{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:17:21Z","timestamp":1729639041746,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/nas.2016.7549407","type":"proceedings-article","created":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T20:57:17Z","timestamp":1472158637000},"page":"1-10","source":"Crossref","is-referenced-by-count":2,"title":["Lpsdn: Sink-Node Location Privacy in WSNs via SDN Approach"],"prefix":"10.1109","author":[{"given":"Yawar","family":"Bangash","sequence":"first","affiliation":[]},{"given":"Lingfang","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Shijun","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Feng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660353"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2223531"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2011.2171269"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833039"},{"key":"ref37","first-page":"17","article-title":"Radio transceiver consumption modeling for multi-hop wireless sensor networks","volume":"75","author":"tudose","year":"2013","journal-title":"UPB Scientific Bulletin Series D"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/272991.272995"},{"year":"0","key":"ref35","article-title":"CC2530 second generation System-on-Chip solution for 2.4 GHz IEEE 802.15.4\/RF4CE\/ZigBee"},{"key":"ref34","article-title":"Pareto's principle-the 80-20 rule","volume":"107","author":"john reh","year":"2005","journal-title":"Business Credit"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.227"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICISA.2010.5480564"},{"key":"ref12","first-page":"1","article-title":"A protocol for sink location privacy protection in wireless sensor networks","author":"ying","year":"2011","journal-title":"Proc IEEE Global Telecommun Conf (GLOBECOM)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2011.5928957"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.092812.121712"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2010.0825"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714612"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2326417"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516684"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2332817"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2642897"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5572.001.0001","author":"diffie","year":"2007","journal-title":"Privacy on the Line The Politics of Wiretapping and Encryption"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2489253.2489267"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2014.6937317"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221956"},{"key":"ref8","first-page":"842","article-title":"Using deceptive packets to increase basestation anonymity in wireless sensor network","author":"ebrahimi","year":"2011","journal-title":"Proc of the 7th International Wireless Communicationsand Mobile Computing Conference (IWCMC)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462112"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.011413.00118"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364762"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2655690"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.16"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.227"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/874047"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2012.12"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2684793.2684797"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LATINCOM.2014.7041885"}],"event":{"name":"2016 IEEE International Conference on Networking, Architecture and Storage (NAS)","start":{"date-parts":[[2016,8,8]]},"location":"Long Beach, CA, USA","end":{"date-parts":[[2016,8,10]]}},"container-title":["2016 IEEE International Conference on Networking, Architecture and Storage (NAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7548533\/7549376\/07549407.pdf?arnumber=7549407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T23:39:08Z","timestamp":1568331548000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7549407\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/nas.2016.7549407","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}