{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:56Z","timestamp":1740141836801,"version":"3.37.3"},"reference-count":27,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2013,4,1]],"date-time":"2013-04-01T00:00:00Z","timestamp":1364774400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100002822","name":"Central South University","doi-asserted-by":"publisher","award":["12MX15"],"award-info":[{"award-number":["12MX15"]}],"id":[{"id":"10.13039\/501100002822","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,4,1]]},"abstract":"<jats:p> While many protocols for sensor network security provide confidentiality for message content, contextual information usually remains exposed, which can be critical to the mission of the sensor network. In this paper, we propose an energy-efficient cyclic diversionary routing (CDR) scheme against global eavesdroppers for preserving location privacy and maximizing lifetime of wireless sensor networks (WSNs). To ensure no impact on lifetime of WSNs, we minimize the energy consumption of hotspots and generate abundant diversionary routing paths in areas far from sink. To enhance the location privacy preservation, we theoretically figure out the probability of the cyclic interference routings in different areas of the network and statistically achieve an energy consumption balance in the entire network. Analysis and simulation results show that CDR significantly improves the security in source-location privacy preservation without reducing the network lifetime. <\/jats:p>","DOI":"10.1155\/2013\/834245","type":"journal-article","created":{"date-parts":[[2013,4,11]],"date-time":"2013-04-11T21:02:02Z","timestamp":1365714122000},"page":"834245","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":17,"title":["An Energy-Efficient Cyclic Diversionary Routing Strategy against Global Eavesdroppers in Wireless Sensor Networks"],"prefix":"10.1177","volume":"9","author":[{"given":"Ju","family":"Ren","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering, Central South University, Changsha 410083, China"}]},{"given":"Yaoxue","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Central South University, Changsha 410083, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7231-8315","authenticated-orcid":false,"given":"Kang","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Central South University, Changsha 410083, China"}]}],"member":"179","published-online":{"date-parts":[[2013,4,9]]},"reference":[{"key":"B1-2013-834245","doi-asserted-by":"publisher","DOI":"10.1109\/T-WC.2008.07418"},{"key":"B2-2013-834245","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.08.008"},{"key":"B3-2013-834245","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr010"},{"key":"B4-2013-834245","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462096"},{"key":"B5-2013-834245","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.02.002"},{"key":"B6-2013-834245","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.36"},{"key":"B7-2013-834245","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.01.023"},{"key":"B8-2013-834245","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.12.037"},{"key":"B9-2013-834245","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2012.06.005"},{"key":"B10-2013-834245","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990707"},{"key":"B11-2013-834245","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"B12-2013-834245","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2205284"},{"first-page":"599","volume-title":"Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS '05)","author":"Kamat P.","key":"B13-2013-834245"},{"first-page":"215","volume-title":"Proceedings of the Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet (NETWORKING '07)","author":"Armenia S.","key":"B14-2013-834245"},{"key":"B15-2013-834245","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2006.40"},{"key":"B16-2013-834245","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029117"},{"key":"B17-2013-834245","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2007.4375862"},{"key":"B18-2013-834245","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352547"},{"key":"B19-2013-834245","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.010311.101885"},{"key":"B20-2013-834245","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2011.01.001"},{"key":"B21-2013-834245","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1404592"},{"key":"B22-2013-834245","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2004.41"},{"key":"B23-2013-834245","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00047-7"},{"key":"B24-2013-834245","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.918730"},{"key":"B25-2013-834245","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11723-7_4"},{"key":"B26-2013-834245","doi-asserted-by":"publisher","DOI":"10.1109\/CECNet.2012.6201768"},{"key":"B27-2013-834245","doi-asserted-by":"publisher","DOI":"10.1109\/RAIT.2012.6194436"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/834245","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/834245","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/834245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T21:56:38Z","timestamp":1621202198000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/834245"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,1]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,4,1]]}},"alternative-id":["10.1155\/2013\/834245"],"URL":"https:\/\/doi.org\/10.1155\/2013\/834245","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,4,1]]}}}