{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:00:25Z","timestamp":1729663225112,"version":"3.28.0"},"reference-count":45,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/nas.2015.7255210","type":"proceedings-article","created":{"date-parts":[[2015,9,14]],"date-time":"2015-09-14T21:24:54Z","timestamp":1442265894000},"page":"158-166","source":"Crossref","is-referenced-by-count":2,"title":["MimiBS: Mimicking Base-Station to provide location privacy protection in wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Yawar","family":"Bangash","sequence":"first","affiliation":[]},{"family":"Lingfang Zeng","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Feng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0311-1"},{"key":"ref38","first-page":"174","article-title":"Performance measurements of motes sensor networks","author":"anastasi","year":"2014","journal-title":"7th ACM International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2013.33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2014.29"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848177"},{"key":"ref30","first-page":"332","article-title":"Providing source privacy in mobile ad hoc networks","author":"ren","year":"2009","journal-title":"IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICAETR.2014.7012949"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1368897"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/PDGC.2014.7030758"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566995"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2011.5928957"},{"journal-title":"Wikipedia","article-title":"Spectrum analyzer","year":"2014","key":"ref40"},{"key":"ref11","first-page":"842","article-title":"Using deceptive packets to increase basestation anonymity in wireless sensor network","author":"ebrahimi","year":"2011","journal-title":"Proc of the 7th International Wireless Communications and Mobile Computing Conference (IWCMC)"},{"key":"ref12","first-page":"1","article-title":"A protocol for sink location privacy protection in wireless sensor networks","author":"ying","year":"2011","journal-title":"Proc IEEE Global Telecommun Conf (GLOBECOM)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364762"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2010.5682341"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.227"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.31"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570742"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/945506.945507"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970741"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1922649.1922656"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567049"},{"article-title":"Lecture on wireless sensor networks","year":"2007","author":"schindelhauer","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI.2012.6158861"},{"key":"ref29","first-page":"342","article-title":"A new &#x2018;direction&#x2019; for source location privacy in wireless sensor networks'","author":"rana","year":"2012","journal-title":"Proc of the Globecom 2012 &#x2013; Ad Hoc and Sensor Networking Symposium"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"469","DOI":"10.3233\/JCS-2006-14505","article-title":"Unleashing public-key cryptography in wireless sensor networks","volume":"14","author":"lopez","year":"2006","journal-title":"Journal of Computer Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICISA.2010.5480564"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.16"},{"article-title":"Cse473 Introduction to computer networks","year":"2011","author":"jain","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.32"},{"journal-title":"Wireless Sensor Network Security Andreas Hermann","year":"2012","author":"lopez","key":"ref1"},{"journal-title":"Wikipedia","article-title":"Shortest path problem","year":"2014","key":"ref20"},{"journal-title":"Wikipedia","article-title":"Propagation delay","year":"2014","key":"ref45"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2014.53"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.146"},{"key":"ref42","first-page":"76","article-title":"Pareto's principle-the 80&#x2013;20 rule","volume":"107","author":"reh","year":"2005","journal-title":"Business Credit"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/iccsp.2013.6577188"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICBNMT.2013.6823959"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847945"},{"journal-title":"Wikipedia","article-title":"Queuing delay","year":"2014","key":"ref44"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567116"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2010.5663804"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848176"}],"event":{"name":"2015 IEEE International Conference on Networking, Architecture and Storage (NAS)","start":{"date-parts":[[2015,8,6]]},"location":"Boston, MA, USA","end":{"date-parts":[[2015,8,7]]}},"container-title":["2015 IEEE International Conference on Networking, Architecture and Storage (NAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7235962\/7255186\/07255210.pdf?arnumber=7255210","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T14:28:30Z","timestamp":1567175310000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7255210\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/nas.2015.7255210","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}