{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:53Z","timestamp":1740141833546,"version":"3.37.3"},"reference-count":49,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2015,5,1]],"date-time":"2015-05-01T00:00:00Z","timestamp":1430438400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"Important National Science & Technology Specific Projects of the Ministry of Science and Technology of China","award":["2013ZX03006001","NCET-11-0593","SQ2015AA0102085","61471064"],"award-info":[{"award-number":["2013ZX03006001","NCET-11-0593","SQ2015AA0102085","61471064"]}]},{"name":"New Century Excellent Talents in University","award":["2013ZX03006001","NCET-11-0593","SQ2015AA0102085","61471064"],"award-info":[{"award-number":["2013ZX03006001","NCET-11-0593","SQ2015AA0102085","61471064"]}]},{"name":"National High Technology Research and Development Program of China","award":["2013ZX03006001","NCET-11-0593","SQ2015AA0102085","61471064"],"award-info":[{"award-number":["2013ZX03006001","NCET-11-0593","SQ2015AA0102085","61471064"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2013ZX03006001","NCET-11-0593","SQ2015AA0102085","61471064"],"award-info":[{"award-number":["2013ZX03006001","NCET-11-0593","SQ2015AA0102085","61471064"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,5,1]]},"abstract":"<jats:p> To derive the critical density for exposure-path prevention in three-dimensional wireless sensor networks (3D WSNs), a bond-percolation-based scheme is proposed, which can generate the tighter lower and upper bounds of critical density. Firstly, the exposure-path prevention problem and system models based on Gaussian distribution are introduced in this paper. Then, according to percolation theory, we present a bond-percolation model to put this problem into a 3D uniform lattice. With this model, the lower and upper bounds of critical density for 3D WSNs are derived in the light of our scheme. Extensive simulations and contrast experiments also validate our developed models and evaluate the performance of the proposed schemes. Therefore, our scheme can be applied to determine a practically reliable density and detect intruders in sensor networks. <\/jats:p>","DOI":"10.1155\/2015\/738974","type":"journal-article","created":{"date-parts":[[2015,5,11]],"date-time":"2015-05-11T21:07:59Z","timestamp":1431378479000},"page":"738974","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["Critical Density for Exposure-Path Prevention in Three-Dimensional Wireless Sensor Networks Using Percolation Theory"],"prefix":"10.1177","volume":"11","author":[{"given":"Guixia","family":"Kang","sequence":"first","affiliation":[{"name":"Key Laboratory of Universal Wireless Communication, Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5473-6852","authenticated-orcid":false,"given":"Xiaoshuang","family":"Liu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Universal Wireless Communication, Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Ningbo","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Universal Wireless Communication, Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Yanyan","family":"Guo","sequence":"additional","affiliation":[{"name":"Key Laboratory of Universal Wireless Communication, Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5814-9156","authenticated-orcid":false,"given":"Fabrice","family":"Labeau","sequence":"additional","affiliation":[{"name":"Key Laboratory of Universal Wireless Communication, Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]}],"member":"179","published-online":{"date-parts":[[2015,5,11]]},"reference":[{"doi-asserted-by":"publisher","key":"B1-2015-738974","DOI":"10.1145\/2594773"},{"doi-asserted-by":"publisher","key":"B2-2015-738974","DOI":"10.4028\/http:\/\/www.scientific.net\/amm.519-520.1262"},{"doi-asserted-by":"publisher","key":"B3-2015-738974","DOI":"10.1145\/1978802.1978811"},{"doi-asserted-by":"publisher","key":"B4-2015-738974","DOI":"10.1109\/TVT.2014.2300181"},{"doi-asserted-by":"publisher","key":"B5-2015-738974","DOI":"10.1007\/978-3-319-04648-8_1"},{"doi-asserted-by":"publisher","key":"B6-2015-738974","DOI":"10.1109\/TPDS.2012.105"},{"doi-asserted-by":"publisher","key":"B7-2015-738974","DOI":"10.4304\/jnw.5.9."