{"id":"https://openalex.org/W2145567318","doi":"https://doi.org/10.1109/pccc.2010.5682297","title":"Traffic eavesdropping based scheme to deliver time-sensitive data in sensor networks","display_name":"Traffic eavesdropping based scheme to deliver time-sensitive data in sensor networks","publication_year":2010,"publication_date":"2010-12-01","ids":{"openalex":"https://openalex.org/W2145567318","doi":"https://doi.org/10.1109/pccc.2010.5682297","mag":"2145567318"},"language":"en","primary_location":{"id":"doi:10.1109/pccc.2010.5682297","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2010.5682297","pdf_url":null,"source":{"id":"https://openalex.org/S4306420035","display_name":"International Performance, Computing, and Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Performance Computing and Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009455758","display_name":"Khaled Daabaj","orcid":null},"institutions":[{"id":"https://openalex.org/I176790772","display_name":"Murdoch University","ror":"https://ror.org/00r4sry34","country_code":"AU","type":"education","lineage":["https://openalex.org/I176790772"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Khaled Daabaj","raw_affiliation_strings":["School of Information Technology, Murdoch University, Perth, WA, Australia","School of Information Technology, Murdoch University, Perth, WA 6150, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Murdoch University, Perth, WA, Australia","institution_ids":["https://openalex.org/I176790772"]},{"raw_affiliation_string":"School of Information Technology, Murdoch University, Perth, WA 6150, Australia","institution_ids":["https://openalex.org/I176790772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035221040","display_name":"Michael Dixon","orcid":"https://orcid.org/0000-0001-9282-3175"},"institutions":[{"id":"https://openalex.org/I176790772","display_name":"Murdoch University","ror":"https://ror.org/00r4sry34","country_code":"AU","type":"education","lineage":["https://openalex.org/I176790772"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Michael Dixon","raw_affiliation_strings":["School of Information Technology, Murdoch University, Perth, WA, Australia","School of Information Technology, Murdoch University, Perth, WA 6150, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Murdoch University, Perth, WA, Australia","institution_ids":["https://openalex.org/I176790772"]},{"raw_affiliation_string":"School of Information Technology, Murdoch University, Perth, WA 6150, Australia","institution_ids":["https://openalex.org/I176790772"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043088252","display_name":"Terry Koziniec","orcid":"https://orcid.org/0000-0002-1381-8413"},"institutions":[{"id":"https://openalex.org/I176790772","display_name":"Murdoch University","ror":"https://ror.org/00r4sry34","country_code":"AU","type":"education","lineage":["https://openalex.org/I176790772"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Terry Koziniec","raw_affiliation_strings":["School of Information Technology, Murdoch University, Perth, WA, Australia","School of Information Technology, Murdoch University, Perth, WA 6150, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Murdoch University, Perth, WA, Australia","institution_ids":["https://openalex.org/I176790772"]},{"raw_affiliation_string":"School of Information Technology, Murdoch University, Perth, WA 6150, Australia","institution_ids":["https://openalex.org/I176790772"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5009455758"],"corresponding_institution_ids":["https://openalex.org/I176790772"],"apc_list":null,"apc_paid":null,"fwci":1.2972,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83786982,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"302","last_page":"308"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12216","display_name":"Network Time Synchronization Technologies","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8889974355697632},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8002547025680542},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.7921954393386841},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7728689908981323},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7433457970619202},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7155332565307617},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.6762462258338928},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.4464973211288452},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.4455667734146118},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.44133955240249634},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3752822279930115},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.37263721227645874},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.2831278443336487},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16155865788459778},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10351738333702087},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08880352973937988}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8889974355697632},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8002547025680542},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.7921954393386841},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7728689908981323},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7433457970619202},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7155332565307617},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.6762462258338928