{"id":"https://openalex.org/W2769756801","doi":"https://doi.org/10.1145/3132114.3132120","title":"An Efficient Source Anonymity Technique based on Exponential Distribution against a Global Adversary Model using Fake Injections","display_name":"An Efficient Source Anonymity Technique based on Exponential Distribution against a Global Adversary Model using Fake Injections","publication_year":2017,"publication_date":"2017-11-15","ids":{"openalex":"https://openalex.org/W2769756801","doi":"https://doi.org/10.1145/3132114.3132120","mag":"2769756801"},"language":"en","primary_location":{"id":"doi:10.1145/3132114.3132120","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3132114.3132120","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029785750","display_name":"Anas Bushnag","orcid":"https://orcid.org/0000-0001-9353-7605"},"institutions":[{"id":"https://openalex.org/I154300980","display_name":"University of Bridgeport","ror":"https://ror.org/01rf3yp57","country_code":"US","type":"education","lineage":["https://openalex.org/I154300980"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Anas Bushnag","raw_affiliation_strings":["University of Bridgeport, Bridgeport, USA"],"affiliations":[{"raw_affiliation_string":"University of Bridgeport, Bridgeport, USA","institution_ids":["https://openalex.org/I154300980"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045161880","display_name":"Abdelshakour Abuzneid","orcid":"https://orcid.org/0000-0001-5416-0315"},"institutions":[{"id":"https://openalex.org/I154300980","display_name":"University of Bridgeport","ror":"https://ror.org/01rf3yp57","country_code":"US","type":"education","lineage":["https://openalex.org/I154300980"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abdelshakour Abuzneid","raw_affiliation_strings":["University of Bridgeport, Bridgeport, USA"],"affiliations":[{"raw_affiliation_string":"University of Bridgeport, Bridgeport, USA","institution_ids":["https://openalex.org/I154300980"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005346248","display_name":"Ausif Mahmood","orcid":"https://orcid.org/0000-0002-8991-4268"},"institutions":[{"id":"https://openalex.org/I154300980","display_name":"University of Bridgeport","ror":"https://ror.org/01rf3yp57","country_code":"US","type":"education","lineage":["https://openalex.org/I154300980"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ausif Mahmood","raw_affiliation_strings":["University of Bridgeport, Bridgeport, USA"],"affiliations":[{"raw_affiliation_string":"University of Bridgeport, Bridgeport, USA","institution_ids":["https://openalex.org/I154300980"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5029785750"],"corresponding_institution_ids":["https://openalex.org/I154300980"],"apc_list":null,"apc_paid":null,"fwci":0.4144,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.67359463,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"15","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7426683902740479},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.7213902473449707},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6444901823997498},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5608474612236023},{"id":"https://openalex.org/keywords/exponential-distribution","display_name":"Exponential distribution","score":0.4704408049583435},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.41289860010147095},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4105427861213684},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3722642660140991},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.37117940187454224},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3201708197593689},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3006531596183777}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7426683902740479},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.7213902473449707},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6444901823997498},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5608474612236023},{"id":"https://openalex.org/C55350006","wikidata":"https://www.wikidata.org/wiki/Q237193","display_name":"Exponential