},{"doi-asserted-by":"publisher","key":"B8-2015-738974","DOI":"10.1002\/bem.21762"},{"doi-asserted-by":"publisher","key":"B9-2015-738974","DOI":"10.1007\/978-1-4899-2730-9"},{"doi-asserted-by":"publisher","key":"B10-2015-738974","DOI":"10.1007\/978-3-662-03981-6_1"},{"doi-asserted-by":"publisher","key":"B11-2015-738974","DOI":"10.1007\/978-3-319-03771-4"},{"doi-asserted-by":"publisher","key":"B12-2015-738974","DOI":"10.1017\/S0305004100032680"},{"volume-title":"Introduction to Percolation Theory","year":"1991","author":"Stauffer D.","key":"B13-2015-738974"},{"volume-title":"Proceedings of the 14th ACM International Conference on Mobile Computing and Networking (MOBICOM '08)","author":"Xing F.","first-page":"175","key":"B14-2015-738974"},{"doi-asserted-by":"publisher","key":"B15-2015-738974","DOI":"10.1103\/physreve.86.061109"},{"doi-asserted-by":"publisher","key":"B16-2015-738974","DOI":"10.1109\/twc.2013.021213.112130"},{"issue":"1","key":"B17-2015-738974","first-page":"240","volume":"163","author":"Liang J.","year":"2014","journal-title":"Sensors & Transducers Journal"},{"doi-asserted-by":"publisher","key":"B18-2015-738974","DOI":"10.1145\/2632149"},{"doi-asserted-by":"publisher","key":"B19-2015-738974","DOI":"10.1109\/tmc.2013.129"},{"doi-asserted-by":"publisher","key":"B20-2015-738974","DOI":"10.1109\/icdcsw.2011.47"},{"volume-title":"Proceedings of the 7th Annual International Conference on Mobile Computing and Networking","author":"Meguerdichian S.","first-page":"139","key":"B21-2015-738974"},{"doi-asserted-by":"publisher","key":"B22-2015-738974","DOI":"10.1023\/a:1016586011473"},{"volume-title":"Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys '03)","author":"Veltri G.","first-page":"40","key":"B23-2015-738974"},{"doi-asserted-by":"publisher","key":"B24-2015-738974","DOI":"10.1007\/11599463_6"},{"key":"B25-2015-738974","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/978-3-540-73090-3_20","volume-title":"Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS '07)","volume":"4549","author":"Djidjev H."},{"doi-asserted-by":"publisher","key":"B26-2015-738974","DOI":"10.1145\/1807048.1807052"},{"doi-asserted-by":"publisher","key":"B27-2015-738974","DOI":"10.1109\/robot.2010.5509193"},{"doi-asserted-by":"publisher","key":"B28-2015-738974","DOI":"10.1109\/infcom.2012.6195492"},{"doi-asserted-by":"publisher","key":"B29-2015-738974","DOI":"10.1109\/JSEN.2013.2267554"},{"doi-asserted-by":"publisher","key":"B30-2015-738974","DOI":"10.1137\/0109045"},{"doi-asserted-by":"publisher","key":"B31-2015-738974","DOI":"10.1214\/aoap\/1034625335"},{"volume-title":"Proceedings of the Stochastic Analysis, Control, Optimization and Applications","author":"Gupta P.","first-page":"657","key":"B32-2015-738974"},{"doi-asserted-by":"publisher","key":"B33-2015-738974","DOI":"10.1239\/aap\/1037990948"},{"doi-asserted-by":"publisher","key":"B34-2015-738974","DOI":"10.1214\/aoap\/1050689601"},{"doi-asserted-by":"publisher","key":"B35-2015-738974","DOI":"10.1016\/s0378-4371(03)00249-8"},{"volume-title":"Proceedings of the IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (MASS '04)","author":"Liu B.","first-page":"475","key":"B36-2015-738974"},{"doi-asserted-by":"publisher","key":"B37-2015-738974","DOI":"10.1109\/infcom.2005.1497903"},{"doi-asserted-by":"publisher","key":"B38-2015-738974","DOI":"10.1109\/TPDS.2008.146"},{"doi-asserted-by":"publisher","key":"B39-2015-738974","DOI":"10.1007\/978-3-642-41674-3_123"},{"doi-asserted-by":"publisher","key":"B40-2015-738974","DOI":"10.1109\/jsen.2014.2319451"},{"doi-asserted-by":"publisher","key":"B41-2015-738974","DOI":"10.1109\/incos.2013.65"},{"doi-asserted-by":"publisher","key":"B42-2015-738974","DOI":"10.1002\/cpe.3406"},{"doi-asserted-by":"publisher","key":"B43-2015-738974","DOI":"10.1017\/CBO9780511895357"},{"doi-asserted-by":"publisher","key":"B44-2015-738974","DOI":"10.1038\/nmat3172"},{"doi-asserted-by":"publisher","key":"B45-2015-738974","DOI":"10.1016\/0030-4018(92)90184-s"},{"doi-asserted-by":"publisher","key":"B46-2015-738974","DOI":"10.1214\/aop\/1176992809"},{"doi-asserted-by":"publisher","key":"B47-2015-738974","DOI":"10.1007\/bf01197577"},{"volume-title":"Elements of Information Theory","year":"2012","author":"Cover T. M.","key":"B48-2015-738974"},{"doi-asserted-by":"publisher","key":"B49-2015-738974","DOI":"10.1109\/INFCOM.2009.5062233"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/738974","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/738974","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/738974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T21:50:23Z","timestamp":1620251423000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/738974"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,1]]},"references-count":49,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,5,1]]}},"alternative-id":["10.1155\/2015\/738974"],"URL":"https:\/\/doi.org\/10.1155\/2015\/738974","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2015,5,1]]}}}