{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:21:27Z","timestamp":1761744087682,"version":"3.41.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T00:00:00Z","timestamp":1425340800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/s13638-015-0240-6","type":"journal-article","created":{"date-parts":[[2015,3,2]],"date-time":"2015-03-02T10:29:27Z","timestamp":1425292167000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Scaling of wireless sensor network intrusion detection probability: 3D sensors, 3D intruders, and 3D environments"],"prefix":"10.1186","volume":"2015","author":[{"given":"Omar","family":"Said","sequence":"first","affiliation":[]},{"given":"Alaa","family":"Elnashar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,3]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Y Luo, S Morgera, R Sankar, in proceedings of the 2nd IEEE International Conference on Information Science and Engineering (ICISE). A survey on intrusion detection of wireless sensor network (China, 4\u20136 Dec 2010), pp. 1798\u20131802.","key":"240_CR1","DOI":"10.1109\/ICISE.2010.5690579"},{"issue":"8","key":"240_CR2","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"Y Akyildiz","year":"2002","unstructured":"Y Akyildiz, S Weilian, Y Sankarasubramaniam, E Cayirci, A survey on wireless sensor networks. IEEE Commun. Mag. 40(8), 102\u2013114 (2002).","journal-title":"IEEE Commun. Mag."},{"doi-asserted-by":"crossref","unstructured":"K Sohraby, D Minoli, T Znati, Wireless sensor networks: technology, protocols, and applications. Wiley-Interscience, 12\u201368 (2007).","key":"240_CR3","DOI":"10.1002\/047011276X"},{"issue":"6","key":"240_CR4","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MWC.2004.1368893","volume":"11","author":"J Al-Karaki","year":"2004","unstructured":"J Al-Karaki, A Kamal, E Cayirci, Routing techniques in wireless sensor networks: a survey. IEEE Wireless Commun. 11(6), 6\u201328 (2004).","journal-title":"IEEE Wireless Commun."},{"issue":"2","key":"240_CR5","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/565702.565708","volume":"6","author":"S Tilak","year":"2002","unstructured":"S Tilak, N Abu-Ghazaleh, A taxonomy of wireless micro-sensor network models. ACM Mobile Comput. Commun. Rev. 6(2), 28\u201336 (2002).","journal-title":"ACM Mobile Comput. Commun. Rev."},{"doi-asserted-by":"crossref","unstructured":"A Agah, S Das, K Basu, M Asadi, in proceedings of the Third IEEE International Symposium on Network Computing and Applications (NCA). Intrusion detection in sensor networks: a non-cooperative game approach (USA, January 30 Aug), pp. 343\u2013346.","key":"240_CR6","DOI":"10.1109\/NCA.2004.1347798"},{"unstructured":"A Agah, S Das, K Basu, A game theory based approach for security in wireless sensor networks, (USA, Unknown Month 15).","key":"240_CR7"},{"issue":"1","key":"240_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/wcm.422","volume":"8","author":"V Giruka","year":"2008","unstructured":"V Giruka, M Singhal, J Royalty, S Varanasi, Security in wireless sensor networks. Wiley Wireless Commun. Mobile Comput. 8(1), 1\u201324 (2008).","journal-title":"Wiley Wireless Commun. Mobile Comput."},{"issue":"5","key":"240_CR9","first-page":"605","volume":"46","author":"A Arora","year":"2004","unstructured":"A Arora, P Dutta, S Bapat, V Kulathumani, H Zhang, V Naik, V Mittal, H Cao, M Demirbas, M Gouda, A line in the sand: a wireless sensor network for target detection, classification, and tracking. Int. J. Comput. Telecommun. Networking-Special Issue: Mil. Commun. Syst. Technol. 46(5), 605\u2013634 (2004).","journal-title":"Int. J. Comput. Telecommun. Networking-Special Issue: Mil. Commun. Syst. Technol."},{"issue":"3","key":"240_CR10","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.eij.2012.10.003","volume":"13","author":"H Solimana","year":"2012","unstructured":"H Solimana, N Hikalb, N Sakrb, A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks. Elsevier Egypt. Inform. J. 13(3), 225\u2013238 (2012).","journal-title":"Elsevier Egypt. Inform. J."