{"id":"https://openalex.org/W2288230700","doi":"https://doi.org/10.1109/pccc.2015.7410341","title":"Replication attack detection with monitor nodes in clustered wireless sensor networks","display_name":"Replication attack detection with monitor nodes in clustered wireless sensor networks","publication_year":2015,"publication_date":"2015-12-01","ids":{"openalex":"https://openalex.org/W2288230700","doi":"https://doi.org/10.1109/pccc.2015.7410341","mag":"2288230700"},"language":"en","primary_location":{"id":"doi:10.1109/pccc.2015.7410341","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2015.7410341","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100914267","display_name":"Cheng Guo","orcid":"https://orcid.org/0009-0004-8972-2444"},"institutions":[{"id":"https://openalex.org/I142108993","display_name":"Southwest University","ror":"https://ror.org/01kj4z117","country_code":"CN","type":"education","lineage":["https://openalex.org/I142108993"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guo Cheng","raw_affiliation_strings":["College of Electronic and Information Engineering, Southwest University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Electronic and Information Engineering, Southwest University, Chongqing, China","institution_ids":["https://openalex.org/I142108993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055813479","display_name":"Songtao Guo","orcid":"https://orcid.org/0000-0001-6741-4871"},"institutions":[{"id":"https://openalex.org/I142108993","display_name":"Southwest University","ror":"https://ror.org/01kj4z117","country_code":"CN","type":"education","lineage":["https://openalex.org/I142108993"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Songtao Guo","raw_affiliation_strings":["College of Electronic and Information Engineering, Southwest University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Electronic and Information Engineering, Southwest University, Chongqing, China","institution_ids":["https://openalex.org/I142108993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100638446","display_name":"Yuanyuan Yang","orcid":"https://orcid.org/0000-0001-7296-9222"},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuanyuan Yang","raw_affiliation_strings":["Department of Electrical & Computer Engineering, Stony Brook University, Stony Brook, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical & Computer Engineering, Stony Brook University, Stony Brook, NY, USA","institution_ids":["https://openalex.org/I59553526"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100455858","display_name":"Fei Wang","orcid":"https://orcid.org/0000-0002-6735-8280"},"institutions":[{"id":"https://openalex.org/I142108993","display_name":"Southwest University","ror":"https://ror.org/01kj4z117","country_code":"CN","type":"education","lineage":["https://openalex.org/I142108993"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Wang","raw_affiliation_strings":["College of Electronic and Information Engineering, Southwest University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Electronic and Information Engineering, Southwest University, Chongqing, China","institution_ids":["https://openalex.org/I142108993"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100914267"],"corresponding_institution_ids":["https://openalex.org/I142108993"],"apc_list":null,"apc_paid":null,"fwci":1.6901,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.8681205,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7886300086975098},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7729056477546692},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7142118215560913},{"id":"https://openalex.org/keywords/replication","display_name":"Replication (statistics)","score":0.6201472282409668},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6175943613052368},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.5456174612045288},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5217926502227783},{"id":"https://openalex.org/keywords/clone","display_name":"clone (Java method)","score":0.5215896964073181},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4613971412181854},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.4601254463195801},{"id":"https://openalex.org/keywords/replicate","display_name":"Replicate","score":0.41914960741996765},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.38646718859672546},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.38233715295791626},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16091281175613403}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7886300086975098},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7729056477546692},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7142118215560913},{"id":"https://openalex.org/C12590798","wikidata":"https://www.wikidata.org/wiki/Q3933199","display_name":"Replication (statistics)","level":2,"score":0.6201472282409668},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6175943613052368},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.5456174612045288},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5217926502227783},{"id":"https://openalex.org/C81089528","wikidata":"https://www.wikidata.org/wiki/Q5134986","display_name":"clone (Java method)","level":3,"score":0.5215896964073181},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4613971412181854},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.4601254463195801},{"id":"https://openalex.org/C2781162219","wikidata":"https://www.wikidata.org/wiki/Q26250693","display_name":"Replicate","level":2,"score":0.41914960741996765},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.38646718859672546},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.38233715295791626},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16091281175613403},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C552990157","wikidata":"https://www.wikidata.org/wiki/Q7430","display_name":"DNA","level":2,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pccc.2015.7410341","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2015.7410341","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.8100000023841858}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1940397557","https://openalex.org/W1941184313","https://openalex.org/W1964929377","https://openalex.org/W1997810762","https://openalex.org/W2077706268","https://openalex.org/W2082400728","https://openalex.org/W2085147795","https://openalex.org/W2098009004","https://openalex.org/W2098035730","https://openalex.org/W2104554508","https://openalex.org/W2104846640","https://openalex.org/W2106335692","https://openalex.org/W2109033806","https://openalex.org/W2111330432","https://openalex.org/W2114890415","https://openalex.org/W2115373791","https://openalex.org/W2115506459","https://openalex.org/W2116269350","https://openalex.org/W2119856092","https://openalex.org/W2127699957","https://openalex.org/W2130403046","https://openalex.org/W2130484622","https://openalex.org/W2136236364","https://openalex.org/W2136992183","https://openalex.org/W2146072508","https://openalex.org/W2161864928","https://openalex.org/W3211513184","https://openalex.org/W6670012670","https://openalex.org/W6675116674","https://openalex.org/W6676554168"],"related_works":["https://openalex.org/W2053915529","https://openalex.org/W2111659373","https://openalex.org/W3013364101","https://openalex.org/W2378141881","https://openalex.org/W4230748207","https://openalex.org/W2025865172","https://openalex.org/W4388523091","https://openalex.org/W4220767635","https://openalex.org/W4221167770","https://openalex.org/W4253026353"],"abstract_inverted_index":{"Wireless":[0],"sensor":[1],"networks":[2],"(WSNs)":[3],"are":[4],"often":[5],"deployed":[6],"in":[7,20,25,75,121],"hostile":[8],"environments":[9],"where":[10],"an":[11,80,108],"adversary":[12],"may":[13],"physically":[14],"capture":[15],"some":[16],"of":[17,29,34,55,89,97,103,131],"the":[18,53,56,71,87,90,94,100,114,122,129,134,164],"nodes":[19,73,98,120,168],"WSNs,":[21],"and":[22,59,99],"replicate":[23],"them":[24],"a":[26],"large":[27],"number":[28,102],"clones,":[30],"easily":[31],"taking":[32],"control":[33],"networks.":[35],"A":[36],"few":[37],"solutions":[38,49],"have":[39,60],"been":[40],"proposed":[41,141],"to":[42,52,69,85,112,126],"cope":[43],"with":[44,133,152],"this":[45,76],"problem.":[46],"However,":[47],"these":[48],"cannot":[50],"adapt":[51],"change":[54],"network":[57,123],"size":[58],"low":[61],"detection":[62,110],"efficiency":[63],"for":[64],"clone":[65,72,167],"nodes.":[66],"In":[67],"order":[68],"discover":[70],"fast,":[74],"paper,":[77],"we":[78,106],"propose":[79],"improved":[81],"LEACH":[82],"(NI-LEACH)":[83],"protocol":[84],"reduce":[86,128],"scale":[88],"cluster":[91],"by":[92,117],"considering":[93],"residual":[95],"energy":[96],"optimal":[101,158],"clusters.":[104],"Furthermore,":[105],"design":[107],"intrusion":[109],"algorithm":[111,142],"detect":[113],"replication":[115],"attacks":[116],"introducing":[118],"monitor":[119],"so":[124],"as":[125],"greatly":[127,170],"occurrence":[130],"tampering":[132],"information.":[135],"Simulation":[136],"results":[137],"show":[138],"that":[139],"our":[140],"is":[143,169],"simple":[144],"yet":[145],"efficient.":[146],"An":[147],"attacker":[148],"can":[149],"be":[150],"detected":[151],"high":[153],"probability":[154],"while":[155],"achieving":[156],"approximately":[157],"throughput.":[159],"The":[160],"network's":[161],"ability":[162],"against":[163],"attack":[165],"from":[166],"improved.":[171]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