distribution","level":2,"score":0.4704408049583435},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.41289860010147095},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4105427861213684},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3722642660140991},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37117940187454224},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3201708197593689},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3006531596183777},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3132114.3132120","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3132114.3132120","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Life in Land","score":0.6700000166893005,"id":"https://metadata.un.org/sdg/15"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1483098776","https://openalex.org/W1569496583","https://openalex.org/W1601639631","https://openalex.org/W1975830577","https://openalex.org/W1989786539","https://openalex.org/W2038976731","https://openalex.org/W2050409719","https://openalex.org/W2052770634","https://openalex.org/W2083122891","https://openalex.org/W2090455692","https://openalex.org/W2136399700","https://openalex.org/W2138515830","https://openalex.org/W2152158138","https://openalex.org/W2186031229","https://openalex.org/W2293895826","https://openalex.org/W2346291892","https://openalex.org/W2463743099","https://openalex.org/W2515967114","https://openalex.org/W3124339913","https://openalex.org/W4248778161","https://openalex.org/W4253925510","https://openalex.org/W4254812591"],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W1966494590","https://openalex.org/W1593132758","https://openalex.org/W2117874351","https://openalex.org/W4206398305","https://openalex.org/W3023934611","https://openalex.org/W2157186778","https://openalex.org/W2982648111","https://openalex.org/W4242235492","https://openalex.org/W2590022098"],"abstract_inverted_index":{"The":[0,49,141,184,212],"security":[1],"of":[2,18,35,40,100,126,138,147,155,180,195,242],"Wireless":[3],"Sensor":[4],"Networks":[5],"(WSNs)":[6],"is":[7,52,110,123,162,188,199],"vital":[8],"in":[9,24,30],"several":[10],"applications":[11,36],"such":[12,21,77,205],"as":[13,22,44,78,206],"the":[14,38,41,64,68,97,101,127,132,136,139,145,148,153,159,177,181,196,217,240],"tracking":[15],"and":[16,87,164,198,209,223,229,254],"monitoring":[17,208],"endangered":[19],"species":[20],"pandas":[23],"a":[25,31,60,107,192,250,255],"national":[26],"park":[27],"or":[28],"soldiers":[29],"battlefield.":[32],"This":[33],"kind":[34],"requires":[37],"anonymity":[39,76,137,225],"source,":[42],"known":[43],"Source":[45],"Location":[46],"Privacy":[47],"(SLP).":[48],"main":[50],"aim":[51],"to":[53,63,130,166,201,238],"prevent":[54],"an":[55,120],"adversary":[56,186],"from":[57],"tracing":[58],"back":[59],"real":[61],"event":[62],"originator":[65],"by":[66],"analyzing":[67],"network":[69,149,182,197,252],"traffic.":[70],"Previous":[71],"techniques":[72,95],"have":[73],"achieved":[74],"high":[75,224],"Dummy":[79,83,89,113],"Uniform":[80],"Distribution":[81,85,91,115],"(DUD),":[82],"Adaptive":[84,90,114],"(DAD)":[86],"Controlled":[88],"(CAD).":[92],"However,":[93],"these":[94],"increase":[96],"overall":[98],"overhead":[99,133,222],"network.":[102,160],"To":[103],"overcome":[104],"this":[105,118],"shortcoming,":[106],"new":[108],"technique":[109,219],"presented:":[111],"Exponential":[112],"(EDAD).":[116],"In":[117],"technique,":[119],"exponential":[121,142],"distribution":[122,129,143],"used":[124],"instead":[125],"uniform":[128],"reduce":[131],"without":[134],"sacrificing":[135],"source.":[140],"improves":[144],"lifetime":[146],"since":[150],"it":[151,169],"decreases":[152],"number":[154],"transmitted":[156],"packets":[157],"within":[158],"It":[161],"straightforward":[163],"easy":[165],"implement":[167],"because":[168],"has":[170,191],"only":[171],"one":[172],"parameter":[173],"\u03bb":[174],"that":[175,216],"controls":[176],"transmitting":[178],"rate":[179,207],"nodes.":[183],"conducted":[185],"model":[187],"global,":[189],"which":[190],"full":[193],"view":[194],"able":[200],"perform":[202],"sophisticated":[203],"attacks":[204],"time":[210],"correlation.":[211],"simulation":[213],"results":[214],"show":[215],"proposed":[218],"provides":[220],"less":[221],"with":[226],"reasonable":[227],"delay":[228],"delivery":[230],"ratio.":[231],"Three":[232],"different":[233],"analysis":[234],"models":[235,246],"are":[236,247],"developed":[237],"confirm":[239],"validation":[241],"our":[243],"technique.":[244],"These":[245],"visualization":[248],"model,":[249,253],"neural":[251],"steganography":[256],"model.":[257]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
