{"id":"https://openalex.org/W2906778430","doi":"https://doi.org/10.1155/2019/4392839","title":"Nodes Availability Analysis of NB-IoT Based Heterogeneous Wireless Sensor Networks under Malware Infection","display_name":"Nodes Availability Analysis of NB-IoT Based Heterogeneous Wireless Sensor Networks under Malware Infection","publication_year":2019,"publication_date":"2019-01-03","ids":{"openalex":"https://openalex.org/W2906778430","doi":"https://doi.org/10.1155/2019/4392839","mag":"2906778430"},"language":"en","primary_location":{"id":"doi:10.1155/2019/4392839","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/4392839","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2019/4392839.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/wcmc/2019/4392839.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060120730","display_name":"Xiaojun Wu","orcid":"https://orcid.org/0000-0002-8519-104X"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaojun Wu","raw_affiliation_strings":["College of Information Science and Technology, Donghua University, Shanghai 201620, China"],"raw_orcid":"https://orcid.org/0000-0002-8519-104X","affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Donghua University, Shanghai 201620, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065024360","display_name":"Qiying Cao","orcid":"https://orcid.org/0000-0001-7976-6364"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiying Cao","raw_affiliation_strings":["College of Computer Science and Technology, Donghua University, Shanghai 201620, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Donghua University, Shanghai 201620, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111672330","display_name":"Juan Jin","orcid":null},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Juan Jin","raw_affiliation_strings":["College of Computer Science and Technology, Donghua University, Shanghai 201620, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Donghua University, Shanghai 201620, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101497982","display_name":"Yuanjie Li","orcid":"https://orcid.org/0000-0001-9440-2331"},"institutions":[{"id":"https://openalex.org/I146613903","display_name":"Shanghai Lixin University of Accounting and Finance","ror":"https://ror.org/02g81yf77","country_code":"CN","type":"education","lineage":["https://openalex.org/I146613903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanjie Li","raw_affiliation_strings":["School of Information Management, Shanghai Lixin University of Accounting and Finance, Shanghai 201620, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Information Management, Shanghai Lixin University of Accounting and Finance, Shanghai 201620, China","institution_ids":["https://openalex.org/I146613903"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100430361","display_name":"Hong Zhang","orcid":"https://orcid.org/0000-0003-3607-0177"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Donghua University, Shanghai 201620, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Donghua University, Shanghai 201620, China","institution_ids":["https://openalex.org/I181326427"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5060120730"],"corresponding_institution_ids":["https://openalex.org/I181326427"],"apc_list":{"value":2300,"currency":"USD","value_usd":2300},"apc_paid":{"value":2300,"currency":"USD","value_usd":2300},"fwci":2.2298,"has_fulltext":true,"cited_by_count":15,"citation_normalized_percentile":{"value":0.88687336,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.777714729309082},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.7171264290809631},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6610293388366699},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5509862899780273},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5195051431655884},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4813471734523773},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4740355312824249},{"id":"https://openalex.org/keywords/sensor-node","display_name":"Sensor node","score":0.4587779939174652},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.4430219233036041},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4076470136642456},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.3367004990577698},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3213886618614197},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.31798219680786133},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20039337873458862},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.096437007188797},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0721648633480072}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.777714729309082},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.7171264290809631},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6610293388366699},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5509862899780273},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5195051431655884},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4813471734523773},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4740355312824249},{"id":"https://openalex.org/C111185680","wikidata":"https://www.wikidata.org/wiki/Q3866206","display_name":"Sensor node","level":5,"score":0.4587779939174652},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.4430219233036041},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4076470136642456},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.3367004990577698},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3213886618614197},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.31798219680786133},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20039337873458862},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.096437007188797},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0721648633480072},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2019/4392839","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/4392839","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2019/4392839.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:00072a1dc50c4db3ab4a99258c72753e","is_oa":false,"landing_page_url":"https://doaj.org/article/00072a1dc50c4db3ab4a99258c72753e","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wireless Communications and Mobile Computing, Vol 2019 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2019/4392839","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/4392839","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2019/4392839.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7900000214576721,"id":"https://metadata.un.org/sdg/3","display_name":"Good health and well-being"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2906778430.pdf","grobid_xml":"https://content.openalex.org/works/W2906778430.grobid-xml"},"referenced_works_count":11,"referenced_works":["https://openalex.org/W1969419441","https://openalex.org/W2061686014","https://openalex.org/W2074678244","https://openalex.org/W2092184335","https://openalex.org/W2107883012","https://openalex.org/W2169996050","https://openalex.org/W2279589894","https://openalex.org/W2509657079","https://openalex.org/W2549923868","https://openalex.org/W2612545613","https://openalex.org/W2728847009"],"related_works":["https://openalex.org/W2799361348","https://openalex.org/W2148549110","https://openalex.org/W1977342959","https://openalex.org/W2053773563","https://openalex.org/W2564820291","https://openalex.org/W2067121920","https://openalex.org/W2536494564","https://openalex.org/W2371193381","https://openalex.org/W1536182396","https://openalex.org/W2545116705"],"abstract_inverted_index":{"The":[0,16,102],"Narrowband":[1],"Internet":[2],"of":[3,18,26,34,68,90,99,110,132,168],"Things":[4],"(NB-IoT)":[5],"is":[6,105,112,119,126,134,152,162],"a":[7,49,120,157],"main":[8],"stream":[9],"technology":[10],"based":[11,42,53],"on":[12,37,54],"mobile":[13],"communication":[14],"system.":[15],"combination":[17],"NB-IoT":[19,41],"and":[20,57,81,95,114,136,145],"WSNs":[21],"can":[22,61,183],"active":[23],"the":[24,32,66,73,87,91,96,108,115,123,127,130,137,142,146,149,166,173,178,189],"application":[25],"WSNs.":[27],"In":[28],"order":[29],"to":[30,64,165],"evaluate":[31],"influence":[33],"node":[35,50,55,74,100,111,116,124,133,138,150,160,174],"heterogeneity":[36,51],"malware":[38],"propagation":[39],"in":[40],"Heterogeneous":[43],"Wireless":[44],"Sensor":[45],"Networks,":[46],"we":[47,85],"propose":[48],"model":[52,77],"distribution":[56],"vulnerability":[58,117,139,175],"differences,":[59],"which":[60],"be":[62],"used":[63],"analyze":[65],"availability":[67,125,151],"nodes.":[69],"We":[70],"then":[71],"establish":[72],"state":[75],"transition":[76,92],"by":[78],"epidemic":[79],"theory":[80],"Markov":[82],"chain.":[83],"Further,":[84],"obtain":[86],"dynamic":[88],"equations":[89],"between":[93],"nodes":[94,182],"calculation":[97],"formula":[98],"availability.":[101],"simulation":[103],"result":[104],"that":[106,171],"when":[107,129,155,172],"degree":[109,131,167],"small":[113],"function":[118,140,144,176],"power":[121,147,179],"function,":[122,148,180],"highest;":[128],"large":[135],"satisfies":[141,177],"exponential":[143],"high.":[153],"Therefore,":[154],"constructing":[156],"NBIOT-HWSNs":[158],"network,":[159],"protection":[161],"implemented":[163],"according":[164],"node,":[169],"so":[170],"all":[181],"maintain":[184],"high":[185],"availability,":[186],"thus":[187],"making":[188],"entire":[190],"network":[191],"more":[192],"stable.":[193]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":5}],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2025-10-10T00:00:00"}
