{"id":"https://openalex.org/W4313549857","doi":"https://doi.org/10.1109/itnac55475.2022.9998341","title":"AAiBA: Attracting an Adversary for Increasing Base-Station Anonymity in Wireless Sensor Networks","display_name":"AAiBA: Attracting an Adversary for Increasing Base-Station Anonymity in Wireless Sensor Networks","publication_year":2022,"publication_date":"2022-11-30","ids":{"openalex":"https://openalex.org/W4313549857","doi":"https://doi.org/10.1109/itnac55475.2022.9998341"},"language":"en","primary_location":{"id":"doi:10.1109/itnac55475.2022.9998341","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/itnac55475.2022.9998341","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014189012","display_name":"Sami Alsemairi","orcid":"https://orcid.org/0000-0003-3881-9831"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sami Saad Alsemairi","raw_affiliation_strings":["Institute of Public Administration,Department of Digital Transformation and Information Programs,Jeddah,Saudi Arabia","Department of Digital Transformation and Information Programs, Institute of Public Administration, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Institute of Public Administration,Department of Digital Transformation and Information Programs,Jeddah,Saudi Arabia","institution_ids":[]},{"raw_affiliation_string":"Department of Digital Transformation and Information Programs, Institute of Public Administration, Jeddah, Saudi Arabia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5014189012"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1381,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.50539839,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"367","last_page":"372"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.808326244354248},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7396934032440186},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.718861997127533},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7090797424316406},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6943524479866028},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5700457096099854},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5351957082748413},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.41973158717155457},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4107927680015564},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3252040445804596},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.19794711470603943},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.06313392519950867}],"concepts":[{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.808326244354248},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7396934032440186},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.718861997127533},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7090797424316406},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6943524479866028},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5700457096099854},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5351957082748413},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.41973158717155457},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4107927680015564},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3252040445804596},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.19794711470603943},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.06313392519950867},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itnac55475.2022.9998341","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/itnac55475.2022.9998341","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1517527854","https://openalex.org/W1554309413","https://openalex.org/W1611367516","https://openalex.org/W1993638601","https://openalex.org/W2006805041","https://openalex.org/W2064144643","https://openalex.org/W2105666891","https://openalex.org/W2106335692","https://openalex.org/W2136032111","https://openalex.org/W2142100695","https://openalex.org/W2170239483","https://openalex.org/W2223596650","https://openalex.org/W2244384397","https://openalex.org/W2544698368","https://openalex.org/W2560184600","https://openalex.org/W2649264014","https://openalex.org/W2755907585","https://openalex.org/W2898359313","https://openalex.org/W4248772809","https://openalex.org/W4251071031"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2471811227","https://openalex.org/W2217591390","https://openalex.org/W4390188535","https://openalex.org/W2157496457"],"abstract_inverted_index":{"Wireless":[0],"sensor":[1,26,44],"networks":[2],"(WSNs)":[3],"have":[4],"become":[5],"one":[6],"of":[7,21,24,41,81,127],"the":[8,47,51,55,67,76,82,88,100,108,113,118,132,141,145,155,158,161,166,173],"most":[9],"interesting":[10],"research":[11],"areas":[12],"in":[13,84],"recent":[14],"years.":[15],"A":[16],"WSN":[17,86],"is":[18],"mainly":[19],"composed":[20],"a":[22,38,85,90,104,125,137],"set":[23],"homogeneous":[25],"nodes":[27,45],"and":[28,49,74,120,143,151,164],"an":[29,94,110],"in-situ":[30],"base-station":[31],"(BS)":[32],"that":[33,96,172],"are":[34],"randomly":[35],"deployed":[36],"within":[37],"delimited":[39],"area":[40,48],"interest.":[42],"These":[43],"sense":[46],"transmit":[50],"sensed":[52],"data":[53,65,114],"to":[54,64,98,117,130,139],"BS":[56,68,83,89,119,162,178],"through":[57],"multiple":[58],"wireless":[59],"communication":[60],"hops.":[61],"In":[62],"addition":[63],"collection,":[66],"performs":[69],"highly":[70],"complex":[71],"management":[72],"functions":[73],"controls":[75],"entire":[77],"network.":[78,101],"The":[79],"importance":[80],"makes":[87],"high-value":[91],"target":[92],"for":[93],"adversary":[95,111],"wants":[97],"disable":[99],"To":[102],"launch":[103],"denial-of-service":[105],"attack":[106,142],"on":[107],"BS,":[109],"intercepts":[112],"transmissions":[115],"sent":[116],"uses":[121],"evidence":[122],"theory":[123],"as":[124],"technique":[126,138,175],"traffic":[128],"analysis":[129],"find":[131],"BS.":[133],"This":[134],"paper":[135],"proposes":[136],"counter":[140],"increase":[144],"BS's":[146],"anonymity":[147],"by":[148],"creating":[149],"cells":[150],"choosing":[152],"HoneyCells":[153,159],"from":[154],"created":[156],"cells;":[157],"mimic":[160],"cell":[163],"attract":[165],"adversary's":[167],"attention.":[168],"Simulation":[169],"results":[170],"show":[171],"proposed":[174],"provides":[176],"better":[177],"anonymity.":[179]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