},{"unstructured":"S Sachan, M Wazid, P Singh, H Goudar, A cluster based intrusion detection and prevention technique for misdirection attack inside WSN, (India, May 3).","key":"240_CR11"},{"doi-asserted-by":"crossref","unstructured":"H Kung, D Vlah, Efficient location tracking using sensor networks. Proceedings of IEEE International Conference on Wireless Communications and Networking (WCNC), 1954\u20131961 (Unknown Month 20).","key":"240_CR12","DOI":"10.1109\/WCNC.2003.1200686"},{"issue":"8","key":"240_CR13","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.1109\/TMC.2006.115","volume":"5","author":"C Lin","year":"2006","unstructured":"C Lin, W Peng, Y Tseng, Efficient in-network moving object tracking in wireless sensor networks. IEEE Trans. Mobile Comput. 5(8), 1044\u20131056 (2006).","journal-title":"IEEE Trans. Mobile Comput."},{"issue":"1","key":"240_CR14","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1016\/j.aeue.2014.10.013","volume":"69","author":"Y Albagory","year":"2015","unstructured":"Y Albagory, O Said, Performance enhancement of high-altitude platforms wireless sensor networks using concentric circular arrays. Elsevier AEU-Int. J. Electronics Commun. 69(1), 382\u2013388 (2015).","journal-title":"Elsevier AEU-Int. J. Electronics Commun."},{"key":"240_CR15","first-page":"1","volume":"1","author":"T Yang","year":"2014","unstructured":"T Yang, D Mu, W Hu, H Zhang, Energy-efficient border intrusion detection using wireless sensors network. Springer EURASIP J. Wireless Commun. Netw. 1, 1\u201312 (2014).","journal-title":"Springer EURASIP J. Wireless Commun. Netw."},{"key":"240_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.01.012","volume":"42","author":"R Mitchell","year":"2014","unstructured":"R Mitchell, I Chen, A survey of intrusion detection in wireless network applications. Elsevier Comput. Commun. J. 42, 1\u201323 (2014).","journal-title":"Elsevier Comput. Commun. J."},{"issue":"8","key":"240_CR17","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.1109\/TMC.2006.115","volume":"5","author":"C Lin","year":"2006","unstructured":"C Lin, W Chen, Y Tseng, Efficient in-network moving object tracking in wireless sensor networks. IEEE Trans. Mobile Comput. 5(8), 1044\u20131056 (2006).","journal-title":"IEEE Trans. Mobile Comput."},{"unstructured":"Y Zhang, W Lee, Intrusion detection in wireless ad-hoc networks, (USA, November 6).","key":"240_CR18"},{"key":"240_CR19","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-319-07536-5_21","volume":"8479","author":"A Stetsko","year":"2014","unstructured":"A Stetsko, T Smolka, V Matyas, Improving intrusion detection systems for wireless sensor networks. Springer Appl. Cryptography Netw. Secur. Lect. Notes Comput. Sci. 8479, 343\u2013360 (2014).","journal-title":"Springer Appl. Cryptography Netw. Secur. Lect. Notes Comput. Sci."},{"key":"240_CR20","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-319-09770-1_16","volume":"8647","author":"J Kur","year":"2014","unstructured":"J Kur, V Matyas, A protocol for intrusion detection in location privacy-aware wireless sensor networks. Springer Trust Privacy Secur. Digital Bus. Lecture Notes Comput. Sci. 8647, 180\u2013190 (2014).","journal-title":"Springer Trust Privacy Secur. Digital Bus. Lecture Notes Comput. Sci."},{"unstructured":"Y Wang, Y Leow, J Yin, Is straight-line path always the best for intrusion detection in wireless sensor networks, (China, November 8).","key":"240_CR21"},{"unstructured":"Y Wang, W Fu, D Agrawal, Intrusion detection in Gaussian distributed heterogeneous wireless sensor networks, (USA, Summer 12).","key":"240_CR22"},{"issue":"6","key":"240_CR23","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1109\/TMC.2008.19","volume":"7","author":"Y Wang","year":"2008","unstructured":"Y Wang, X Wang, B Wang, D Agrawal, Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Trans. Mobile Comput. 7(6), 698\u2013711 (2008).","journal-title":"IEEE Trans. Mobile Comput."