{"id":"https://openalex.org/W4288064501","doi":"https://doi.org/10.1109/tnsm.2022.3194205","title":"Lightweight Secure Detection Service for Malicious Attacks in WSN With Timestamp-Based MAC","display_name":"Lightweight Secure Detection Service for Malicious Attacks in WSN With Timestamp-Based MAC","publication_year":2022,"publication_date":"2022-07-27","ids":{"openalex":"https://openalex.org/W4288064501","doi":"https://doi.org/10.1109/tnsm.2022.3194205"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2022.3194205","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3194205","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048849816","display_name":"Zhongyi Zhai","orcid":"https://orcid.org/0000-0003-4935-3993"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhongyi Zhai","raw_affiliation_strings":["Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-4935-3993","affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025788451","display_name":"Guibing Lai","orcid":null},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guibing Lai","raw_affiliation_strings":["Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100640942","display_name":"Bo Cheng","orcid":"https://orcid.org/0000-0003-2160-2839"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Cheng","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-2160-2839","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039734214","display_name":"Junyan Qian","orcid":"https://orcid.org/0000-0002-1325-6975"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junyan Qian","raw_affiliation_strings":["Guangxi Key Laboratory of Multi-Source Information Mining and Security, Guangxi Normal University, Guilin, China"],"raw_orcid":"https://orcid.org/0000-0002-1325-6975","affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Multi-Source Information Mining and Security, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110465627","display_name":"Lingzhong Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingzhong Zhao","raw_affiliation_strings":["Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029265765","display_name":"Jinsong Wu","orcid":"https://orcid.org/0000-0003-4720-5946"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]},{"id":"https://openalex.org/I69737025","display_name":"University of Chile","ror":"https://ror.org/047gc3g35","country_code":"CL","type":"education","lineage":["https://openalex.org/I69737025"]}],"countries":["CL","CN"],"is_corresponding":false,"raw_author_name":"Jinsong Wu","raw_affiliation_strings":["School of Artificial Intelligence, Guilin University of Electronic Technology, Guilin, China","Department of Electrical Engineering, Universidad de Chile, Santiago, Chile"],"raw_orcid":"https://orcid.org/0000-0003-4720-5946","affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"Department of Electrical Engineering, Universidad de Chile, Santiago, Chile","institution_ids":["https://openalex.org/I69737025"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043935709","display_name":"Zhiguo Wan","orcid":"https://orcid.org/0000-0003-1319-1224"},"institutions":[{"id":"https://openalex.org/I4210123185","display_name":"Zhejiang Lab","ror":"https://ror.org/02m2h7991","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210123185"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhinguo Wan","raw_affiliation_strings":["Zhejiang Lab, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-1319-1224","affiliations":[{"raw_affiliation_string":"Zhejiang Lab, Hangzhou, China","institution_ids":["https://openalex.org/I4210123185"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5048849816"],"corresponding_institution_ids":["https://openalex.org/I139759216","https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":1.7121,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.84895474,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"19","issue":"4","first_page":"5299","last_page":"5311"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8812723159790039},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7120171189308167},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.6427568197250366},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5332061648368835},{"id":"https://openalex.org/keywords/timestamp","display_name":"Timestamp","score":0.5174337029457092},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.47196969389915466},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44764444231987},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.281017005443573},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.08269163966178894}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8812723159790039},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7120171189308167},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.6427568197250366},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5332061648368835},{"id":"https://openalex.org/C113954288","wikidata":"https://www.wikidata.org/wiki/Q186885","display_name":"Timestamp","level":2,"score":0.5174337029457092},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.47196969389915466},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44764444231987},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.281017005443573},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.08269163966178894}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2022.3194205","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3194205","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6591812222","display_name":null,"funder_award_id":"SKLNST-2022-1-04","funder_id":"https://openalex.org/F4320327101","funder_display_name":"State