{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:25Z","timestamp":1740141805913,"version":"3.37.3"},"reference-count":8,"publisher":"SAGE Publications","issue":"8","license":[{"start":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T00:00:00Z","timestamp":1375315200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,8,1]]},"abstract":"<jats:p> Recently, wireless sensor networks (WSNs) technologies have been utilized in diverse domains. Areas where WSNs are applied have been expanded from industries, schools, and research institutes to all fields of the human society. However, WSNs should be fixed or flexible depending on the areas of application and monitoring situations. Furthermore, measures for the security of data sensed when sensor nodes communicate with each other are not perfect, so sensors are sometimes easily attacked, and the security measures cover neither cases where sensors receive wrong information nor cases where attacks on external sensor nodes are sensed. Therefore, this paper provides the GML that can be mapped on actual topography so that optimum coverage can be inferred and can set target areas for two situations: mobile sensor networks (MSNs) and fixed sensor networks (FSNs). Sensors can be efficiently arranged through this sensor node information, and when the sensors have been arranged, security simulation functions applied with data encryption for data transmission between sensor nodes are provided. This paper also proposes an external detection trace simulator (EDTS) that would make sensing data transmitted between sensors visually provide information on the sensing of external attacks. <\/jats:p>","DOI":"10.1155\/2013\/502082","type":"journal-article","created":{"date-parts":[[2013,8,24]],"date-time":"2013-08-24T21:01:38Z","timestamp":1377378098000},"page":"502082","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Visual Scheme for the Detection of Mobile Attack on WSN Simulator"],"prefix":"10.1177","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7421-1105","authenticated-orcid":false,"given":"Young-Sik","family":"Jeong","sequence":"first","affiliation":[{"name":"Department of Multimedia Engineering, Dongguk University, 30 Pildong-ro 1 Gil, Jung-Gu, Seoul 100-715, Republic of Korea"}]},{"given":"Hyun-Woo","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Multimedia Engineering, Dongguk University, 30 Pildong-ro 1 Gil, Jung-Gu, Seoul 100-715, Republic of Korea"}]},{"given":"Jong Hyuk","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul 139-743, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2013,8,6]]},"reference":[{"first-page":"473","volume-title":"Proceedings of the 3rd International Conference on Simulation of Adaptive Behavior","author":"Arkin R.","key":"B1-2013-502082"},{"issue":"1","key":"B2-2013-502082","first-page":"5","volume":"3","author":"Zhou X.","year":"2012","journal-title":"Journal of Convergence"},{"key":"B3-2013-502082","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2012.8.1.001"},{"issue":"5","key":"B4-2013-502082","first-page":"1","volume":"2","author":"Silas S.","year":"2012","journal-title":"Human-Centric Computing and Information Sciences"},{"first-page":"145","volume-title":"Proceedings of the 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (IEEE SECON '04)","author":"Polley J.","key":"B7-2013-502082"},{"volume-title":"Proceedings of the USENIX Technical Conference","author":"Girod L.","key":"B10-2013-502082"},{"first-page":"126","volume-title":"Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys '03)","author":"Levis P.","key":"B11-2013-502082"},{"key":"B13-2013-502082","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440978"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/502082","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/502082","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/502082","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T20:25:30Z","timestamp":1621196730000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/502082"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,1]]},"references-count":8,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2013,8,1]]}},"alternative-id":["10.1155\/2013\/502082"],"URL":"https:\/\/doi.org\/10.1155\/2013\/502082","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,8,1]]}}}