},{"unstructured":"Y Wang, F Li, F Fang, Poisson versus Gaussian distribution for object tracking in wireless sensor networks, (China, Unknown Month 22).","key":"240_CR24"},{"unstructured":"B Liu, P Brass, O Dousse, P Nain, D Towsley, Mobility improves coverage of sensor networks, (USA, Unknown Month 25).","key":"240_CR25"},{"unstructured":"O Dousse, C Tavoularis, P Thiran, Delay of intrusion detection in wireless sensor networks, (Italy, Unknown Month 22).","key":"240_CR26"},{"unstructured":"S Qiong, C Comaniciu, Efficient cooperative detection for wireless sentinel networks, (USA, Unknown Month 17).","key":"240_CR27"},{"unstructured":"D Turgut, B Turgut, L Boloni, Stealthy dissemination in intruder tracking sensor networks, (Germany, Unknown Month 20).","key":"240_CR28"},{"issue":"2","key":"240_CR29","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1109\/TPDS.2012.105","volume":"24","author":"Y Wang","year":"2013","unstructured":"Y Wang, W Fu, D Agrawal, Gaussian versus uniform distribution for intrusion detection in wireless sensor networks. IEEE Trans. Parallel Distributed Syst. 24(2), 342\u2013355 (2013).","journal-title":"IEEE Trans. Parallel Distributed Syst."},{"issue":"3","key":"240_CR30","first-page":"19","volume":"1","author":"M Chopde","year":"2011","unstructured":"M Chopde, K Ramteke, S Kamble, Probabilistic model for intrusion detection in wireless sensor network. Int. J. Commun. Netw. Secur. (IJCNS). 1(3), 19\u201323 (2011).","journal-title":"Int. J. Commun. Netw. Secur. (IJCNS)"},{"issue":"12","key":"240_CR31","first-page":"15","volume":"6","author":"M Mubarak","year":"2010","unstructured":"M Mubarak, S Sattar, A Sajitha, Intrusion detection: a probability model for 3D heterogeneous WSN. Int. J. Comput. Appl. 6(12), 15\u201320 (2010).","journal-title":"Int. J. Comput. Appl."},{"unstructured":"C Ortiz, J Puig, C Palau, M Esteve, Wireless sensor network modeling and simulation, (Valencia, Spain, Unknown Month 14).","key":"240_CR32"},{"issue":"2","key":"240_CR33","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1214\/aoms\/1177692644","volume":"43","author":"G Marsaglia","year":"1972","unstructured":"G Marsaglia, Choosing a point from the surface of a sphere. Ann. Math. Stat. 43(2), 645\u2013646 (1972).","journal-title":"Ann. Math. Stat."},{"unstructured":"R Kaparti, OPNET IT GURU: a tool for networking education. MSCIT Practicum Paper. \" http:\/\/staff.ustc.edu.cn\/~bhua\/experiments\/ITGAE_Tool_Ntwrk_Ed.pdf \" Accessed 3 Mar 2015.","key":"240_CR34"},{"unstructured":"The network simulator - ns-2. \" http:\/\/www.isi.edu\/nsnam\/ns\/ \" Accessed 10 Dec 2014.","key":"240_CR35"},{"key":"240_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/531254","volume":"2014","author":"T Xuan","year":"2014","unstructured":"T Xuan, S Choi, I Koo, A novel blind event detection method for wireless sensor networks. Hindawi J. Sensors. 2014, 1\u20136 (2014).","journal-title":"Hindawi J. Sensors"},{"unstructured":"D Cohen, M Kelly, X Huang, N Srinath, Trustability based on beta distribution detecting abnormal behaviour nodes in WSN, (Indonesia, Unknown Month 29).","key":"240_CR37"},{"issue":"1","key":"240_CR38","first-page":"1","volume":"2","author":"M Islam","year":"2013","unstructured":"M Islam, Motion analysis using distance and velocity-time function. Int. J. Sci. Knowl. 2(1), 1\u20136 (2013).","journal-title":"Int. J. Sci. Knowl."},{"unstructured":"Sphere-sphere intersection. \" http:\/\/mathworld.wolfram.com\/Sphere-SphereIntersection.html \" Accessed 10 Dec 2014.","key":"240_CR39"},{"issue":"4","key":"240_CR40","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I Akyildiz","year":"2002","unstructured":"I Akyildiz, W Sankarasubramaniam, E Cayirci, Wireless sensor networks: a survey. Elsevier J. Comput. Netw. 38(4), 393\u2013422 (2002).","journal-title":"Elsevier J. Comput. Netw."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-015-0240-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0240-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0240-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0240-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T16:12:05Z","timestamp":1747757525000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-015-0240-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,3]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["240"],"URL":"https:\/\/doi.org\/10.1186\/s13638-015-0240-6","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2015,3,3]]},"assertion":[{"value":"29 July 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2015","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2015","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"46"}}