{"id":"https://openalex.org/W2081847996","doi":"https://doi.org/10.1109/lcn.2012.6423678","title":"An approach for bounding breach path detection reliability in wireless sensor networks","display_name":"An approach for bounding breach path detection reliability in wireless sensor networks","publication_year":2012,"publication_date":"2012-10-01","ids":{"openalex":"https://openalex.org/W2081847996","doi":"https://doi.org/10.1109/lcn.2012.6423678","mag":"2081847996"},"language":"en","primary_location":{"id":"doi:10.1109/lcn.2012.6423678","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2012.6423678","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"37th Annual IEEE Conference on Local Computer Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005516126","display_name":"M. H. Shazly","orcid":null},"institutions":[{"id":"https://openalex.org/I154425047","display_name":"University of Alberta","ror":"https://ror.org/0160cpw27","country_code":"CA","type":"education","lineage":["https://openalex.org/I154425047"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Mohamed H. Shazly","raw_affiliation_strings":["Department of Computing Science, University of Alberta, Edmonton, Canada","Department of Computing Science, University of Alberta, Edmonton, T6G 2E8 Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computing Science, University of Alberta, Edmonton, Canada","institution_ids":["https://openalex.org/I154425047"]},{"raw_affiliation_string":"Department of Computing Science, University of Alberta, Edmonton, T6G 2E8 Canada","institution_ids":["https://openalex.org/I154425047"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059304834","display_name":"Ehab S. Elmallah","orcid":null},"institutions":[{"id":"https://openalex.org/I154425047","display_name":"University of Alberta","ror":"https://ror.org/0160cpw27","country_code":"CA","type":"education","lineage":["https://openalex.org/I154425047"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ehab S. Elmallah","raw_affiliation_strings":["Department of Computing Science, University of Alberta, Edmonton, Canada","Department of Computing Science, University of Alberta, Edmonton, T6G 2E8 Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computing Science, University of Alberta, Edmonton, Canada","institution_ids":["https://openalex.org/I154425047"]},{"raw_affiliation_string":"Department of Computing Science, University of Alberta, Edmonton, T6G 2E8 Canada","institution_ids":["https://openalex.org/I154425047"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053810473","display_name":"Janelle Harms","orcid":"https://orcid.org/0000-0003-0769-5709"},"institutions":[{"id":"https://openalex.org/I154425047","display_name":"University of Alberta","ror":"https://ror.org/0160cpw27","country_code":"CA","type":"education","lineage":["https://openalex.org/I154425047"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Janelle Harms","raw_affiliation_strings":["Department of Computing Science, University of Alberta, Edmonton, Canada","Department of Computing Science, University of Alberta, Edmonton, T6G 2E8 Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computing Science, University of Alberta, Edmonton, Canada","institution_ids":["https://openalex.org/I154425047"]},{"raw_affiliation_string":"Department of Computing Science, University of Alberta, Edmonton, T6G 2E8 Canada","institution_ids":["https://openalex.org/I154425047"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5005516126"],"corresponding_institution_ids":["https://openalex.org/I154425047"],"apc_list":null,"apc_paid":null,"fwci":0.7092,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.7344018,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"585","last_page":"592"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12879","display_name":"Distributed Sensor Networks and Detection Algorithms","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.79552161693573},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7304570078849792},{"id":"https://openalex.org/keywords/bounding-overwatch","display_name":"Bounding overwatch","score":0.6588340997695923},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5254278182983398},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5173137187957764},{"id":"https://openalex.org/keywords/perimeter","display_name":"Perimeter","score":0.5135459899902344},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.4938991665840149},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4618476927280426},{"id":"https://openalex.org/keywords/polygon","display_name":"Polygon (computer