{"id":"https://openalex.org/W2124734170","doi":"https://doi.org/10.1109/wcnc.2013.6554751","title":"Transmission cost minimization with vulnerability constraint in wireless sensor networks","display_name":"Transmission cost minimization with vulnerability constraint in wireless sensor networks","publication_year":2013,"publication_date":"2013-04-01","ids":{"openalex":"https://openalex.org/W2124734170","doi":"https://doi.org/10.1109/wcnc.2013.6554751","mag":"2124734170"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc.2013.6554751","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2013.6554751","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101113582","display_name":"Wei An","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei An","raw_affiliation_strings":["High Performance Network Lab, lOA, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"High Performance Network Lab, lOA, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100744118","display_name":"Song Ci","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Song Ci","raw_affiliation_strings":["Department of CEEN, University of Nebraska, Lincoln, NE, USA","High Performance Network Lab, lOA, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of CEEN, University of Nebraska, Lincoln, NE, USA","institution_ids":["https://openalex.org/I114395901"]},{"raw_affiliation_string":"High Performance Network Lab, lOA, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100739181","display_name":"Dalei Wu","orcid":"https://orcid.org/0000-0002-9362-3906"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dalei Wu","raw_affiliation_strings":["Massachusetts Institute of Technology, Cambridge, MA, USA"],"affiliations":[{"raw_affiliation_string":"Massachusetts Institute of Technology, Cambridge, MA, USA","institution_ids":["https://openalex.org/I63966007"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103482769","display_name":"Yanni Han","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanni Han","raw_affiliation_strings":["High Performance Network Lab, lOA, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"High Performance Network Lab, lOA, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060820237","display_name":"Qi Ying","orcid":"https://orcid.org/0000-0002-4560-433X"},"institutions":[{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Qi","raw_affiliation_strings":["High Performance Network Lab, lOA, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"High Performance Network Lab, lOA, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016872909","display_name":"Tao Lin","orcid":"https://orcid.org/0000-0002-7479-2333"},"institutions":[{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Lin","raw_affiliation_strings":["High Performance Network Lab, lOA, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"High Performance Network Lab, lOA, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101113582"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210108629"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.18211269,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":95},"biblio":{"volume":"7","issue":null,"first_page":"1297","last_page":"1302"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7725014686584473},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.770575225353241},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.562030017375946},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5213088393211365},{"id":"https://openalex.org/keywords/minification","display_name":"Minification","score":0.4783441722393036},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.4712173044681549},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.45491766929626465},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.45180219411849976},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.43935641646385193},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.42699605226516724},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.42283788323402405},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.39748862385749817},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.37499162554740906},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.36308830976486206},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11997950077056885},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.08873873949050903},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08803096413612366}],"concepts":[{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7725014686584473},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.770575225353241},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.562030017375946},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5213088393211365},{"id":"https://openalex.org/C147764199","wikidata":"https://www.wikidata.org/wiki/Q6865248","display_name":"Minification","level":2,"score":0.4783441722393036},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.4712173044681549},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.45491766929626465},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.45180219411849976},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.43935641646385193},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.42699605226516724},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.42283788323402405},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.39748862385749817},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.37499162554740906},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.36308830976486206},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11997950077056885},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08873873949050903},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08803096413612366},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc.2013.6554751","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2013.6554751","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1988537209","https://openalex.org/W2039895591","https://openalex.org/W2041830596","https://openalex.org/W2069323107","https://openalex.org/W2071043548","https://openalex.org/W2076233562","https://openalex.org/W2089765386","https://openalex.org/W2096709162","https://openalex.org/W2102251370","https://openalex.org/W2112833251","https://openalex.org/W2124577150","https://openalex.org/W2130626677","https://openalex.org/W2135988418","https://openalex.org/W2140373064","https://openalex.org/W2141798247","https://openalex.org/W2142100695","https://openalex.org/W2143514830","https://openalex.org/W2147322318","https://openalex.org/W2149505588","https://openalex.org/W2163257380","https://openalex.org/W2168452204","https://openalex.org/W2515146124","https://openalex.org/W2561564344","https://openalex.org/W3015713744","https://openalex.org/W4285719527","https://openalex.org/W6647249258","https://openalex.org/W6675327781","https://openalex.org/W6680986922","https://openalex.org/W6684238597","https://openalex.org/W6726012016"],"related_works":["https://openalex.org/W2095999892","https://openalex.org/W2018764758","https://openalex.org/W2383689843","https://openalex.org/W1550668881","https://openalex.org/W617913288","https://openalex.org/W2062873522","https://openalex.org/W2807251790","https://openalex.org/W2319323865","https://openalex.org/W2951745010","https://openalex.org/W2347958299"],"abstract_inverted_index":{"In":[0],"wireless":[1],"sensor":[2,11,38],"networks,":[3],"one":[4],"of":[5,54,71,87,99,119,155,162],"the":[6,15,44,52,55,73,85,90,94,97,100,105,117,128,146,153,156,160,163,169,174],"primary":[7],"requirements":[8],"is":[9,103,110,136],"that":[10,96],"data":[12],"derived":[13],"from":[14,77],"physical":[16],"world":[17],"can":[18],"be":[19],"interchanged":[20],"with":[21,47],"all":[22],"interested":[23],"collaborative":[24],"entities":[25],"in":[26,84,168],"a":[27,59,113],"secure":[28],"and":[29,121,138,159],"reliable":[30],"manner.":[31],"Due":[32],"to":[33,89],"highly":[34],"unpredictable":[35],"environments":[36],"where":[37],"nodes":[39],"are":[40,82,142,166],"usually":[41],"deployed,":[42],"minimizing":[43],"transmisstion":[45],"cost":[46,75,133],"jointly":[48],"taking":[49],"into":[50],"account":[51],"security":[53],"whole":[56,101],"network":[57,102],"poses":[58],"challenging":[60],"task.":[61],"With":[62,127],"this":[63,65],"end,":[64],"paper":[66],"considers":[67],"an":[68],"optimization":[69],"problem":[70,135],"deriving":[72,145],"minimum":[74,132],"paths":[76,134],"multiple":[78],"source":[79],"nodes,":[80],"which":[81,115],"deployed":[83],"area":[86],"interest,":[88],"sink":[91],"node":[92,122],"under":[93,104],"constraint":[95],"vulnerability":[98,109],"given":[106],"level.":[107],"The":[108,149],"defined":[111,129],"as":[112],"metric":[114],"characterizes":[116],"degree":[118],"edge":[120],"sharing":[123],"among":[124],"different":[125],"paths.":[126,148],"vulnerability,":[130],"vulnerability-constrained":[131],"formulated":[137],"two":[139],"polynomial-time":[140],"algorithms":[141,165],"developed":[143],"for":[144,152],"optimal":[147,157],"necessary":[150],"condition":[151],"existence":[154],"solution,":[158],"optimality":[161],"proposed":[164,181],"analyzed":[167],"theoretical.":[170],"Extensive":[171],"simulations":[172],"show":[173],"significant":[175],"performance":[176],"enhancements":[177],"achieved":[178],"by":[179],"our":[180],"algorithms.":[182]},"counts_by_year":[{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
