{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,4]],"date-time":"2024-03-04T10:41:14Z","timestamp":1709548874414},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"5","content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s11390-017-1777-0","type":"journal-article","created":{"date-parts":[[2017,9,20]],"date-time":"2017-09-20T09:39:03Z","timestamp":1505900343000},"page":"991-1007","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["MimiBS: Mimicking Base-Station to Provide Location Privacy Protection in Wireless Sensor Networks"],"prefix":"10.1007","volume":"32","author":[{"given":"Yawar Abbas","family":"Bangash","sequence":"first","affiliation":[]},{"given":"Ling-Fang","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,20]]},"reference":[{"key":"1777_CR1","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.nucengdes.2012.04.027","volume":"249","author":"SAV Satya Murty","year":"2012","unstructured":"Satya Murty S A V, Raj B, Sivalingam K M, Ebenezer J, Chandran T, Shanmugavel M, Rajan K K. Wireless sensor network for sodium leak detection. Nuclear Engineering and Design, 2012, 249: 432-437.","journal-title":"Nuclear Engineering and Design"},{"key":"1777_CR2","unstructured":"Bagula A. Applications of wireless sensor networks. http:\/\/wireless.ictp.it\/wp-content\/uploads\/2012\/02\/WSN-Applications.pdf , February 2012."},{"key":"1777_CR3","unstructured":"Lopez J, Zhou J.Wireless Sensor Network Security. Andreas Hermann, 2012."},{"key":"1777_CR4","doi-asserted-by":"crossref","unstructured":"Mottola L, Picco G P. Programming wireless sensor networks: Fundamental concepts and state of the art. ACM Computing Surveys, 2011, 43(3): Article No. 19.","DOI":"10.1145\/1922649.1922656"},{"issue":"4","key":"1777_CR5","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz I F, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: A survey. Computer Networks, 2002, 38(4): 393-422.","journal-title":"Computer Networks"},{"key":"1777_CR6","doi-asserted-by":"crossref","unstructured":"Diffie W, Landau S. Privacy on the Line: The Politics of Wiretapping and Encryption. MIT Press, 2007.","DOI":"10.7551\/mitpress\/5572.001.0001"},{"issue":"2","key":"1777_CR7","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1109\/JSYST.2012.2221956","volume":"7","author":"R Rios","year":"2013","unstructured":"Rios R, Lopez J. (Un)Suitability of anonymous communication systems to WSN. IEEE Systems Journal, 2013, 7(2): 298-310.","journal-title":"IEEE Systems Journal"},{"issue":"3","key":"1777_CR8","doi-asserted-by":"crossref","first-page":"1238","DOI":"10.1109\/SURV.2013.011413.00118","volume":"15","author":"M Conti","year":"2013","unstructured":"Conti M, Willemsen J, Crispo B. Providing source location privacy in wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 2013, 15(3): 1238-1280.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1777_CR9","doi-asserted-by":"crossref","unstructured":"Pongaliur K, Xiao L. Sensor node source privacy and packet recovery under eavesdropping and node compromise attacks. ACM Trans. Sensor Networks, 2013, 9(4): Article No. 50.","DOI":"10.1145\/2489253.2489267"},{"key":"1777_CR10","doi-asserted-by":"crossref","unstructured":"Proa\u00f1o A, Lazos L. Perfect contextual information privacy in WSNs undercolluding eavesdroppers. In Proc. the 6th ACM Conf. Security and Privacy in Wireless and Mobile Networks, April 2013, pp.89-94.","DOI":"10.1145\/2462096.2462112"},{"key":"1777_CR11","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1109\/ACCESS.2014.2332817","volume":"2","author":"J Long","year":"2014","unstructured":"Long J, Dong M X, Ota K, Liu A F. Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks. IEEE Access, 2014, 2: 633-651.","journal-title":"IEEE Access"},{"issue":"17","key":"1777_CR12","doi-asserted-by":"crossref","first-page":"2518","DOI":"10.1049\/iet-com.2010.0825","volume":"5","author":"R Rios","year":"2011","unstructured":"Rios R, Lopez J. Analysis of location privacy solutions in wireless sensor networks. IET Communications, 2011, 5(17): 2518-2532.","journal-title":"IET Communications"},{"key":"1777_CR13","doi-asserted-by":"crossref","unstructured":"Deng J, Han R, Mishra S. Countermeasures against traffic analysis attacks in wireless sensor networks. In Proc. the 1st Int. Conf. Security and Privacy for Emerging Areas in Communications Networks, September 2005, pp.113-126.","DOI":"10.1109\/SECURECOMM.2005.16"},{"key":"1777_CR14","doi-asserted-by":"crossref","unstructured":"Luo X, Ji X, Park M S. Location privacy against traffic analysis attacks in wireless sensor networks. In Proc. Int. Conf. Information Science and Applications, April 2010.","DOI":"10.1109\/ICISA.2010.5480564"},{"issue":"2","key":"1777_CR15","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1109\/TMC.2011.32","volume":"11","author":"K Mehta","year":"2012","unstructured":"Mehta K, Liu D G,Wright M. Protecting location privacy in sensor networks against a global eavesdropper. IEEE Trans. Mobile Computing, 2012, 11(2): 320-336.","journal-title":"IEEE Trans. Mobile Computing"},{"key":"1777_CR16","doi-asserted-by":"crossref","unstructured":"Ying B D, Gallardo J R, Makrakis D, Mouftah H T. Concealing of the sink location in WSNs by artificially homogenizing traffic intensity. In Proc. IEEE Conf. Computer Communications Workshops, April 2011, pp.988-993.","DOI":"10.1109\/INFCOMW.2011.5928957"},{"key":"1777_CR17","doi-asserted-by":"crossref","unstructured":"Ebrahimi Y, Younis M. Using deceptive packets to increase base-station anonymity in wireless sensor network. In Proc. the 7th Int. Wireless Communications and Mobile Computing Conf., July 2011, pp.842-847.","DOI":"10.1109\/IWCMC.2011.5982656"},{"key":"1777_CR18","unstructured":"Ying B D, Makrakis D, Mouftah H T. A protocol for sink location privacy protection in wireless sensor networks. In Proc. IEEE Global Telecommunications Conf., December 2011."},{"key":"1777_CR19","doi-asserted-by":"crossref","unstructured":"Gottumukkala V P V, Pandit V, Li H L, Agrawal D P. Base-station location anonymity and security technique (BLAST) for wireless sensor networks. In Proc. IEEE Int. Conf. Communications, June 2012, pp.6705-6709.","DOI":"10.1109\/ICC.2012.6364762"},{"key":"1777_CR20","doi-asserted-by":"crossref","unstructured":"Chen H L, Lou W. From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networks. In Proc. the 29th IEEE Int. Performance Computing and Communications Conf., December 2010.","DOI":"10.1109\/PCCC.2010.5682341"},{"issue":"2","key":"1777_CR21","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/LCOMM.2011.010311.101885","volume":"15","author":"K Bicakci","year":"2011","unstructured":"Bicakci K, Bagci I E, Tavli B. Lifetime bounds of wireless sensor networks preserving perfect sink unobservability. IEEE Communications Letters, 2011, 15(2): 205-207.","journal-title":"IEEE Communications Letters"},{"key":"1777_CR22","doi-asserted-by":"crossref","unstructured":"Jian Y, Chen S, Zhang Z, Zhang L. Protecting receiver-location privacy in wireless sensor networks. In Proc. the 26th IEEE INFOCOM, May 2007, pp.1955-1963.","DOI":"10.1109\/INFCOM.2007.227"},{"key":"1777_CR23","doi-asserted-by":"crossref","first-page":"920510","DOI":"10.1155\/2014\/920510","volume":"2014","author":"LM Zhou","year":"2014","unstructured":"Zhou L M, Wen Q Y. Energy efficient source location privacy protecting scheme in wireless sensor networks using ant colony optimization. International Journal of Distributed Sensor Networks, 2014, 2014: 920510.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"2","key":"1777_CR24","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D Goldschlag","year":"1999","unstructured":"Goldschlag D, Reed M, Syverson P. Onion routing. Communications of the ACM, 1999, 42(2): 39-41.","journal-title":"Communications of the ACM"},{"key":"1777_CR25","doi-asserted-by":"crossref","unstructured":"Kamat P, Zhang Y Y, Trappe W, Ozturk C. Enhancing source-location privacy in sensor network routing. In Proc. the 25th IEEE Int. Conf. Distributed Computing Systems, June 2005, pp.599-608.","DOI":"10.1109\/ICDCS.2005.31"},{"key":"1777_CR26","doi-asserted-by":"crossref","unstructured":"Braginsky D, Estrin D. Rumor routing algorithm for sensor networks. In Proc. the 1st ACM Int. Workshop on Wireless Sensor Networks and Applications, September 