graphics)","score":0.44575855135917664},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.42982199788093567},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13874053955078125},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11551952362060547}],"concepts":[{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.79552161693573},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7304570078849792},{"id":"https://openalex.org/C63584917","wikidata":"https://www.wikidata.org/wiki/Q333286","display_name":"Bounding overwatch","level":2,"score":0.6588340997695923},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5254278182983398},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5173137187957764},{"id":"https://openalex.org/C98503990","wikidata":"https://www.wikidata.org/wiki/Q28474","display_name":"Perimeter","level":2,"score":0.5135459899902344},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4938991665840149},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4618476927280426},{"id":"https://openalex.org/C190694206","wikidata":"https://www.wikidata.org/wiki/Q3276654","display_name":"Polygon (computer graphics)","level":3,"score":0.44575855135917664},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.42982199788093567},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13874053955078125},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11551952362060547},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcn.2012.6423678","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2012.6423678","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"37th Annual IEEE Conference on Local Computer Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W107817730","https://openalex.org/W1503175212","https://openalex.org/W1976605067","https://openalex.org/W1982702870","https://openalex.org/W1987877930","https://openalex.org/W2027157478","https://openalex.org/W2049150042","https://openalex.org/W2100430744","https://openalex.org/W2121786835","https://openalex.org/W2129751240","https://openalex.org/W6604400733"],"related_works":["https://openalex.org/W1977612671","https://openalex.org/W4235563942","https://openalex.org/W1970646112","https://openalex.org/W4297493199","https://openalex.org/W2064010689","https://openalex.org/W2075768481","https://openalex.org/W2999818717","https://openalex.org/W2488601361","https://openalex.org/W3090847186","https://openalex.org/W4386721516"],"abstract_inverted_index":{"This":[0],"paper":[1],"considers":[2],"wireless":[3],"sensor":[4,93],"networks":[5,35,79],"(WSNs)":[6],"deployed":[7],"to":[8,15,21,38,49,55,60,78,151,190],"provide":[9],"surveillance":[10],"against":[11],"intruders":[12],"that":[13,76],"wish":[14],"cross":[16],"a":[17,47,57,84,105,120],"given":[18],"area.":[19],"Due":[20],"limited":[22],"resources,":[23],"low":[24],"manufacturing":[25],"cost,":[26],"and":[27,98],"operation":[28],"in":[29,33,41],"harsh":[30],"environments,":[31],"nodes":[32,94],"such":[34,67,108,141],"are":[36],"subject":[37],"random":[39],"failure":[40],"the":[42,70,99,115,126,145,159,170,176,182,192,200],"field.":[43],"Hence,":[44],"there":[45],"is":[46,102,117,179,188],"need":[48],"develop":[50],"suitable":[51],"reliability":[52,74],"assessment":[53],"mechanisms":[54],"quantify":[56],"WSN's":[58],"ability":[59],"perform":[61],"successfully.":[62],"Here,":[63],"we":[64],"consider":[65],"one":[66],"measure,":[68],"called":[69],"breach":[71,112],"path":[72,113],"detection":[73],"(BPDREL),":[75],"applies":[77],"where":[80,175],"any":[81,137],"intruder":[82],"crossing":[83],"line":[85,109],"segment":[86],"between":[87],"some":[88],"adjacent":[89],"operating":[90],"pairs":[91],"of":[92,104,107,122,140,194],"can":[95,148],"be":[96,149,152],"detected,":[97],"network":[100,116,197,202],"perimeter":[101],"made":[103],"polygon":[106],"segments.":[110],"Each":[111],"across":[114],"associated":[118,135],"with":[119,136],"pair":[121],"entry-exit":[123,142],"sides":[124],"on":[125,158,169,181,199],"perimeter.":[127,184],"Our":[128],"measure":[129],"takes":[130],"into":[131],"account":[132],"intrusion":[133],"events":[134],"user-specified":[138],"set":[139],"sides.":[143],"Computing":[144],"exact":[146],"BPDREL":[147,160],"shown":[150],"#P-hard.":[153],"We":[154],"extend":[155],"existing":[156],"results":[157],"by":[161],"developing":[162],"an":[163],"approach":[164],"for":[165,172],"deriving":[166],"lower":[167],"bounds":[168],"problem":[171],"arbitrary":[173],"WSNs":[174],"sink":[177],"node":[178],"located":[180],"network's":[183],"The":[185],"resulting":[186],"algorithm":[187],"used":[189],"analyze":[191],"impact":[193],"varying":[195],"various":[196],"parameters":[198],"overall":[201],"reliability.":[203]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
