{"id":"https://openalex.org/W2110688770","doi":"https://doi.org/10.1109/percom.2009.4912865","title":"Distributed detection of replicas with deployment knowledge in wireless sensor networks","display_name":"Distributed detection of replicas with deployment knowledge in wireless sensor networks","publication_year":2009,"publication_date":"2009-03-01","ids":{"openalex":"https://openalex.org/W2110688770","doi":"https://doi.org/10.1109/percom.2009.4912865","mag":"2110688770"},"language":"en","primary_location":{"id":"doi:10.1109/percom.2009.4912865","is_oa":false,"landing_page_url":"https://doi.org/10.1109/percom.2009.4912865","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Pervasive Computing and Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013608795","display_name":"Jun\u2010Won Ho","orcid":"https://orcid.org/0000-0003-2070-9861"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jun-Won Ho","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Texas, Arlington, TX, USA","Department of Computer Science and Engineering, University of Texas at Arlington, 76019-0015 U.S.A.#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Texas, Arlington, TX, USA","institution_ids":["https://openalex.org/I189196454"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Texas at Arlington, 76019-0015 U.S.A.#TAB#","institution_ids":["https://openalex.org/I189196454"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062014809","display_name":"Donggang Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Donggang Liu","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Texas, Arlington, TX, USA","Department of Computer Science and Engineering, University of Texas at Arlington, 76019-0015 U.S.A.#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Texas, Arlington, TX, USA","institution_ids":["https://openalex.org/I189196454"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Texas at Arlington, 76019-0015 U.S.A.#TAB#","institution_ids":["https://openalex.org/I189196454"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035719182","display_name":"Matthew Wright","orcid":"https://orcid.org/0000-0002-8489-6347"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matthew Wright","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Texas, Arlington, TX, USA","Department of Computer Science and Engineering, University of Texas at Arlington, 76019-0015 U.S.A.#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Texas, Arlington, TX, USA","institution_ids":["https://openalex.org/I189196454"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Texas at Arlington, 76019-0015 U.S.A.#TAB#","institution_ids":["https://openalex.org/I189196454"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050881965","display_name":"Sajal K. Das","orcid":"https://orcid.org/0000-0002-9471-0868"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sajal K. Das","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Texas, Arlington, TX, USA","Department of Computer Science and Engineering, University of Texas at Arlington, 76019-0015 U.S.A.#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Texas, Arlington, TX, USA","institution_ids":["https://openalex.org/I189196454"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Texas at Arlington, 76019-0015 U.S.A.#TAB#","institution_ids":["https://openalex.org/I189196454"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5013608795"],"corresponding_institution_ids":["https://openalex.org/I189196454"],"apc_list":null,"apc_paid":null,"fwci":1.7142,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.85595394,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/replica","display_name":"Replica","score":0.8724608421325684},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8033084869384766},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.7373272180557251},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6753222942352295},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.660859227180481},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5799685120582581},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5677734613418579},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.512712836265564},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.49542534351348877},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.44477200508117676},{"id":"https://openalex.org/keywords/keying","display_name":"Keying","score":0.4306902289390564},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40938451886177063},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10218685865402222},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10067158937454224}],"concepts":[{"id":"https://openalex.org/C2775937380","wikidata":"https://www.wikidata.org/wiki/Q1232589","display_name":"Replica","level":2,"score":0.8724608421325684},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8033084869384766},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.7373272180557251},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