2002, pp.22-31.","DOI":"10.1145\/570738.570742"},{"issue":"4","key":"1777_CR27","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1145\/945506.945507","volume":"21","author":"PT Eugster","year":"2003","unstructured":"Eugster P T, Guerraoui R, Handurukande S B, Kouznetsov P, Kermarrec A M. Lightweight probabilistic broadcast. ACM Trans. Computer Systems, 2003, 21(4): 341-374.","journal-title":"ACM Trans. Computer Systems"},{"key":"1777_CR28","doi-asserted-by":"crossref","unstructured":"Kamat P, Xu W Y, Trappe W, Zhang Y Y. Temporal privacy in wireless sensor networks. In Proc. the 27th Int. Conf. Distributed Computing Systems, June 2007.","DOI":"10.1109\/ICDCS.2007.146"},{"key":"1777_CR29","doi-asserted-by":"crossref","unstructured":"Niu B, Zhu X Y, Li W H, Li H. EPcloak: An efficient and privacy-preserving spatial cloaking scheme for LBSs. In Proc. the 11th IEEE Int. Conf. Mobile Ad Hoc and Sensor Systems, October 2014, pp.398-406.","DOI":"10.1109\/MASS.2014.53"},{"key":"1777_CR30","doi-asserted-by":"crossref","unstructured":"Shao J, Lu R X, Lin X D. FINE: A fine-grained privacy-preserving location-based service framework for mobile devices. In Proc. IEEE INFOCOM, April 2014, pp.244-252.","DOI":"10.1109\/INFOCOM.2014.6847945"},{"key":"1777_CR31","doi-asserted-by":"crossref","unstructured":"Latha K, Jayanthi S, Elavenil V. KRUPTO: Supporting privacy against location dependent attacks in wireless sensor network. In Proc. Int. Conf. Communications and Signal Processing, April 2013, pp.908-912.","DOI":"10.1109\/iccsp.2013.6577188"},{"key":"1777_CR32","doi-asserted-by":"crossref","unstructured":"Shu T, Chen Y Y, Yang J, Williams A. Multi-lateral privacy-preserving localization in pervasive environments. In Proc. IEEE INFOCOM, April 27-May 2, 2014, pp.2319-2327.","DOI":"10.1109\/INFOCOM.2014.6848176"},{"key":"1777_CR33","doi-asserted-by":"crossref","unstructured":"Xing K, Wan Z G, Hu P F, Zhu H J, Wang Y P, Chen X, Wang Y, Huang L S. Mutual privacy-preserving regression modeling in participatory sensing. In Proc. IEEE INFOCOM, April 2013, pp.3039-3047.","DOI":"10.1109\/INFCOM.2013.6567116"},{"key":"1777_CR34","doi-asserted-by":"crossref","unstructured":"Shafiei H, Khonsari A, Derakhshi H, Mousavi P. Rateprivacy in wireless sensor networks. In Proc. IEEE Conf. Computer Communications Workshops, April 2013, pp.67-68.","DOI":"10.1109\/INFCOMW.2013.6970741"},{"key":"1777_CR35","doi-asserted-by":"crossref","unstructured":"Rana S S, Vaidya N H. A new \u2018Direction\u2019 for source location privacy in wireless sensor networks. In Proc. IEEE Global Communications Conf,, December 2012, pp.342-347.","DOI":"10.1109\/GLOCOM.2012.6503136"},{"key":"1777_CR36","doi-asserted-by":"crossref","unstructured":"Ren J, Li Y, Li T T. Providing source privacy in mobile ad hoc networks. In Proc. the 6th IEEE Int. Conf. Mobile Adhoc and Sensor Systems, October 2009, pp.332-341.","DOI":"10.1155\/2010\/534712"},{"key":"1777_CR37","doi-asserted-by":"crossref","unstructured":"Wang W, Zhang Q. A stochastic game for privacy preserving context sensing on mobile phone. In Proc. IEEE INFOCOM, April 27-May 2, 2014, pp.2328-2336.","DOI":"10.1109\/INFOCOM.2014.6848177"},{"key":"1777_CR38","doi-asserted-by":"crossref","unstructured":"Li Q H, Cao G H. Providing efficient privacyaware incentives for mobile sensing. In Proc. the 34th IEEE Int. Conf. Distributed Computing Systems, June 3-July 3, 2014, pp.208-217.","DOI":"10.1109\/ICDCS.2014.29"},{"key":"1777_CR39","doi-asserted-by":"crossref","unstructured":"Qiu F D, Wu F, Chen G H. SLICER: A slicing-based k-anonymous privacy preserving scheme for participatory sensing. In Proc. the 10th IEEE Int. Conf. Mobile Ad-Hoc and Sensor Systems, October 2013, pp.113-121.","DOI":"10.1109\/MASS.2013.33"},{"key":"1777_CR40","doi-asserted-by":"crossref","unstructured":"Yi Y Q, Li R, Chen F, Liu A X, Lin Y P. A digital watermarking approach to secure and precise range query processing in sensor networks. In Proc. IEEE INFOCOM, April 2013, pp.1950-1958.","DOI":"10.1109\/INFCOM.2013.6566995"},{"issue":"4","key":"1777_CR41","first-page":"299","volume":"7","author":"J Jose","year":"2013","unstructured":"Jose J, Princy M, Jose J. EPSDA: Energy efficient