Key Laboratory of Networking and Switching Technology"},{"id":"https://openalex.org/G7768514387","display_name":null,"funder_award_id":"61902086","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8616247701","display_name":null,"funder_award_id":"61862014","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327101","display_name":"State Key Laboratory of Networking and Switching Technology","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1666539389","https://openalex.org/W1975857123","https://openalex.org/W2046850009","https://openalex.org/W2072780876","https://openalex.org/W2110510622","https://openalex.org/W2142950407","https://openalex.org/W2220878147","https://openalex.org/W2290013323","https://openalex.org/W2314119434","https://openalex.org/W2340662141","https://openalex.org/W2347205546","https://openalex.org/W2434441512","https://openalex.org/W2522269272","https://openalex.org/W2556473102","https://openalex.org/W2583450153","https://openalex.org/W2592041560","https://openalex.org/W2743923967","https://openalex.org/W2801400867","https://openalex.org/W2811093096","https://openalex.org/W2884733847","https://openalex.org/W2901850888","https://openalex.org/W2972088616","https://openalex.org/W2989032480","https://openalex.org/W2993029234","https://openalex.org/W2993170066","https://openalex.org/W2996084540","https://openalex.org/W3009502284","https://openalex.org/W3013874525","https://openalex.org/W3025058555","https://openalex.org/W3030363216","https://openalex.org/W3040218957","https://openalex.org/W3040940018","https://openalex.org/W3046105738","https://openalex.org/W3104978253","https://openalex.org/W3120626148","https://openalex.org/W3154266472"],"related_works":["https://openalex.org/W2060561905","https://openalex.org/W1417711376","https://openalex.org/W2032260263","https://openalex.org/W1986883493","https://openalex.org/W1997952192","https://openalex.org/W2103114700","https://openalex.org/W2992243556","https://openalex.org/W3040218957","https://openalex.org/W2896383829","https://openalex.org/W3111733712"],"abstract_inverted_index":{"Sensors":[0],"in":[1,9,57,139,199],"wireless":[2],"sensor":[3],"network":[4,44,66,157],"(WSN)":[5],"are":[6,96],"usually":[7],"deployed":[8,123],"the":[10,21,37,100,104,134,142,182,188,193],"wild":[11],"or":[12,81],"even":[13],"hostile":[14],"circumstance.":[15],"What":[16],"is":[17,33,49,68,119,122,152,169,185],"worse,":[18],"most":[19],"of":[20,39,93,98,106,127,181],"sensors":[22],"have":[23,84],"limited":[24],"communication":[25,55,200],"bandwidth,":[26],"computation":[27],"resources":[28],"and":[29,63,109,132,162,175,202,209],"energy.":[30],"Therefore,":[31],"it":[32],"challenging":[34],"to":[35,70,87,129,171,206,214],"ensure":[36],"security":[38],"WSN":[40,128],"without":[41],"decreasing":[42],"its":[43],"performance.":[45],"Network":[46],"coding":[47,67],"(NC)":[48],"a":[50,90,115,144,166],"promising":[51],"way":[52],"for":[53],"improving":[54],"capability":[56],"WSN,":[58],"e.g.,":[59,103],"high":[60],"throughput,":[61],"robustness":[62],"low-energy.":[64],"Nevertheless,":[65],"vulnerable":[69],"malicious":[71],"attacks.":[72,111],"Presently,":[73],"many":[74],"secure":[75,116],"detections,":[76],"such":[77],"as":[78],"information":[79],"theoretic-based":[80],"cryptographic-based":[82],"techniques,":[83],"been":[85],"proposed":[86],"deal":[88],"with":[89,154],"single":[91],"type":[92],"attack,":[94],"but":[95],"incapable":[97],"resisting":[99],"joint":[101,167,216],"attacks,":[102],"union":[105],"pollution":[107,173],"attacks":[108,174,177],"replay":[110,176],"In":[112,141],"this":[113],"paper,":[114],"detection":[117,168,183,194,217],"service":[118,184],"presented.":[120],"It":[121],"on":[124,160],"every":[125],"node":[126],"monitor,":[130],"manage":[131],"control":[133],"messages":[135],"passing":[136],"through":[137],"them":[138],"real-time.":[140],"service,":[143],"lightweight":[145],"timestamp-based":[146],"message":[147],"authentication":[148],"code,":[149],"namely":[150],"TMAC,":[151],"designed":[153],"Exclusive":[155],"OR":[156],"coding.":[158],"Based":[159],"TMAC":[161],"time":[163],"synchronization":[164],"technique,":[165],"implemented":[170],"resist":[172],"synchronously.":[178],"The":[179],"correctness":[180],"proved.":[186],"Finally,":[187],"performance":[189],"evaluation":[190],"shows":[191],"that":[192],"scheme":[195],"brings":[196],"negligible":[197],"extra-expense":[198],"bandwidth":[201],"computational":[203],"complexity":[204],"compared":[205,213],"MAC-based":[207],"schemes,":[208],"consumes":[210],"energy":[211],"lowly":[212],"other":[215],"schemes.":[218]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