6753222942352295},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.660859227180481},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5799685120582581},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5677734613418579},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.512712836265564},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.49542534351348877},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.44477200508117676},{"id":"https://openalex.org/C2776542216","wikidata":"https://www.wikidata.org/wiki/Q6398306","display_name":"Keying","level":2,"score":0.4306902289390564},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40938451886177063},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10218685865402222},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10067158937454224},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/percom.2009.4912865","is_oa":false,"landing_page_url":"https://doi.org/10.1109/percom.2009.4912865","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Pervasive Computing and Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W293279915","https://openalex.org/W1520914943","https://openalex.org/W1569083856","https://openalex.org/W1797206029","https://openalex.org/W1806422760","https://openalex.org/W1940397557","https://openalex.org/W1970390444","https://openalex.org/W2002054891","https://openalex.org/W2033751220","https://openalex.org/W2085912442","https://openalex.org/W2097840215","https://openalex.org/W2101963262","https://openalex.org/W2104340336","https://openalex.org/W2105666891","https://openalex.org/W2105705594","https://openalex.org/W2107740194","https://openalex.org/W2110688770","https://openalex.org/W2116269350","https://openalex.org/W2117984332","https://openalex.org/W2122690814","https://openalex.org/W2123210925","https://openalex.org/W2123349299","https://openalex.org/W2134585683","https://openalex.org/W2136236364","https://openalex.org/W2142308804","https://openalex.org/W2143536181","https://openalex.org/W2148658274","https://openalex.org/W2152924492","https://openalex.org/W2156561876","https://openalex.org/W2156914580","https://openalex.org/W2159796097","https://openalex.org/W2161864928","https://openalex.org/W2162218601","https://openalex.org/W2164478452","https://openalex.org/W2165025360","https://openalex.org/W2165274895","https://openalex.org/W2165491783","https://openalex.org/W2166590729","https://openalex.org/W2168452204","https://openalex.org/W2170239483","https://openalex.org/W2620450380","https://openalex.org/W6676731562","https://openalex.org/W6682797247"],"related_works":["https://openalex.org/W3013979739","https://openalex.org/W2655578171","https://openalex.org/W2577913821","https://openalex.org/W2460131733","https://openalex.org/W2953070151","https://openalex.org/W4296976839","https://openalex.org/W2372946558","https://openalex.org/W3126044086","https://openalex.org/W4394646256","https://openalex.org/W4236952075"],"abstract_inverted_index":{"A":[0,35],"number":[1,65],"of":[2,15,32,47,66,84,133],"protocols":[3],"have":[4],"been":[5],"developed":[6],"to":[7,26,80,88,105],"mitigate":[8],"the":[9,30,33,52,73,78,82,93,115],"threat":[10,38],"against":[11,97],"wireless":[12],"sensor":[13],"networks":[14],"an":[16],"attacker":[17,53,79],"finding":[18],"nodes,":[19,49],"compromising":[20],"them,":[21],"and":[22,61,107,146,152,160,170],"using":[23],"these":[24,98],"nodes":[25,118],"eavesdrop":[27],"or":[28],"undermine":[29],"operation":[31],"network.":[34,74,94],"more":[36],"dangerous":[37],"that":[39,46,68,117,155],"has":[40],"received":[41],"less":[42],"attention,":[43],"however,":[44],"is":[45,124],"replica":[48,140,162],"in":[50,121,142,153],"which":[51,123],"compromises":[54],"a":[55,63,85,143],"node,":[56],"extracts":[57],"its":[58],"keying":[59],"materials,":[60],"produces":[62],"large":[64],"replicas":[67],"he":[69],"can":[70],"spread":[71],"throughout":[72],"This":[75],"attack":[76],"enables":[77],"leverage":[81],"compromise":[83],"single":[86],"node":[87],"create":[89],"widespread":[90],"effects":[91],"on":[92,114],"To":[95],"defend":[96],"attacks,":[99],"we":[100],"propose":[101],"distributed":[102],"detection":[103,141,163],"mechanisms":[104],"find":[106],"revoke":[108],"replicas.":[109],"Our":[110],"schemes":[111,138,157],"are":[112,119],"based":[113],"assumption":[116],"deployed":[120],"groups,":[122],"realistic":[125],"for":[126],"many":[127],"deployment":[128,135],"scenarios.":[129],"By":[130],"taking":[131],"advantage":[132],"group":[134],"knowledge,":[136],"our":[137,156],"perform":[139],"distributed,":[144],"efficient,":[145],"secure":[147],"manner.":[148],"We":[149],"show":[150],"analytically":[151],"simulation":[154],"achieve":[158],"effective":[159],"robust":[161],"capability":[164],"with":[165],"substantially":[166],"lower":[167],"communication,":[168],"computational,":[169],"storage":[171],"overheads":[172],"than":[173],"prior":[174],"work.":[175]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