privacy preserving secure data aggregation for wireless sensor networks. International Journal of Security and Its Applications, 2013, 7(4): 299-316.","journal-title":"International Journal of Security and Its Applications"},{"key":"1777_CR42","doi-asserted-by":"crossref","unstructured":"Dutta R, Gupta S, Paul D. Energy efficient modified SPIN protocol with high security in wireless sensor networks using TOSSIM. In Proc. Int. Conf. Parallel Distributed and Grid Computing, December 2014, pp.290-294.","DOI":"10.1109\/PDGC.2014.7030758"},{"issue":"2","key":"1777_CR43","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1007\/s11390-016-1627-5","volume":"31","author":"Z Liu","year":"2016","unstructured":"Liu Z, Seo H, Kim H. A synthesis of multiprecision multiplication and squaring techniques for 8-bit sensor nodes: State-of-theart research and future challenges. Journal of Computer Science and Technology, 2016, 31(2): 284-299.","journal-title":"Journal of Computer Science and Technology"},{"key":"1777_CR44","doi-asserted-by":"crossref","unstructured":"Oliveira C A S, Pardalos P M. Mathematical Aspects of Network Routing Optimization. Springer, 2011.","DOI":"10.1007\/978-1-4614-0311-1"},{"issue":"1","key":"1777_CR45","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/272991.272995","volume":"8","author":"M Matsumoto","year":"1998","unstructured":"Matsumoto M, Nishimura T. Mersenne twister: A 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Trans. Modeling and Computer Simulation, 1998, 8(1): 3-30.","journal-title":"ACM Trans. Modeling and Computer Simulation"},{"issue":"6","key":"1777_CR46","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MWC.2004.1368897","volume":"11","author":"K Romer","year":"2004","unstructured":"Romer K, Mattern F. The design space of wireless sensor networks. IEEE Wireless Communications, 2004, 11(6): 54-61.","journal-title":"IEEE Wireless Communications"},{"key":"1777_CR47","doi-asserted-by":"crossref","unstructured":"Barad J, Kadhiwala B. DIST-LEACH: A deterministic key management scheme for securing cluster-based sensor networks. In Proc. Int. Conf. Advances in Engineering and Technology Research, August 2014.","DOI":"10.1109\/ICAETR.2014.7012949"},{"key":"1777_CR48","doi-asserted-by":"crossref","unstructured":"Anastasi G, Falchi A, Passarella A, Conti M, Gregori E. Performance measurements of motes sensor networks. In Proc. the 7th ACM Int. Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, October 2004, pp.174-181.","DOI":"10.1145\/1023663.1023695"},{"key":"1777_CR49","doi-asserted-by":"crossref","unstructured":"Xiao W C, Zhang H, Wen Q Y, Li W M. Passive RFID-supported source location privacy preservation against global eavesdroppers in WSN. In Proc. the 5th IEEE Int. Conf. Broadband Network & Multimedia Technology, November 2013, pp.289-293.","DOI":"10.1109\/ICBNMT.2013.6823959"},{"issue":"7","key":"1777_CR50","first-page":"76","volume":"107","author":"FJ Reh","year":"2005","unstructured":"Reh F J. Pareto\u2019s principle \u2014 The 80-20 rule. Business Credit, 2005, 107(7): 76.","journal-title":"Business Credit"},{"issue":"1","key":"1777_CR51","first-page":"17","volume":"75","author":"D Tudose","year":"2013","unstructured":"Tudose D, Gheorghe L, Tapus N. Radio transceiver consumption modeling for multi-hop wireless sensor networks. UPB Scientific Bulletin Series C, 2013, 75(1): 17-26.","journal-title":"UPB Scientific Bulletin Series C"},{"key":"1777_CR52","doi-asserted-by":"crossref","unstructured":"Fu W H, Wang X Y, Agrawal D P. Multisubnets selection and rate allocation in a heterogeneous wireless network. In Proc. the 7th IEEE Int. Conf. Mobile Adhoc and Sensor Systems, November 2010, pp.715-720.","DOI":"10.1109\/MASS.2010.5663804"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-017-1777-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T02:34:07Z","timestamp":1659494047000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-017-1777-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":52,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["1777"],"URL":"https:\/\/doi.org\/10.1007\/s11390-017-1777-0","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9]]}}}