{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T15:54:49Z","timestamp":1771602889381,"version":"3.50.1"},"reference-count":38,"publisher":"SAGE Publications","issue":"8","license":[{"start":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T00:00:00Z","timestamp":1375315200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"Macao Science and Technology","award":["036\/2011\/A"],"award-info":[{"award-number":["036\/2011\/A"]}]},{"name":"Macao Science and Technology","award":["081\/2012\/A3"],"award-info":[{"award-number":["081\/2012\/A3"]}]},{"name":"Macao Science and Technology","award":["036\/2011\/A"],"award-info":[{"award-number":["036\/2011\/A"]}]},{"name":"Macao Science and Technology","award":["081\/2012\/A3"],"award-info":[{"award-number":["081\/2012\/A3"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,8,1]]},"abstract":"<jats:p> The eavesdropping attack is a serious security threat to a wireless sensor network (WSN) since the eavesdropping attack is a prerequisite for other attacks. Conventional WSNs consist of wireless nodes equipped with omnidirectional antennas, which broadcast radio signals in all directions and are consequently prone to the eavesdropping attacks. Different from omnidirectional antennas, directional antennas radiate radio signals on desired directions and potentially reduce the possibility of the eavesdropping attacks. In this paper, we propose a model to analyze the eavesdropping probability in both single-hop WSNs and multihop WSNs with omnidirectional antennas and directional antennas. We verify the correctness of our analytical model by conducting extensive simulations. We have found that using directional antennas in either single-hop WSNs or multihop WSNs can significantly reduce the eavesdropping probability. The reason of the improved security of WSNs with directional antennas lies in (i) the smaller exposure region of a directional antenna and (ii) the fewer hops to route a packet due to the longer transmission range of a directional antenna. Our results have also shown that the security improvement factor heavily depends on the node density, the antenna beamwidth, and the signal path loss factor. <\/jats:p>","DOI":"10.1155\/2013\/760834","type":"journal-article","created":{"date-parts":[[2013,8,29]],"date-time":"2013-08-29T21:01:56Z","timestamp":1377810116000},"page":"760834","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":50,"title":["On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas"],"prefix":"10.1177","volume":"9","author":[{"given":"Hong-Ning","family":"Dai","sequence":"first","affiliation":[{"name":"Faculty of Information Technology, Macau University of Science and Technology, Avenida Wai Long, Taipa, Macau"}]},{"given":"Qiu","family":"Wang","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Macau University of Science and Technology, Avenida Wai Long, Taipa, Macau"}]},{"given":"Dong","family":"Li","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Macau University of Science and Technology, Avenida Wai Long, Taipa, Macau"}]},{"given":"Raymond Chi-Wing","family":"Wong","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong"}]}],"member":"179","published-online":{"date-parts":[[2013,8,29]]},"reference":[{"key":"B1-2013-760834","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"B2-2013-760834","doi-asserted-by":"publisher","DOI":"10.1002\/0470118474"},{"key":"B3-2013-760834","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2006.288535"},{"key":"B4-2013-760834","doi-asserted-by":"publisher","DOI":"10.1145\/1080885.1080887"},{"key":"B5-2013-760834","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2007.02.003"},{"key":"B6-2013-760834","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778429"},{"key":"B7-2013-760834","first-page":"48","volume-title":"Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom '02)","author":"Bao L."},{"key":"B8-2013-760834","first-page":"98","volume-title":"Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '03)","author":"Korakis T."},{"key":"B9-2013-760834","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2005.1495049"},{"key":"B10-2013-760834","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2007.112"},{"key":"B11-2013-760834","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062251"},{"key":"B12-2013-760834","doi-asserted-by":"publisher","DOI":"10.1145\/501426.501430"},{"key":"B13-2013-760834","volume-title":"Wireless Communications: Principles and Practice","author":"Rappaport T. S.","year":"2002","edition":"2"},{"key":"B14-2013-760834","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2004.07.012"},{"key":"B15-2013-760834","volume-title":"Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04)","author":"El Gamal A."},{"key":"B16-2013-760834","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/47.4.432"},{"key":"B17-2013-760834","volume-title":"Introduction to Algorithms","author":"Cormen T. H.","year":"2009","edition":"3"},{"key":"B18-2013-760834","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/167575"},{"key":"B19-2013-760834","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/374796"},{"key":"B20-2013-760834","first-page":"19","volume":"5","author":"Meghanathan N.","year":"2013","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"B21-2013-760834","doi-asserted-by":"publisher","DOI":"10.1109\/18.825799"},{"key":"B22-2013-760834","first-page":"348","volume-title":"Proceedings of the IEEE International Conference on Communications (ICC '03)","author":"Spyropoulos A."},{"key":"B23-2013-760834","doi-asserted-by":"publisher","DOI":"10.1145\/1215976.1215985"},{"key":"B24-2013-760834","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2009.5416826"},{"key":"B25-2013-760834","first-page":"13","volume-title":"Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '00)","volume":"1","author":"Ko Y. B."},{"key":"B26-2013-760834","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2000.904804"},{"key":"B27-2013-760834","first-page":"183","volume-title":"Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '02)","author":"Takai M."},{"key":"B28-2013-760834","first-page":"59","volume-title":"Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom '02)","author":"Choudhury R. R."},{"key":"B29-2013-760834","first-page":"1233","volume-title":"Proceedings of the MILCOM","volume":"2","author":"Huang Z."},{"key":"B30-2013-760834","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2004.1348118"},{"key":"B31-2013-760834","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2005.1578449"},{"key":"B32-2013-760834","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.429"},{"key":"B33-2013-760834","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.255721"},{"key":"B34-2013-760834","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-008-0102-9"},{"key":"B35-2013-760834","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.942"},{"key":"B36-2013-760834","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592589"},{"key":"B37-2013-760834","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1206-9"},{"key":"B38-2013-760834","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753607"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/760834","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/760834","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/760834","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T20:27:30Z","timestamp":1621196850000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/760834"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,1]]},"references-count":38,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2013,8,1]]}},"alternative-id":["10.1155\/2013\/760834"],"URL":"https:\/\/doi.org\/10.1155\/2013\/760834","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,1]]}}}