718},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.3073999881744385},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2915000021457672},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.2915000021457672},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.28540000319480896},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.2849999964237213},{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.2824000120162964},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.27900001406669617},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27639999985694885},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.27619999647140503},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.27619999647140503},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2761000096797943},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2727999985218048},{"id":"https://openalex.org/C4042151","wikidata":"https://www.wikidata.org/wiki/Q215111","display_name":"Homomorphism","level":2,"score":0.2653999924659729},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.25060001015663147}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3616959","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3616959","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2090941567","display_name":null,"funder_award_id":"62441212","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1548880861","https://openalex.org/W1675339804","https://openalex.org/W2587122949","https://openalex.org/W2923796516","https://openalex.org/W2947538082","https://openalex.org/W3000040791","https://openalex.org/W3000420884","https://openalex.org/W3007447684","https://openalex.org/W3021638025","https://openalex.org/W3028449155","https://openalex.org/W3037233857","https://openalex.org/W3082758965","https://openalex.org/W3089865507","https://openalex.org/W3118794076","https://openalex.org/W3141585064","https://openalex.org/W3163508094","https://openalex.org/W3190283749","https://openalex.org/W3211976490","https://openalex.org/W3212495820","https://openalex.org/W3212593277","https://openalex.org/W3213655764","https://openalex.org/W3213755975","https://openalex.org/W4206722557","https://openalex.org/W4214569539","https://openalex.org/W4224230346","https://openalex.org/W4226106055","https://openalex.org/W4285239891","https://openalex.org/W4285357002","https://openalex.org/W4312428916","https://openalex.org/W4313584135","https://openalex.org/W4385413426","https://openalex.org/W4390511794","https://openalex.org/W4392949721","https://openalex.org/W4394002152","https://openalex.org/W4400940850"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,10,33,77,82,87,93,98,105,109,115,121,129,152,211],"wide":[2],"applications":[3],"of":[4,12,18,35,120,151,215],"wireless":[5],"sensor":[6],"networks":[7],"(WSN)":[8],"in":[9,103],"fields":[11],"smart":[13],"transportation":[14],"and":[15,29,46,66,96,128,139,213],"industrial":[16],"internet":[17],"things":[19],"(IIoT),":[20],"there":[21],"is":[22,112,126,131,156,176,192],"an":[23,199,206],"increasing":[24],"demand":[25],"for":[26,97,202,209],"their":[27],"security":[28,130,212],"trustworthiness.":[30],"To":[31],"solve":[32],"problem":[34],"WSN\u2019s":[36],"malicious":[37,56,99,110,173,186],"nodes":[38,57],"such":[39],"as":[40],"identity":[41],"forgery":[42],"attacks,":[43,48,188],"node":[44],"spoofing,":[45],"man-in-the-middle":[47],"this":[49],"paper":[50],"proposes":[51],"a":[52],"scheme":[53,75],"that":[54],"detects":[55],"by":[58,133,158,170],"securely":[59],"computing":[60],"spatially":[61],"parallel":[62],"straight-line":[63],"distance":[64],"(SPSLD)":[65],"combining":[67],"it":[68],"with":[69,81,114,166],"secure":[70,89,106],"multi-party":[71],"computation":[72,90],"(MPC).":[73],"This":[74],"uses":[76],"NTRU":[78],"encryption":[79],"algorithm":[80],"additive":[83],"homomorphism":[84],"to":[85,163],"design":[86],"SPSLD":[88],"protocol":[91,107,122,155,175],"under":[92,108,123],"semi-honest":[94,153],"model,":[95],"attack":[100],"behaviors":[101],"present":[102],"it,":[104],"model":[111,135,154,174],"proposed":[113],"cut-and-choose":[116],"method.":[117],"The":[118,148,172],"correctness":[119],"different":[124],"models":[125],"analyzed,":[127],"proved":[132],"real/ideal":[134],"paradigm.":[136],"Performance":[137],"comparison":[138],"experimental":[140],"simulation":[141],"results":[142],"indicate":[143],"that,":[144],"while":[145],"ensuring":[146],"security:":[147],"computational":[149],"complexity":[150],"reduced":[157],"at":[159],"least":[160],"85%":[161],"compared":[162],"Paillier-based":[164],"schemes,":[165,182],"execution":[167,195],"time":[168],"shortened":[169],"32-46%.":[171],"12%":[177],"faster":[178],"than":[179],"similar":[180],"attack-resistant":[181],"effectively":[183],"defending":[184],"against":[185],"adversary":[187],"although":[189],"additional":[190],"overhead":[191],"introduced,":[193],"its":[194],"efficiency":[196],"remains":[197],"within":[198],"acceptable":[200],"range":[201],"WSN":[203],"environments,":[204],"providing":[205],"efficient":[207],"solution":[208],"enhancing":[210],"reliability":[214],"WSN.":[216]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
