{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:19:04Z","timestamp":1761401944352,"version":"3.41.2"},"reference-count":20,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T00:00:00Z","timestamp":1530057600000},"content-version":"vor","delay-in-days":177,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672269"],"award-info":[{"award-number":["61672269"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>In wireless sensor networks (WSNs), data provenance records the data source and the forwarding and the aggregating information of a packet on its way to the base station (BS). To conserve the energy and wireless communication bandwidth, the provenances are compressed at each node along the packet path. To perform the provenances compression in resource\u2010tightened WSNs, we present a cluster\u2010based arithmetic coding method which not only has a higher compression rate but also can encode and decode the provenance in an incremental manner; i.e., the provenance can be zoomed in and out like Google Maps. Such a decoding method raises the efficiencies of the provenance decoding and the data trust assessment. Furthermore, the relationship between the clustering size and the provenance size is formally analyzed, and then the optimal clustering size is derived as a mathematical function of the WSN\u2019s size. Both the simulation and the test\u2010bed experimental results show that our scheme outperforms the known arithmetic coding based provenance compression schemes with respect to the average provenance size, the energy consumption, and the communication bandwidth consumption.<\/jats:p>","DOI":"10.1155\/2018\/9576978","type":"journal-article","created":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T23:42:48Z","timestamp":1530142968000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Cluster\u2010Based Arithmetic Coding for Data Provenance Compression in Wireless Sensor Networks"],"prefix":"10.1155","volume":"2018","author":[{"given":"Qinbao","family":"Xu","sequence":"first","affiliation":[]},{"given":"Rizwan","family":"Akhtar","sequence":"additional","affiliation":[]},{"given":"Xing","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7024-4559","authenticated-orcid":false,"given":"Changda","family":"Wang","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,6,27]]},"reference":[{"key":"e_1_2_14_1_2","doi-asserted-by":"crossref","unstructured":"HussainS. R. WangC. SultanaS. andBertinoE. Secure data provenance compression using arithmetic coding in wireless sensor networks Proceedings of the 2014 IEEE International Performance Computing and Communications Conference (IPCCC) December 2014 Austin TX USA 1\u201310 https:\/\/doi.org\/10.1109\/PCCC.2014.7017068.","DOI":"10.1109\/PCCC.2014.7017068"},{"key":"e_1_2_14_2_2","doi-asserted-by":"crossref","unstructured":"LimH. S. MoonY. S. andBertinoE. Provenance-based trustworthiness assessment in sensor networks Proceedings of the 7th International Workshop on Data Management for Sensor Networks 2010 ACM 2\u20137 https:\/\/doi.org\/10.1145\/1858158.1858162.","DOI":"10.1145\/1858158.1858162"},{"key":"e_1_2_14_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.06.003"},{"key":"e_1_2_14_4_2","doi-asserted-by":"crossref","unstructured":"ZhuoW. FeiQ. NarayanA. HaeberlenA. LooB. andSherrM. Secure Network Provenance Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011 https:\/\/doi.org\/10.1145\/2043556.20435841.","DOI":"10.1145\/2043556.2043584"},{"key":"e_1_2_14_5_2","doi-asserted-by":"crossref","unstructured":"ZhouW. SherrM. TaoT.et al. Efficient querying and maintenance of network provenance at internet-scale Proceedings of the ACM SIGMOD International Conference on Management of data 2010 ACM 615\u2013626 https:\/\/doi.org\/10.1145\/1807167.1807234.","DOI":"10.1145\/1807167.1807234"},{"key":"e_1_2_14_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.910594"},{"key":"e_1_2_14_7_2","doi-asserted-by":"crossref","unstructured":"AlamS. M. I.andFahmyS. Energy-efficient provenance transmission in large-scale wireless sensor networks Proceedings of the IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks WoWMoM \u203211 2011 IEEE 1\u20136 https:\/\/doi.org\/10.1109\/WoWMoM.2011.5986127.","DOI":"10.1109\/WoWMoM.2011.5986127"},{"key":"e_1_2_14_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2013.44"},{"key":"e_1_2_14_9_2","doi-asserted-by":"crossref","unstructured":"ShebaroB. SultanaS. GopavaramS. R.et al. Demonstrating a lightweight data provenance for sensor networks Proceedings of the ACM conference on Computer and communications security 2012 ACM 1022\u20131024 https:\/\/doi.org\/10.1145\/2382196.2382312.","DOI":"10.1145\/2382196.2382312"},{"key":"e_1_2_14_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2402156"},{"key":"e_1_2_14_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/2997653"},{"key":"e_1_2_14_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056143"},{"key":"e_1_2_14_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055714"},{"key":"e_1_2_14_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055934"},{"key":"e_1_2_14_15_2","doi-asserted-by":"crossref","unstructured":"ArtigasX. MalinowskiS. GuillemotC. andTorresL. Overlapped quasi-arithmetic codes for distributed video coding Proceedings of the 14th IEEE International Conference on Image Processing ICIP 2007 September 2007 usa II9\u2013II12 2-s2.0-48149101991.","DOI":"10.1109\/ICIP.2007.4379079"},{"key":"e_1_2_14_16_2","doi-asserted-by":"crossref","unstructured":"BandyopadhyayS.andCoyleE. J. An energy efficient hierarchical clustering algorithm for wireless sensor networks 3 Proceedings of the IEEE Societies 22nd Annual Joint Conference of the IEEE Computer and Communications (INFOCOM \u203203) March-April 2003 1713\u20131723 https:\/\/doi.org\/10.1109\/INFCOM.2003.1209194.","DOI":"10.1109\/INFCOM.2003.1209194"},{"key":"e_1_2_14_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844142"},{"key":"e_1_2_14_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/5.286189"},{"key":"e_1_2_14_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/214762.214771"},{"key":"e_1_2_14_20_2","first-page":"1","article-title":"The case of the fake picasso: preventing history forgery with secure provenance","volume":"9","author":"Hasan R.","year":"2009","journal-title":"FAST"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/9576978.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/9576978.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/9576978","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T07:28:38Z","timestamp":1723015718000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/9576978"}},"subtitle":[],"editor":[{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/9576978"],"URL":"https:\/\/doi.org\/10.1155\/2018\/9576978","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2018-03-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-06-05","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-06-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"9576978"}}