{"id":"https://openalex.org/W2080009314","doi":"https://doi.org/10.1109/lcn.2014.6925779","title":"Breach path to target area detection reliability in Wireless Sensor Networks","display_name":"Breach path to target area detection reliability in Wireless Sensor Networks","publication_year":2014,"publication_date":"2014-09-01","ids":{"openalex":"https://openalex.org/W2080009314","doi":"https://doi.org/10.1109/lcn.2014.6925779","mag":"2080009314"},"language":"en","primary_location":{"id":"doi:10.1109/lcn.2014.6925779","is_oa":true,"landing_page_url":"https://doi.org/10.1109/lcn.2014.6925779","pdf_url":"https://ieeexplore.ieee.org/ielx7/6916486/6925725/06925779.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"39th Annual IEEE Conference on Local Computer Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6916486/6925725/06925779.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080854769","display_name":"Mohammed Elmorsy","orcid":null},"institutions":[{"id":"https://openalex.org/I154425047","display_name":"University of Alberta","ror":"https://ror.org/0160cpw27","country_code":"CA","type":"education","lineage":["https://openalex.org/I154425047"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Mohammed Elmorsy","raw_affiliation_strings":["Department of Computing Science, University of Alberta, Edmonton, Canada","Department of Computing Science, University of Alberta, Edmonton, T6G 2E8 Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computing Science, University of Alberta, Edmonton, Canada","institution_ids":["https://openalex.org/I154425047"]},{"raw_affiliation_string":"Department of Computing Science, University of Alberta, Edmonton, T6G 2E8 Canada","institution_ids":["https://openalex.org/I154425047"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059304834","display_name":"Ehab S. Elmallah","orcid":null},"institutions":[{"id":"https://openalex.org/I154425047","display_name":"University of Alberta","ror":"https://ror.org/0160cpw27","country_code":"CA","type":"education","lineage":["https://openalex.org/I154425047"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ehab S. Elmallah","raw_affiliation_strings":["Department of Computing Science, University of Alberta, Edmonton, Canada","Department of Computing Science, University of Alberta, Edmonton, T6G 2E8 Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computing Science, University of Alberta, Edmonton, Canada","institution_ids":["https://openalex.org/I154425047"]},{"raw_affiliation_string":"Department of Computing Science, University of Alberta, Edmonton, T6G 2E8 Canada","institution_ids":["https://openalex.org/I154425047"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5080854769"],"corresponding_institution_ids":["https://openalex.org/I154425047"],"apc_list":null,"apc_paid":null,"fwci":1.3792,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.84228727,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"14","issue":null,"first_page":"253","last_page":"261"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12879","display_name":"Distributed Sensor Networks and Detection Algorithms","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.834291934967041},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.771399974822998},{"id":"https://openalex.org/keywords/tree-traversal","display_name":"Tree traversal","score":0.7617500424385071},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5873417854309082},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5147922039031982},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5063759088516235},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46703407168388367},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.44363054633140564},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.41716575622558594},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.41510605812072754},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.41498199105262756},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.39358916878700256},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.382846474647522},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.21382027864456177},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1945103108882904},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10904824733734131}],"concepts":[{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.834291934967041},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.771399974822998},{"id":"https://openalex.org/C140745168","wikidata":"https://www.wikidata.org/wiki/Q1210082","display_name":"Tree traversal","level":2,"score":0.7617500424385071},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5873417854309082},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5147922039031982},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5063759088516235},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46703407168388367},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.44363054633140564},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.41716575622558594},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41510605812072754},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.41498199105262756},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.39358916878700256},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.382846474647522},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.21382027864456177},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1945103108882904},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10904824733734131},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcn.2014.6925779","is_oa":true,"landing_page_url":"https://doi.org/10.1109/lcn.2014.6925779","pdf_url":"https://ieeexplore.ieee.org/ielx7/6916486/6925725/06925779.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"39th Annual IEEE Conference on Local Computer Networks","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1109/lcn.2014.6925779","is_oa":true,"landing_page_url":"https://doi.org/10.1109/lcn.2014.6925779","pdf_url":"https://ieeexplore.ieee.org/ielx7/6916486/6925725/06925779.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"39th Annual IEEE Conference on Local Computer Networks","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2080009314.pdf","grobid_xml":"https://content.openalex.org/works/W2080009314.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W1471375507","https://openalex.org/W1987877930","https://openalex.org/W2016008700","https://openalex.org/W2064922389","https://openalex.org/W2081847996","https://openalex.org/W2085881436","https://openalex.org/W2089361056","https://openalex.org/W2099008124","https://openalex.org/W2116330447","https://openalex.org/W2127058365","https://openalex.org/W2129751240","https://openalex.org/W2141663405","https://openalex.org/W2147215012","https://openalex.org/W2592596194"],"related_works":["https://openalex.org/W1975451135","https://openalex.org/W917005982","https://openalex.org/W2148549110","https://openalex.org/W2890570089","https://openalex.org/W3095958166","https://openalex.org/W2129477171","https://openalex.org/W2593729912","https://openalex.org/W3148968234","https://openalex.org/W2012250365","https://openalex.org/W2378147274"],"abstract_inverted_index":{"Wireless":[0],"Sensor":[1],"Networks":[2],"(WSNs)":[3],"deployed":[4],"for":[5,92,98],"surveillance":[6],"tasks":[7],"are":[8,31],"sometimes":[9],"required":[10],"to":[11,22,33,39,51,64,74],"detect":[12],"unauthorized":[13],"traversal":[14],"of":[15,26,43,110],"intruders":[16],"from":[17],"outside":[18],"the":[19,41,52,61,81,99,108,111],"WSN":[20],"area":[21,25,66],"an":[23,48],"internal":[24],"interest.":[27],"When":[28],"network":[29,94],"nodes":[30],"subject":[32],"random":[34],"failure,":[35],"it":[36],"becomes":[37],"important":[38],"estimate":[40],"likelihood":[42],"successfully":[44],"detecting":[45],"and":[46,77,96],"reporting":[47],"intrusion":[49],"event":[50],"sink":[53],"node.":[54],"To":[55],"serve":[56],"this":[57],"purpose,":[58],"we":[59,102],"formalize":[60],"breach":[62],"path":[63],"target":[65],"reliability":[67],"(BPTA-REL)":[68],"problem.":[69,100],"We":[70],"devise":[71],"efficient":[72,90],"methods":[73],"derive":[75],"lower":[76],"upper":[78],"bounds":[79,113],"on":[80,88],"exact":[82],"solution.":[83],"Our":[84],"approach":[85],"is":[86],"based":[87],"developing":[89],"algorithms":[91],"generating":[93],"pathsets":[95],"cutsets":[97],"Next,":[101],"present":[103],"simulation":[104],"results":[105],"that":[106],"illustrate":[107],"effectiveness":[109],"obtained":[112],"as":[114,116],"well":[115],"their":[117],"potential":[118],"use":[119],"in":[120],"tackling":[121],"related":[122],"design":[123],"problems.":[124]},"counts_by_year":[{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
