{"id":"https://openalex.org/W2023001601","doi":"https://doi.org/10.1145/2695664.2695780","title":"Energy harvesting based protection of border surveillance systems","display_name":"Energy harvesting based protection of border surveillance systems","publication_year":2015,"publication_date":"2015-04-13","ids":{"openalex":"https://openalex.org/W2023001601","doi":"https://doi.org/10.1145/2695664.2695780","mag":"2023001601"},"language":"en","primary_location":{"id":"doi:10.1145/2695664.2695780","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2695664.2695780","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055279623","display_name":"Nourhene Ellouze","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Nourhene Ellouze","raw_affiliation_strings":["University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056170858","display_name":"Slim Rekhis","orcid":"https://orcid.org/0000-0002-6507-6300"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Slim Rekhis","raw_affiliation_strings":["University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113487171","display_name":"Noureddine Boudriga","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Noureddine Boudriga","raw_affiliation_strings":["University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055279623"],"corresponding_institution_ids":["https://openalex.org/I179097149"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.0610935,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"3","issue":null,"first_page":"621","last_page":"626"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7811582088470459},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7511181831359863},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6549221277236938},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6058172583580017},{"id":"https://openalex.org/keywords/radio-frequency-identification","display_name":"Radio-frequency identification","score":0.5637954473495483},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5612779855728149},{"id":"https://openalex.org/keywords/track","display_name":"Track (disk drive)","score":0.48016801476478577},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.46296098828315735},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4477890133857727},{"id":"https://openalex.org/keywords/energy","display_name":"Energy (signal processing)","score":0.42530009150505066},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.35962480306625366},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.21124988794326782}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7811582088470459},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7511181831359863},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6549221277236938},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6058172583580017},{"id":"https://openalex.org/C204222849","wikidata":"https://www.wikidata.org/wiki/Q104954","display_name":"Radio-frequency identification","level":2,"score":0.5637954473495483},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5612779855728149},{"id":"https://openalex.org/C89992363","wikidata":"https://www.wikidata.org/wiki/Q5961558","display_name":"Track (disk drive)","level":2,"score":0.48016801476478577},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.46296098828315735},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4477890133857727},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.42530009150505066},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.35962480306625366},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.21124988794326782},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2695664.2695780","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2695664.2695780","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.46000000834465027,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1946495429","https://openalex.org/W1982170863","https://openalex.org/W1987654941","https://openalex.org/W2010163316","https://openalex.org/W2019750293","https://openalex.org/W2064909103","https://openalex.org/W2126433409","https://openalex.org/W2130433927","https://openalex.org/W2164298032","https://openalex.org/W4237364255"],"related_works":["https://openalex.org/W1577771720","https://openalex.org/W2789518417","https://openalex.org/W4213217485","https://openalex.org/W2566545183","https://openalex.org/W2499449816","https://openalex.org/W2059085722","https://openalex.org/W4210856988","https://openalex.org/W238145802","https://openalex.org/W2946721565","https://openalex.org/W1569027610"],"abstract_inverted_index":{"Border":[0],"surveillance":[1,58],"is":[2,17,105],"one":[3],"of":[4,10,38,111],"the":[5,65,75,109,112,117],"famous":[6],"mission":[7],"critical":[8],"applications":[9],"Wireless":[11],"Sensor":[12],"Networks":[13],"(WSNs),":[14],"whose":[15],"aim":[16],"to":[18,55,69,107],"monitor":[19],"country":[20],"borderlines,":[21],"detect":[22],"intruders,":[23],"and":[24,45,63,87,92,97],"track":[25],"their":[26],"trajectories.":[27],"However,":[28],"such":[29,70],"an":[30,71],"application":[31],"can":[32],"be":[33],"threatened":[34],"by":[35,79],"specific":[36,68],"types":[37],"security":[39,66],"attacks":[40,67],"affecting":[41],"its":[42],"availability,":[43],"lifespan,":[44],"detection":[46],"accuracy.":[47],"In":[48],"this":[49],"paper,":[50],"we":[51,73,88],"propose":[52],"a":[53,81],"solution":[54],"secure":[56],"border":[57],"WSNs":[59],"application.":[60],"After":[61],"identifying":[62],"describing":[64],"application,":[72],"extend":[74],"sensor":[76,101],"nodes":[77],"architecture":[78],"introducing":[80],"Radio":[82],"Frequency":[83],"IDentification":[84],"(RFID)":[85],"system,":[86],"design":[89],"powerless":[90],"protocols":[91],"techniques":[93,114],"for":[94],"mutual":[95],"authentication":[96],"proximity":[98],"verification":[99],"between":[100],"nodes.":[102],"A":[103],"simulation":[104],"conducted":[106],"evaluate":[108],"efficiency":[110],"proposed":[113],"in":[115],"detecting":[116],"identified":[118],"attacks.":[119]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
