{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T18:37:56Z","timestamp":1769020676938,"version":"3.49.0"},"reference-count":36,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T00:00:00Z","timestamp":1495756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61379110, 61073104, 61572528, 61272494 and 61572528"],"award-info":[{"award-number":["61379110, 61073104, 61572528, 61272494 and 61572528"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"The National Basic Research Program of China","award":["2014CB046305"],"award-info":[{"award-number":["2014CB046305"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2017,8,31]]},"abstract":"<jats:p>A Semi Random Circle routing for mobile Sink joint Ray Routing for data (SRCRR) scheme is proposed for preserving sink-location privacy with a delay guaranteed. In the SRCRR scheme, the data are directionally routed along ray paths and stored at intermediate nodes probabilistically. The Sink moves in a semirandom circular pattern to collect data from the local nodes occasionally, which guarantees that the data will be collected with an acceptable delay and prevents attackers from predicting their locations and movements. The experimental results indicate that the performance of the SRCRR scheme is better than that of the previous schemes.<\/jats:p>","DOI":"10.1145\/2990500","type":"journal-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T19:32:40Z","timestamp":1496259160000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Preserving Smart Sink-Location Privacy with Delay Guaranteed Routing Scheme for WSNs"],"prefix":"10.1145","volume":"16","author":[{"given":"Anfeng","family":"Liu","sequence":"first","affiliation":[{"name":"Central South University, ChangSha, China"}]},{"given":"Xiao","family":"Liu","sequence":"additional","affiliation":[{"name":"Central South University, ChangSha, China"}]},{"given":"Zhipeng","family":"Tang","sequence":"additional","affiliation":[{"name":"Central South University, ChangSha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7986-4244","authenticated-orcid":false,"given":"Laurence T.","family":"Yang","sequence":"additional","affiliation":[{"name":"St. Francis Xavier University, Antigonish, NS, Canada"}]},{"given":"Zili","family":"Shao","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2017,5,26]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.010311.101885"},{"key":"e_1_2_1_2_1","doi-asserted-by":"crossref","unstructured":"G. F. Chai M. Xu W. Y. Xu and Z. Y. Lin. 2012. Enhancing sink-location privacy in wireless sensor networks through k-anonymity. International Journal of Distributed Sensor Networks.  G. F. Chai M. Xu W. Y. Xu and Z. Y. Lin. 2012. Enhancing sink-location privacy in wireless sensor networks through k-anonymity. International Journal of Distributed Sensor Networks.","DOI":"10.1155\/2012\/648058"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0501-0"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2188689"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2517405"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7224727"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.193"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2680539"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2014.2321571"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2308391"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxu134"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.145"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/T-WC.2008.070182"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.31"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2011.01.001"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2442116.2442132"},{"key":"e_1_2_1_17_1","unstructured":"X. Liu M. Dong K. Ota L. T. Yang and A. Liu. 2016a. Trace malicious source to guarantee cyber security for mass monitor critical infrastructure. Journal of Computer and System Sciences. 2016.  X. Liu M. Dong K. Ota L. T. Yang and A. Liu. 2016a. Trace malicious source to guarantee cyber security for mass monitor critical infrastructure. Journal of Computer and System Sciences. 2016."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2449314"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.009"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1179"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2570740"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.09.005"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-011-0403-2"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2332817"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.302"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of IEEE International Conference on Network Protocols (ICNP\u201907)","author":"Mehta K.","unstructured":"K. Mehta , D. Liu , and M. Wright . 2007. Location privacy in sensor networks against a global eavesdropper . In Proceedings of IEEE International Conference on Network Protocols (ICNP\u201907) , 314--323. K. Mehta, D. Liu, and M. Wright. 2007. Location privacy in sensor networks against a global eavesdropper. In Proceedings of IEEE International Conference on Network Protocols (ICNP\u201907), 314--323."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-013-0443-1"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-012-0454-z"},{"key":"e_1_2_1_29_1","unstructured":"OMNeT++ simulator. 2013. Homepage. Retrieved from http:\/\/www.omnetpp.org\/>.  OMNeT++ simulator. 2013. Homepage. Retrieved from http:\/\/www.omnetpp.org\/>."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2010.0825"},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of IEEE INFOCOM","author":"Shao M.","year":"2008","unstructured":"M. Shao , Y. Yang , S. Zhu , and G. H. Cao . 2008. Towards statistically strong source anonymity for sensor networks . In Proceedings of IEEE INFOCOM 2008 , 51--55. M. Shao, Y. Yang, S. Zhu, and G. H. Cao. 2008. Towards statistically strong source anonymity for sensor networks. In Proceedings of IEEE INFOCOM 2008, 51--55."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.12.003"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.02.002"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3428-0"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352547"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.31"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2990500","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2990500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:15:24Z","timestamp":1750281324000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2990500"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,26]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,8,31]]}},"alternative-id":["10.1145\/2990500"],"URL":"https:\/\/doi.org\/10.1145\/2990500","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"value":"1539-9087","type":"print"},{"value":"1558-3465","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,26]]},"assertion":[{"value":"2015-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-05-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}