{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:26:24Z","timestamp":1725773184379},"reference-count":174,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2013]]},"DOI":"10.1109\/surv.2013.011413.00118","type":"journal-article","created":{"date-parts":[[2013,1,28]],"date-time":"2013-01-28T19:01:55Z","timestamp":1359399715000},"page":"1238-1280","source":"Crossref","is-referenced-by-count":138,"title":["Providing Source Location Privacy in Wireless Sensor Networks: A Survey"],"prefix":"10.1109","volume":"15","author":[{"given":"Mauro","family":"Conti","sequence":"first","affiliation":[]},{"given":"Jeroen","family":"Willemsen","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","author":"el","year":"0"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2007.909914"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161303"},{"key":"ref174","first-page":"2:1","article-title":"approach for physical layer location privacy","volume":"2010","year":"2010","journal-title":"J Comp Sys Netw and Comm"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2011.6085415"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.146"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1145\/1089444.1089494"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/3-540-49380-8_7","article-title":"Stop-and-go-mixes providing probabilistic anonymity in an open system","volume":"1525","author":"kesdogan","year":"1998","journal-title":"Information Hiding"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948128"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.42"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1996.569678"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055871"},{"key":"ref35","first-page":"451","article-title":"Isdn-mixes: Untraceable communication with very small bandwidth overhead","author":"pfitzmann","year":"1991","journal-title":"Kommunikation in Verteilten Systemen Grundlagen Anwendungen Betrieb GI\/ITG-Fachtagung"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90087-3"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2010.5682341"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352547"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr010"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.31"},{"key":"ref22","first-page":"223","author":"javier lopez","year":"2008","journal-title":"Wireless Sensor Networks"},{"key":"ref21","first-page":"29","article-title":"Source location privacy considerations in wireless sensor networks","author":"rios","year":"2010","journal-title":"4th International Symposium on Ubiquitous Computing and Ambient Intelligence"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/BSC.2010.5472946"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090205"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.16"},{"key":"ref26","first-page":"33","article-title":"A self-adjusting directed random walk approach for enhancing source-location privacy in sensor network routing","author":"zhang","year":"2006","journal-title":"Proc 2006 International Conference on Wireless Communications and Mobile Computing"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/WSTFES.2004.1300417"},{"key":"ref25","first-page":"1630","article-title":"A source-location privacy protocol in wsn based on locational angle","author":"wei","year":"2008","journal-title":"Communications 2008 IEEE International Conference on"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.09.005"},{"key":"ref51","first-page":"1","article-title":"Hyberloc: providing physical layer location privacy in hybrid sensor networks","author":"el","year":"2010","journal-title":"IEEE International Conference on Communications"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958521"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2009.18"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.698"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1368900"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1145\/1921621.1921623"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.237"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.23"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"key":"ref147","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1007\/978-3-540-74835-9_26","article-title":"On the privacy of concealed data aggregation","volume":"4734","author":"aldar","year":"2007","journal-title":"Computer Security-ESORICS 2007 ser Lecture Notes in Computer Science"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2005.1494953"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.144"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2010.474"},{"key":"ref58","first-page":"1","article-title":"Towards a statistical framework for source anonymity in sensor networks","volume":"10","author":"alomair","year":"2011","journal-title":"IEEE Trans Mobile Computing"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.19"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19228-9_3"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2011.5986491"},{"key":"ref54","first-page":"194","article-title":"Protecting location privacy through path confusion","author":"hoh","year":"2005","journal-title":"Security and Privacy for Emerging Areas in Communications Networks 2005 First International Conference on"},{"key":"ref53","first-page":"184","article-title":"Towards measuring anonymity","author":"diaz","year":"2003","journal-title":"Proc 3rd international conference on Privacy Enhancing Technologies"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2009.5202367"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-44702-4_1","article-title":"Anonymity, unobservability, and pseudonymitya proposal for terminology","author":"pfitzmann and m","year":"2001","journal-title":"Designing Privacy Enhancing Technologies"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.01.001"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.11.004"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.122010.100087"},{"key":"ref163","first-page":"51","article-title":"Decentralized compression and predistribution via randomized gossiping","author":"rabbat","year":"2006","journal-title":"Proc 5th International Conference on Information