{"id":"https://openalex.org/W2150865951","doi":"https://doi.org/10.1109/tnet.2009.2032910","title":"Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks","display_name":"Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks","publication_year":2009,"publication_date":"2009-12-01","ids":{"openalex":"https://openalex.org/W2150865951","doi":"https://doi.org/10.1109/tnet.2009.2032910","mag":"2150865951"},"language":"en","primary_location":{"id":"doi:10.1109/tnet.2009.2032910","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnet.2009.2032910","pdf_url":null,"source":{"id":"https://openalex.org/S62238642","display_name":"IEEE/ACM Transactions on Networking","issn_l":"1063-6692","issn":["1063-6692","1558-2566"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/ACM Transactions on Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076499033","display_name":"Suat \u00d6zdem\u0131r","orcid":"https://orcid.org/0000-0002-4588-4538"},"institutions":[{"id":"https://openalex.org/I95634034","display_name":"Gazi University","ror":"https://ror.org/054xkpr46","country_code":"TR","type":"education","lineage":["https://openalex.org/I95634034"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Suat Ozdemir","raw_affiliation_strings":["Computer Engineering Department, Gazi University, Ankara, Turkey"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Department, Gazi University, Ankara, Turkey","institution_ids":["https://openalex.org/I95634034"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002845585","display_name":"Hasan \u00c7am","orcid":"https://orcid.org/0000-0002-3531-7003"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hasan Cam","raw_affiliation_strings":["Altusys Corporation, Trenton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Altusys Corporation, Trenton, NJ, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5076499033"],"corresponding_institution_ids":["https://openalex.org/I95634034"],"apc_list":null,"apc_paid":null,"fwci":2.535,"has_fulltext":false,"cited_by_count":107,"citation_normalized_percentile":{"value":0.90517089,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"18","issue":"3","first_page":"736","last_page":"749"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.8738497495651245},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8147335052490234},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5863475203514099},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5552951097488403},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5438064932823181},{"id":"https://openalex.org/keywords/news-aggregator","display_name":"News aggregator","score":0.5367530584335327},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.48670080304145813},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.47449609637260437},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.4640684723854065},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.43594467639923096},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38540855050086975},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18772470951080322}],"concepts":[{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.8738497495651245},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8147335052490234},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5863475203514099},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5552951097488403},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5438064932823181},{"id":"https://openalex.org/C180505990","wikidata":"https://www.wikidata.org/wiki/Q498267","display_name":"News aggregator","level":2,"score":0.5367530584335327},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.48670080304145813},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.47449609637260437},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.4640684723854065},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.43594467639923096},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38540855050086975},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18772470951080322},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tnet.2009.2032910","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnet.2009.2032910","pdf_url":null,"source":{"id":"https://openalex.org/S62238642","display_name":"IEEE/ACM Transactions on Networking","issn_l":"1063-6692","issn":["1063-6692","1558-2566"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/ACM Transactions on Networking","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.688.9094","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.688.9094","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://ceng.gazi.edu.tr/%7Eozdemir/papers/A.1.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1500356409","https://openalex.org/W1514361308","https://openalex.org/W1520258924","https://openalex.org/W1568844457","https://openalex.org/W1577043253","https://openalex.org/W1973225261","https://openalex.org/W2000368779","https://openalex.org/W2013295224","https://openalex.org/W2019396864","https://openalex.org/W2033751220","https://openalex.org/W2045683888","https://openalex.org/W2112266337","https://openalex.org/W2114495437","https://openalex.org/W2117781301","https://openalex.org/W2122053504","https://openalex.org/W2126644064","https://openalex.org/W2130403046","https://openalex.org/W2131924466","https://openalex.org/W2139890752","https://openalex.org/W2140132783","https://openalex.org/W2140372921","https://openalex.org/W2151157922","https://openalex.org/W2151672144","https://openalex.org/W2156186849","https://openalex.org/W2159367317","https://openalex.org/W2165491783","https://openalex.org/W2398149385","https://openalex.org/W2497704935","https://openalex.org/W6629828591","https://openalex.org/W6630673747","https://openalex.org/W6680958742"],"related_works":["https://openalex.org/W1592978631","https://openalex.org/W4255106211","https://openalex.org/W2766329713","https://openalex.org/W2120644424","https://openalex.org/W2290626493","https://openalex.org/W3082121784","https://openalex.org/W2100707674","https://openalex.org/W1994220746","https://openalex.org/W2387292094","https://openalex.org/W60586779"],"abstract_inverted_index":{"In":[0],"wireless":[1],"sensor":[2,5,106],"networks,":[3],"compromised":[4,142],"nodes":[6,77,107],"can":[7,178],"inject":[8],"false":[9,20,25,58,72,133,148,163,200],"data":[10,13,16,21,26,29,40,42,49,59,62,68,73,80,84,95,103,111,115,120,134,149,156,164,167,185,194],"during":[11,28],"both":[12],"aggregation":[14,50,63,69,85,195],"and":[15,32,51,64,86,144,166,196],"forwarding.":[17],"The":[18],"existing":[19],"detection":[22,60,165,198],"techniques":[23],"consider":[24],"injections":[27],"forwarding":[30],"only":[31],"do":[33],"not":[34,151],"allow":[35],"any":[36,132],"change":[37],"on":[38,117,158],"the":[39,75,88,105,114,118,123,146,154,159,170,181,191],"by":[41,136,186],"aggregation.":[43],"However,":[44],"this":[45],"paper":[46],"presents":[47],"a":[48],"authentication":[52,92],"protocol,":[53],"called":[54],"DAA,":[55],"to":[56,138,188],"integrate":[57],"with":[61,71,190],"confidentiality.":[65],"To":[66,100],"support":[67,101],"along":[70],"detection,":[74],"monitoring":[76],"of":[78,183,193,199],"every":[79],"aggregator":[81,157],"also":[82],"conduct":[83],"compute":[87],"corresponding":[89],"small-size":[90],"message":[91],"codes":[93],"for":[94],"verification":[96],"at":[97],"their":[98],"pairmates.":[99],"confidential":[102],"transmission,":[104],"between":[108],"two":[109],"consecutive":[110],"aggregators":[112],"verify":[113],"integrity":[116],"encrypted":[119],"rather":[121],"than":[122],"plain":[124],"data.":[125,201],"Performance":[126],"analysis":[127],"shows":[128],"that":[129,145,162,176],"DAA":[130,177],"detects":[131],"injected":[135],"up":[137,187],"<i":[139],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[140],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">T</i>":[141],"nodes,":[143],"detected":[147],"are":[150],"forwarded":[152],"beyond":[153],"next":[155],"path.":[160],"Despite":[161],"confidentiality":[168],"increase":[169],"communication":[171],"overhead,":[172],"simulation":[173],"results":[174],"show":[175],"still":[179],"reduce":[180],"amount":[182],"transmitted":[184],"60%":[189],"help":[192],"early":[197]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":11},{"year":2016,"cited_by_count":11},{"year":2015,"cited_by_count":11},{"year":2014,"cited_by_count":16},{"year":2013,"cited_by_count":13},{"year":2012,"cited_by_count":4}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
