{"id":"https://openalex.org/W4312701682","doi":"https://doi.org/10.1109/tifs.2022.3217385","title":"Quantifying Source Location Privacy Routing Performance via Divergence and Information Loss","display_name":"Quantifying Source Location Privacy Routing Performance via Divergence and Information Loss","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4312701682","doi":"https://doi.org/10.1109/tifs.2022.3217385"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3217385","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3217385","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/4358835/09930814.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/ielx7/10206/4358835/09930814.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064143171","display_name":"Matthew Bradbury","orcid":"https://orcid.org/0000-0003-4661-000X"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Matthew Bradbury","raw_affiliation_strings":["School of Computing and Communications, Lancaster University, Lancaster, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing and Communications, Lancaster University, Lancaster, U.K","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005426902","display_name":"Arshad Jhumka","orcid":"https://orcid.org/0000-0003-0540-2845"},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Arshad Jhumka","raw_affiliation_strings":["Department of Computer Science, University of Warwick, Coventry, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Warwick, Coventry, U.K","institution_ids":["https://openalex.org/I39555362"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5064143171"],"corresponding_institution_ids":["https://openalex.org/I67415387"],"apc_list":null,"apc_paid":null,"fwci":0.8517,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.75496661,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":"17","issue":null,"first_page":"3890","last_page":"3905"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7760534882545471},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.6528937816619873},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5360562801361084},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.49387580156326294},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.45831674337387085},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.42876261472702026},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4160469174385071},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35080355405807495},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.17117956280708313}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7760534882545471},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.6528937816619873},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5360562801361084},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.49387580156326294},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.45831674337387085},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.42876261472702026},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4160469174385071},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35080355405807495},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.17117956280708313}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2022.3217385","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3217385","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/4358835/09930814.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:wrap.warwick.ac.uk:170210","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400665","display_name":"Warwick Research Archive Portal (University of Warwick)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39555362","host_organization_name":"University of Warwick","host_organization_lineage":["https://openalex.org/I39555362"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"}],"best_oa_location":{"id":"doi:10.1109/tifs.2022.3217385","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3217385","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/4358835/09930814.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7890935066","display_name":"DTA - University of Warwick","funder_award_id":"EP/M506679/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4312701682.pdf","grobid_xml":"https://content.openalex.org/works/W4312701682.grobid-xml"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W25564820","https://openalex.org/W1873763122","https://openalex.org/W1965555277","https://openalex.org/W1966725398","https://openalex.org/W1967220454","https://openalex.org/W1971017549","https://openalex.org/W1971196771","https://openalex.org/W1999602050","https://openalex.org/W2030687625","https://openalex.org/W2038976731","https://openalex.org/W2050409719","https://openalex.org/W2052770634","https://openalex.org/W2088069667","https://openalex.org/W2090455692","https://openalex.org/W2116330776","https://openalex.org/W2124375184","https://openalex.org/W2142500399","https://openalex.org/W2146950091","https://openalex.org/W2217833600","https://openalex.org/W2230048354","https://openalex.org/W2402610834","https://openalex.org/W2566814899","https://openalex.org/W2581533700","https://openalex.org/W2727381607","https://openalex.org/W2790233037","https://openalex.org/W2792655158","https://openalex.org/W2891993769","https://openalex.org/W2896095154","https://openalex.org/W2909699073","https://openalex.org/W2951906479","https://openalex.org/W2957872786","https://openalex.org/W3128414869","https://openalex.org/W3164105087","https://openalex.org/W3202574759","https://openalex.org/W4211116186","https://openalex.org/W6764702054"],"related_works":["https://openalex.org/W2368710903","https://openalex.org/W2772112465","https://openalex.org/W4386360526","https://openalex.org/W4387918499","https://openalex.org/W2158905603","https://openalex.org/W2766105476","https://openalex.org/W2735171729","https://openalex.org/W2091556092","https://openalex.org/W2769254131","https://openalex.org/W2149529186"],"abstract_inverted_index":{"Source":[0],"location":[1,23],"Privacy":[2],"(SLP)":[3],"is":[4,39,119,127],"an":[5,35,114,168,217,227],"important":[6],"property":[7,19],"for":[8,184],"security":[9],"critical":[10],"applications":[11],"deployed":[12],"over":[13],"a":[14,84,95,110,130,160,186,254],"wireless":[15],"sensor":[16],"network.":[17,45],"This":[18,179],"specifies":[20],"that":[21,38,166,203],"the":[22,25,44,58,62,77,92,124,157,177,182,214,246,261,264],"of":[24,27,79,94,135,153,159,216,245,256,263],"source":[26],"messages":[28,101],"needs":[29],"to":[30,41,56,61,142,170,193],"be":[31,240],"kept":[32],"secret":[33],"from":[34],"eavesdropping":[36],"adversary":[37],"able":[40],"move":[42],"around":[43],"Most":[46],"previous":[47],"work":[48],"on":[49,53,75,253],"SLP":[50,59,80,116],"has":[51],"focused":[52,74],"developing":[54,185,226],"protocols":[55],"enhance":[57],"imparted":[60,82],"network":[63],"under":[64],"various":[65],"attacker":[66,169],"models":[67],"and":[68,138,146,210,221],"other":[69],"conditions.":[70],"Other":[71],"works":[72],"have":[73],"analysing":[76],"level":[78],"being":[81],"by":[83],"specific":[85],"protocol.":[86],"In":[87,121],"this":[88,122],"paper,":[89],"we":[90,232],"introduce":[91,109],"notion":[93,158,255],"routing":[96,117,144,219,229,237],"matrix":[97,118,220],"which":[98],"captures":[99],"when":[100,174],"are":[102,140,207,250],"<italic":[103,161,171,187],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[104,162,172,188],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">first</i>":[105],"received.":[106],"We":[107,155,200],"then":[108],"novel":[111],"approach":[112],"where":[113,133],"optimal":[115],"derived.":[120],"approach,":[123],"attacker\u2019s":[125],"movement":[126],"modelled":[128],"as":[129],"Markov":[131],"chain":[132],"measures":[134],"conditional":[136],"entropy":[137],"divergence":[139],"used":[141,195],"compare":[143],"matrices":[145,238],"quantify":[147],"if":[148],"they":[149],"provide":[150],"high":[151],"levels":[152],"SLP.":[154],"propose":[156],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">properly":[163],"competing":[164,205],"paths</i>":[165],"causes":[167],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">divert</i>":[173],"moving":[175],"towards":[176],"source.":[178],"concept":[180],"provides":[181],"basis":[183],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">perturbation":[189],"model</i>":[190],",":[191],"similar":[192],"those":[194],"in":[196,212,225],"privacy-preserving":[197],"data":[198],"mining.":[199],"formally":[201],"prove":[202],"properly":[204],"paths":[206],"both":[208],"necessary":[209],"sufficient":[211],"ensuring":[213],"existence":[215],"SLP-aware":[218,228,236],"show":[222,233],"their":[223],"usage":[224],"matrix.":[230],"Further,":[231],"how":[234],"different":[235,243],"can":[239],"obtained":[241,251],"through":[242,260],"instantiations":[244,249],"framework.":[247],"Those":[248],"based":[252],"information":[257],"loss":[258],"achieved":[259],"use":[262],"perturbation":[265],"model":[266],"proposed.":[267]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