Processing in Sensor Networks"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.904818"},{"key":"ref160","first-page":"672","article-title":"An efficient n-to-1 multipath routing protocol in wireless sensor networks","author":"lou","year":"2005","journal-title":"Mobile Adhoc and Sensor Systems Conference 2005 IEEE International Conference on"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.11.006"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/978-3-642-03417-6_33","article-title":"Providing source-location privacy in wireless sensor networks","author":"li","year":"2009","journal-title":"Proc Int Conf Wireless Algorithms Systems Applications"},{"key":"ref6","first-page":"191","article-title":"Privacy preserving hop-distance computation in wireless sensor networks","volume":"19","author":"mingjun","year":"2010","journal-title":"Chinese J Electronics"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.012"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2003.1200680"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2004.1316121"},{"key":"ref49","first-page":"18","article-title":"Anonymous networking with minimum latency in multihop networks","author":"venkitasubramaniam","year":"2008","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/65.953229"},{"key":"ref158","first-page":"1","article-title":"Lightweight source anonymity in wireless sensor networks","author":"phillip","year":"2010","journal-title":"Global Telecommunications Conference 2011 IEEE"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CSA.2009.5404315"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784915"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683317"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-009-0167-4"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2009.5168923"},{"key":"ref42","first-page":"41","article-title":"Towards an information theoretic metric for anonymity","author":"serjantov","year":"2002","journal-title":"Proc 2nd International Conference on Privacy Enhancing Technologies"},{"key":"ref41","article-title":"Anonymity, unlinkability, unobservability, pseudonymity, and identity management-a consolidated proposal for terminology","author":"pfitzmann","year":"2005"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062146"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1951.tb01366.x"},{"key":"ref127","first-page":"153","article-title":"Routing in packet radio networks to prevent traffic analysis","volume":"2","author":"jiang","year":"2001","journal-title":"Proc 2001 DARPA Information Survivability Conf and Exposition"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.227"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2009.5450077"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-002-0128-6"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25959-3_23"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460884"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2007.4283904"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683714"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.010311.101885"},{"key":"ref70","first-page":"169","article-title":"Effective probabilistic approach protecting sensor traffic","author":"hong","year":"2005","journal-title":"2005 IEEE Military Communications Conference"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2009.5189579"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1205"},{"key":"ref77","article-title":"Preserving source location privacy in monitoring-based wireless sensor networks","author":"xi","year":"2006","journal-title":"20th International Parallel and Distributed Processing Symposium"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684248"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570742"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61350-101-6.ch202"},{"key":"ref134","first-page":"28","article-title":"Privacy-aware location sensor networks","volume":"6","author":"gruteser","year":"2003","journal-title":"Proc 9th conference on Hot Topics in Operating Systems-Volume 9 ser HotOS IX '03 USENIX Association"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/1380564.1380568"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72606-7_19"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1002\/sec.95"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICISA.2010.5480564"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.20"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2009.25"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.01.006"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2009.77"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.302"},{"key":"ref139","first-page":"1","article-title":"Preserving privacy against external and internal threats in wsn data aggregation","volume":"46","author":"zhang","year":"2011","journal-title":"Telecommunication Systems"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2011.01.001"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199372"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/1614379.1614380"},{"key":"ref64","first-page":"31","article-title":"Security vulnerabilities in wireless sensor networks: a survey","volume":"5","author":"kavitha","year":"2010","journal-title":"J Information Assurance and Security"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1002\/sec.93"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.013"},{"key":"ref141","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1002\/wcm.796","article-title":"Mdpa: multidimensional privacy-preserving aggregation scheme for wireless sensor networks","volume":"10","author":"lin","year":"2010","journal-title":"Wireless Communications and Mobile Computing"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.107"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/RADAR.2008.4720903"},{"key":"ref67","first-page":"657","article-title":"An anonymous path routing (apr) protocol for wireless sensor networks","volume":"27","author":"jiang","year":"2011","journal-title":"J Information Science and Engineering"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2008.60"},{"key":"ref68","first-page":"79","article-title":"An experimental comparison of source location