{"id":"https://openalex.org/W1965695408","doi":"https://doi.org/10.1109/iccs.2014.7024861","title":"An analytical model on eavesdropping attacks in wireless networks","display_name":"An analytical model on eavesdropping attacks in wireless networks","publication_year":2014,"publication_date":"2014-11-01","ids":{"openalex":"https://openalex.org/W1965695408","doi":"https://doi.org/10.1109/iccs.2014.7024861","mag":"1965695408"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccs.2014.7024861","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013814252","display_name":"Xuran Li","orcid":"https://orcid.org/0000-0002-2658-6113"},"institutions":[{"id":"https://openalex.org/I111950717","display_name":"Macau University of Science and Technology","ror":"https://ror.org/03jqs2n27","country_code":"MO","type":"education","lineage":["https://openalex.org/I111950717","https://openalex.org/I4391767947"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Xuran Li","raw_affiliation_strings":["[Faculty of Information Technology, Macau University of Science and Technology, Macau.]"],"affiliations":[{"raw_affiliation_string":"[Faculty of Information Technology, Macau University of Science and Technology, Macau.]","institution_ids":["https://openalex.org/I111950717"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072659343","display_name":"Hong\u2010Ning Dai","orcid":"https://orcid.org/0000-0001-6165-4196"},"institutions":[{"id":"https://openalex.org/I111950717","display_name":"Macau University of Science and Technology","ror":"https://ror.org/03jqs2n27","country_code":"MO","type":"education","lineage":["https://openalex.org/I111950717","https://openalex.org/I4391767947"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Hong-Ning Dai","raw_affiliation_strings":["[Faculty of Information Technology, Macau University of Science and Technology, Macau.]"],"affiliations":[{"raw_affiliation_string":"[Faculty of Information Technology, Macau University of Science and Technology, Macau.]","institution_ids":["https://openalex.org/I111950717"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038174569","display_name":"Qinglin Zhao","orcid":"https://orcid.org/0000-0003-4873-5631"},"institutions":[{"id":"https://openalex.org/I111950717","display_name":"Macau University of Science and Technology","ror":"https://ror.org/03jqs2n27","country_code":"MO","type":"education","lineage":["https://openalex.org/I111950717","https://openalex.org/I4391767947"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Qinglin Zhao","raw_affiliation_strings":["[Faculty of Information Technology, Macau University of Science and Technology, Macau.]"],"affiliations":[{"raw_affiliation_string":"[Faculty of Information Technology, Macau University of Science and Technology, Macau.]","institution_ids":["https://openalex.org/I111950717"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.654,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":8,"citation_normalized_percentile":{"value":0.53096,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":84,"max":85},"biblio":{"volume":null,"issue":null,"first_page":"538","last_page":"542"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9837,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9836,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.9957392}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.9957392},{"id":"https://openalex.org/C194273485","wikidata":"https://www.wikidata.org/wiki/Q1478845","display_name":"Path loss","level":3,"score":0.7600017},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.71007574},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5550167},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.50805736},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.50674707},{"id":"https://openalex.org/C117797892","wikidata":"https://www.wikidata.org/wiki/Q286363","display_name":"Shadow (psychology)","level":2,"score":0.47589362},{"id":"https://openalex.org/C81978471","wikidata":"https://www.wikidata.org/wiki/Q1196572","display_name":"Fading","level":3,"score":0.46050638},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.459281},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4464933},{"id":"https://openalex.org/C21822782","wikidata":"https://www.wikidata.org/wiki/Q131214","display_name":"Antenna (radio)","level":2,"score":0.43303344},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.36421755},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.19080016},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccs.2014.7024861","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":16,"referenced_works":["https://openalex.org/W1647572132","https://openalex.org/W1982686915","https://openalex.org/W2003054016","https://openalex.org/W2007662129","https://openalex.org/W2012390131","https://openalex.org/W2044963156","https://openalex.org/W2069352936","https://openalex.org/W2079657735","https://openalex.org/W2085356235","https://openalex.org/W2103125001","https://openalex.org/W2111341891","https://openalex.org/W2112802532","https://openalex.org/W2130061115","https://openalex.org/W2145417574","https://openalex.org/W2167009467","https://openalex.org/W2482057251"],"related_works":["https://openalex.org/W4387918499","https://openalex.org/W4386360526","https://openalex.org/W2786267942","https://openalex.org/W2772112465","https://openalex.org/W2769254131","https://openalex.org/W2766105476","https://openalex.org/W2735171729","https://openalex.org/W2368710903","https://openalex.org/W2158905603","https://openalex.org/W2091556092"],"abstract_inverted_index":{"This":[0,93],"paper":[1],"concerns":[2],"the":[3,7,21,31,49,57,61,66,80,86,101],"eavesdropping":[4,32,52,83,102],"problem":[5],"from":[6],"eavesdroppers'":[8],"perspective,":[9],"which":[10],"is":[11,90,95],"new":[12],"since":[13],"most":[14],"of":[15,51,82],"previous":[16],"studies":[17],"only":[18],"concentrate":[19],"on":[20,56],"good":[22],"nodes.":[23],"We":[24],"propose":[25],"an":[26],"analytical":[27],"framework":[28],"to":[29,99],"investigate":[30],"attacks,":[33],"taking":[34],"account":[35],"into":[36],"various":[37],"channel":[38],"conditions":[39],"and":[40,65,105],"antenna":[41,67],"models.":[42],"Our":[43],"extensive":[44],"numerical":[45],"results":[46],"show":[47],"that":[48,72],"probability":[50,81],"attacks":[53,84,103],"heavily":[54],"depends":[55],"shadow":[58],"fading":[59],"effect,":[60],"path":[62,87],"loss":[63,88],"effect":[64,89],"models;":[68],"particularly,":[69],"they":[70],"imply":[71],"using":[73],"directional":[74],"antennas":[75],"at":[76],"eavesdroppers":[77],"can":[78],"increase":[79],"when":[85],"less":[91],"notable.":[92],"study":[94],"helpful":[96],"for":[97],"us":[98],"prevent":[100],"effectively":[104],"economically.":[106]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1965695408","counts_by_year":[{"year":2022,"cited_by_count":3},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2}],"updated_date":"2024-12-11T01:42:07.439130","created_date":"2016-06-24"}