},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.4464973211288452},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.4455667734146118},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.44133955240249634},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3752822279930115},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.37263721227645874},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.2831278443336487},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16155865788459778},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10351738333702087},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08880352973937988},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pccc.2010.5682297","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2010.5682297","pdf_url":null,"source":{"id":"https://openalex.org/S4306420035","display_name":"International Performance, Computing, and Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Performance Computing and Communications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:researchrepository.murdoch.edu.au:3772","is_oa":false,"landing_page_url":"http://researchrepository.murdoch.edu.au/id/eprint/3772/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400274","display_name":"Murdoch Research Repository (Murdoch University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I176790772","host_organization_name":"Murdoch University","host_organization_lineage":["https://openalex.org/I176790772"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"  Daabaj, K. &lt;http://researchrepository.murdoch.edu.au/view/author/Daabaj, Khaled.html&gt;, Dixon, M.W. &lt;http://researchrepository.murdoch.edu.au/view/author/Dixon, Mike.html&gt; and Koziniec, T. &lt;http://researchrepository.murdoch.edu.au/view/author/Koziniec, Terry.html&gt;   (2010)  Traffic eavesdropping based scheme to deliver time-sensitive data in sensor networks.   In: IEEE 29th International Performance Computing and Communications Conference (IPCCC), 9 - 11 December, Albuquerque, NM, USA  p. 302.  ","raw_type":"Conference Paper"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.9100000262260437}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W116457057","https://openalex.org/W1733162348","https://openalex.org/W1932124839","https://openalex.org/W1983681337","https://openalex.org/W2003801825","https://openalex.org/W2003965939","https://openalex.org/W2041248965","https://openalex.org/W2050078873","https://openalex.org/W2078231888","https://openalex.org/W2093471568","https://openalex.org/W2098994486","https://openalex.org/W2108777122","https://openalex.org/W2117520883","https://openalex.org/W2139250199","https://openalex.org/W2143514830","https://openalex.org/W2145417574","https://openalex.org/W2146184701","https://openalex.org/W2148863828","https://openalex.org/W2154056071","https://openalex.org/W2160085418","https://openalex.org/W2160343401","https://openalex.org/W2169458211","https://openalex.org/W2171975935","https://openalex.org/W2215544888","https://openalex.org/W4235904988","https://openalex.org/W4236269498","https://openalex.org/W4245685877","https://openalex.org/W6604679536","https://openalex.org/W6682865904","https://openalex.org/W6688979056"],"related_works":["https://openalex.org/W2772112465","https://openalex.org/W4386360526","https://openalex.org/W4387918499","https://openalex.org/W2368710903","https://openalex.org/W2158905603","https://openalex.org/W2766105476","https://openalex.org/W2735171729","https://openalex.org/W2786267942","https://openalex.org/W2769254131","https://openalex.org/W4390585229"],"abstract_inverted_index":{"Due":[0],"to":[1,34,98,103,151,154],"the":[2,23,41,59,88,100,115,128,138,156],"broadcast":[3],"nature":[4],"of":[5,26,37,40,58,65,130,137,146],"wireless":[6,66],"channels,":[7],"neighbouring":[8],"sensor":[9,47],"nodes":[10],"may":[11],"overhear":[12],"packets":[13],"transmissions":[14],"from":[15],"each":[16],"other":[17],"even":[18],"if":[19],"they":[20],"are":[21],"not":[22],"intended":[24],"recipients":[25],"these":[27],"transmissions.":[28],"This":[29,84],"redundant":[30],"packet":[31,124],"reception":[32],"leads":[33],"unnecessary":[35],"expenditure":[36],"battery":[38],"energy":[39,61,76,105,120],"recipients.":[42],"Particularly":[43],"in":[44,81,96,149],"highly":[45],"dense":[46],"networks,":[48],"overhearing":[49,64,90],"or":[50],"eavesdropping":[51],"overheads":[52],"can":[53],"constitute":[54],"a":[55,73,144],"significant":[56],"fraction":[57],"total":[60],"consumption.":[62],"Since":[63],"traffic":[67],"is":[68,79,141],"unavoidable":[69],"and":[70,122],"sometimes":[71],"essential,":[72],"new":[74,85],"distributed":[75],"efficient":[77,106],"scheme":[78,86,117,140],"proposed":[80,116,139],"this":[82,113],"paper.":[83],"exploits":[87],"inevitable":[89],"effect":[91],"as":[92],"an":[93],"effective":[94],"approach":[95],"order":[97],"collect":[99],"required":[101],"information":[102],"perform":[104],"delivery":[107,125],"for":[108],"data":[109],"aggregation.":[110],"Based":[111],"on":[112,159],"approach,":[114],"achieves":[118],"moderate":[119],"consumption":[121],"high":[123,131],"rate":[126],"notwithstanding":[127],"occurrence":[129],"link":[132],"failure":[133],"rates.":[134],"The":[135],"performance":[136],"experimentally":[142],"investigated":[143],"testbed":[145],"TelosB":[147],"motes":[148],"addition":[150],"ns-2":[152],"simulations":[153],"validate":[155],"performed":[157],"experiments":[158],"large-scale":[160],"network.":[161]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