privacy methods for power optimization in wsns","author":"suarez-tangil","year":"2010","journal-title":"Proc 3rd WSEAS international conference on Advances in sensors signals and materials"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935177"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.07.014"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob.2009.24"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1145\/2034594.2034599"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.01.012"},{"key":"ref109","first-page":"116","article-title":"On providing location privacy for mobile sinks in wireless sensor networks","author":"ngai","year":"2009","journal-title":"Proc 12th ACM international conference on Modeling analysis and simulation of wireless and mobile systems"},{"key":"ref95","first-page":"254","article-title":"Hidden anchor: Providing physical layer location privacy in hybrid wireless sensor networks","author":"el","year":"2009","journal-title":"Proc of the Int Conf on New Technologies Mobility and Security"},{"key":"ref108","article-title":"Agent tcl: A flexible and secure mobile-agent system","volume":"6","author":"gray","year":"1996","journal-title":"Proc 4th conference on USENIX Tcl\/Tk Workshop 1996-Volume 4 ser TCLTK '96 USENIX Association"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr055"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.06.021"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2010.75"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2009.5168962"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.02.002"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2009.5235216"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20975-8_34"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/I-SPAN.2009.78"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.05.014"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2011.5983942"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1002\/sec.244"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1002\/sec.214"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2011.5766864"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/1582379.1582439"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.154"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/570739.570741"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.101210.100731"},{"key":"ref97","first-page":"1243","article-title":"Multi-node coordinated jamming for location privacy protection","volume":"11","author":"oh","year":"2011","journal-title":"2011 - MILCOM 2011 Military Communications Conference"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.146"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.18"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.009"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.31"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029117"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2007.4375862"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180351"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.32"},{"key":"ref82","first-page":"44","article-title":"The quality of source location protection in globally attacked sensor networks","author":"kokalj","year":"2011","journal-title":"IEEE International Conference on Pervasive Computing and Communications Workshops"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1255650"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.107"},{"key":"ref81","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1007\/978-3-642-16355-5_22","article-title":"Protecting source location privacy in wireless sensor networks with data aggregation","author":"yang","year":"2010","journal-title":"Proc 7th international conference on Ubiquitous intelligence and computing"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.145"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1002\/sec.179"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/1499949.1499985"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1447","DOI":"10.3390\/s100301447","article-title":"Achieving network level privacy in wireless sensor networks","volume":"10","author":"shaikh","year":"2010","journal-title":"SENSORS"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502142"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345953"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100606"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1255648"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683603"},{"key":"ref115","first-page":"91","article-title":"Sensor grid: Integration of wireless sensor networks and the grid","author":"lim","year":"2005","journal-title":"Local Computer Networks 2005 30th Anniversary The IEEE Conference on"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05284-2_22"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/UBICOMM.2009.27"},{"key":"ref121","first-page":"1","article-title":"On source anonymity in wireless sensor networks","author":"alomair","year":"2010","journal-title":"Proc 40th IEEE\/IFIP International Conference on Dependable Systems and Networks"},{"key":"ref122","article-title":"The tcg mobile trusted module specification - version 1, revision 7.02","year":"2010"},{"key":"ref123","article-title":"The tcg mobile reference architecture-specification version 1.0","year":"2007","journal-title":"MPWG TCG Tech Rep 6"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2006.40"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/SECPERU.2006.11"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.515"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2006.010834"}],"container-title":["IEEE Communications Surveys & Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9739\/6572931\/06422284.pdf?arnumber=6422284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,5]],"date-time":"2024-05-05T07:25:38Z","timestamp":1714893938000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6422284\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"references-count":174,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/surv.2013.011413.00118","relation":{},"ISSN":["1553-877X"],"issn-type":[{"value":"1553-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}